openSUSE-Leap-Micro-5.3-2022-4081 Security update for dpkg low SUSE Updates openSUSE-Leap-Micro 5.3 This update for dpkg fixes the following issues: - CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944). update-alternatives-1.19.0.4-150000.4.4.1.src.rpm update-alternatives-1.19.0.4-150000.4.4.1.x86_64.rpm update-alternatives-1.19.0.4-150000.4.4.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4226 Recommended update for suseconnect-ng moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for suseconnect-ng fixes the following issues: - Fix System-Token support in ruby binding (bsc#1203341) - Use system-wide proxy settings (bsc#1200994) - Add timer for SUSEConnect --keepalive (bsc#1196076) - Added support for the System-Token header - Add Keepalive command line option - Print nested zypper errors (bsc#1200803) - Fix migration json error with SMT (bsc#1198625) - Packaging adjustments (bsc#1204821) - Add option to run local scc tests suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.src.rpm suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.x86_64.rpm suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4256 Recommended update for gcc12 moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for gcc12 fixes the following issues: This update ship the GCC 12 compiler suite and its base libraries. The compiler baselibraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 11 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP3 and SP4, and provided in the "Development Tools" module. The Go, D and Ada language compiler parts are available unsupported via the PackageHub repositories. To use gcc12 compilers use: - install "gcc12" or "gcc12-c++" or one of the other "gcc12-COMPILER" frontend packages. - override your Makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages. For a full changelog with all new GCC12 features, check out https://gcc.gnu.org/gcc-12/changes.html gcc12-12.2.1+git416-150000.1.5.1.src.rpm libgcc_s1-12.2.1+git416-150000.1.5.1.x86_64.rpm libstdc++6-12.2.1+git416-150000.1.5.1.x86_64.rpm libgcc_s1-12.2.1+git416-150000.1.5.1.aarch64.rpm libstdc++6-12.2.1+git416-150000.1.5.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4262 Recommended update for lvm2 important SUSE Updates openSUSE-Leap-Micro 5.3 This update for lvm2 fixes the following issues: - Fix terminated lvmlockd not clearing/adopting locks, leading to inability to start volume group (bsc#1203216) - Fix device-mapper rpm package versioning to prevent migration issues (bsc#1199074) - Fix lvmlockd to support sanlock (bsc#1203482) device-mapper-2.03.05_1.02.163-150400.185.1.x86_64.rpm libdevmapper-event1_03-2.03.05_1.02.163-150400.185.1.x86_64.rpm libdevmapper1_03-2.03.05_1.02.163-150400.185.1.x86_64.rpm liblvm2cmd2_03-2.03.05-150400.185.1.x86_64.rpm lvm2-2.03.05-150400.185.1.src.rpm lvm2-2.03.05-150400.185.1.x86_64.rpm lvm2-device-mapper-2.03.05-150400.185.1.src.rpm device-mapper-2.03.05_1.02.163-150400.185.1.aarch64.rpm libdevmapper-event1_03-2.03.05_1.02.163-150400.185.1.aarch64.rpm libdevmapper1_03-2.03.05_1.02.163-150400.185.1.aarch64.rpm liblvm2cmd2_03-2.03.05-150400.185.1.aarch64.rpm lvm2-2.03.05-150400.185.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4281 Security update for python3 important SUSE Updates openSUSE-Leap-Micro 5.3 This update for python3 fixes the following issues: - CVE-2022-37454: Fixed a buffer overflow in hashlib.sha3_* implementations. (bsc#1204577) - CVE-2020-10735: Fixed a bug to limit amount of digits converting text to int and vice vera. (bsc#1203125) The following non-security bug was fixed: - Fixed a crash in the garbage collection (bsc#1188607). libpython3_6m1_0-3.6.15-150300.10.37.2.x86_64.rpm python3-3.6.15-150300.10.37.2.src.rpm python3-3.6.15-150300.10.37.2.x86_64.rpm python3-base-3.6.15-150300.10.37.2.x86_64.rpm python3-core-3.6.15-150300.10.37.2.src.rpm libpython3_6m1_0-3.6.15-150300.10.37.2.aarch64.rpm python3-3.6.15-150300.10.37.2.aarch64.rpm python3-base-3.6.15-150300.10.37.2.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4312 Recommended update for tar moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for tar fixes the following issues: - Fix unexpected inconsistency when making directory (bsc#1203600) - Update race condition fix (bsc#1200657) tar-1.34-150000.3.22.3.src.rpm tar-1.34-150000.3.22.3.x86_64.rpm tar-1.34-150000.3.22.3.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4153 Security update for krb5 important SUSE Updates openSUSE-Leap-Micro 5.3 This update for krb5 fixes the following issues: - CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126). krb5-1.19.2-150400.3.3.1.src.rpm krb5-1.19.2-150400.3.3.1.x86_64.rpm krb5-1.19.2-150400.3.3.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4206 Security update for pixman important SUSE Updates openSUSE-Leap-Micro 5.3 This update for pixman fixes the following issues: - CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033). libpixman-1-0-0.40.0-150400.3.3.1.x86_64.rpm pixman-0.40.0-150400.3.3.1.src.rpm libpixman-1-0-0.40.0-150400.3.3.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4141 Security update for grub2 important SUSE Updates openSUSE-Leap-Micro 5.3 This update for grub2 fixes the following issues: - CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178). - CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182). Other: - Bump upstream SBAT generation to 3 grub2-2.06-150400.11.17.1.src.rpm grub2-2.06-150400.11.17.1.x86_64.rpm grub2-i386-pc-2.06-150400.11.17.1.noarch.rpm grub2-snapper-plugin-2.06-150400.11.17.1.noarch.rpm grub2-x86_64-efi-2.06-150400.11.17.1.noarch.rpm grub2-x86_64-xen-2.06-150400.11.17.1.noarch.rpm grub2-2.06-150400.11.17.1.aarch64.rpm grub2-arm64-efi-2.06-150400.11.17.1.noarch.rpm openSUSE-Leap-Micro-5.3-2022-4278 Security update for supportutils moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for supportutils fixes the following issues: Security issues fixed: - Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818) Bug fixes: - Added lifecycle information - Fixed KVM virtualization detection on bare metal (bsc#1184689) - Added logging using journalctl (bsc#1200330) - Get current sar data before collecting files (bsc#1192648) - Collects everything in /etc/multipath/ (bsc#1192252) - Collects power management information in hardware.txt (bsc#1197428) - Checks for suseconnect-ng or SUSEConnect packages (bsc#1202337) - Fixed conf_files and conf_text_files so y2log is gathered (bsc#1202269) - Update to nvme_info and block_info (bsc#1202417) - Added includedir directories from /etc/sudoers (bsc#1188086) supportutils-3.1.21-150300.7.35.15.1.noarch.rpm supportutils-3.1.21-150300.7.35.15.1.src.rpm openSUSE-Leap-Micro-5.3-2022-4147 Security update for kubevirt stack important SUSE Updates openSUSE-Leap-Micro 5.3 This update provides rebuilds of the kubevirt containers with up to date base images, fixing various security issues. kubevirt-0.54.0-150400.3.7.1.src.rpm kubevirt-manifests-0.54.0-150400.3.7.1.x86_64.rpm kubevirt-virtctl-0.54.0-150400.3.7.1.x86_64.rpm openSUSE-Leap-Micro-5.3-2022-4138 Recommended update for python-msgpack important SUSE Updates openSUSE-Leap-Micro 5.3 This update for python-msgpack fixes the following issues: - Fix build failures on SUSE Linux Enterprise 15 Service Pack 5 (bsc#1203743) python-msgpack-0.5.6-150100.3.3.1.src.rpm python3-msgpack-0.5.6-150100.3.3.1.x86_64.rpm python3-msgpack-0.5.6-150100.3.3.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4191 Security update for containerized-data-importer important SUSE Updates openSUSE-Leap-Micro 5.3 This update rebuilds the current containeried data importer images against current base images, to fix security issues. containerized-data-importer-1.51.0-150400.4.7.1.src.rpm containerized-data-importer-manifests-1.51.0-150400.4.7.1.x86_64.rpm openSUSE-Leap-Micro-5.3-2022-4328 Recommended update for audit-secondary moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for audit-secondary fixes the following issues: - Fix rules not loaded when restarting auditd.service (bsc#1204844) audit-3.0.6-150400.4.6.1.x86_64.rpm audit-audispd-plugins-3.0.6-150400.4.6.1.x86_64.rpm audit-secondary-3.0.6-150400.4.6.1.src.rpm python3-audit-3.0.6-150400.4.6.1.x86_64.rpm system-group-audit-3.0.6-150400.4.6.1.x86_64.rpm audit-3.0.6-150400.4.6.1.aarch64.rpm audit-audispd-plugins-3.0.6-150400.4.6.1.aarch64.rpm python3-audit-3.0.6-150400.4.6.1.aarch64.rpm system-group-audit-3.0.6-150400.4.6.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4214 Security update for libdb-4_8 low SUSE Updates openSUSE-Leap-Micro 5.3 This update for libdb-4_8 fixes the following issues: - CVE-2019-2708: Fixed partial DoS due to data store execution (bsc#1174414). db48-utils-4.8.30-150000.7.6.1.x86_64.rpm libdb-4_8-4.8.30-150000.7.6.1.src.rpm libdb-4_8-4.8.30-150000.7.6.1.x86_64.rpm db48-utils-4.8.30-150000.7.6.1.aarch64.rpm libdb-4_8-4.8.30-150000.7.6.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4259 Security update for tiff important SUSE Updates openSUSE-Leap-Micro 5.3 This update for tiff fixes the following issues: - CVE-2022-3597: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204641). - CVE-2022-3599: Fixed out-of-bounds read in writeSingleSection in tools/tiffcrop.c (bnc#1204643). - CVE-2022-3626: Fixed out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (bnc#1204644) - CVE-2022-3627: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204645). - CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bnc#1205392). libtiff5-4.0.9-150000.45.19.1.x86_64.rpm tiff-4.0.9-150000.45.19.1.src.rpm libtiff5-4.0.9-150000.45.19.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4382 Recommended update for libnvme important SUSE Updates openSUSE-Leap-Micro 5.3 This update for libnvme fixes the following issues: libnvme: - Fix 'connect-all' failures when handling JSON configuration file (bsc#1205019) nvme-cli: - Honor JSON config file in 'connect-all' command (bsc#1203204 bsc#1203163) - Add 'show-topology' command (bsc#1200089) libnvme-1.0-150400.3.9.3.src.rpm libnvme1-1.0-150400.3.9.3.x86_64.rpm nvme-cli-2.0-150400.3.9.3.src.rpm nvme-cli-2.0-150400.3.9.3.x86_64.rpm libnvme1-1.0-150400.3.9.3.aarch64.rpm nvme-cli-2.0-150400.3.9.3.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4383 Recommended update for iputils important SUSE Updates openSUSE-Leap-Micro 5.3 This update for iputils fixes the following issues: - Fix occasional memory access violation when using `ping` (bsc#1203957) iputils-20211215-150400.3.3.2.src.rpm iputils-20211215-150400.3.3.2.x86_64.rpm iputils-20211215-150400.3.3.2.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4380 Feature update for ipset important SUSE Updates openSUSE-Leap-Micro 5.3 This update for ipset fixes the following issues: Version update from 6.36 to 7.15 (jsc#PED-2086): - Update needed to match kernel protocol version - Fix bug with 'ipset save -file <filename>' that wrongly produced empty files (bsc#1116432) - A new internal protocol version between the kernel and userspace is used. This is required in order to support two new functions and the extendend LIST operation, which makes possible to run ipset in every case entirely over netlink without the need to use getsockopt() - Allow specifying protocols by number - Enable memory accounting for ipset allocations - Fix argument parsing buffer overflow in ipset_parse_argv - Fix parsing the service names for ports - Fix memory accounting for hash types on resize - Fix rename concurrency with listing, which can result broken list/save results - Fix to list/save into file specified by option - Implement sorting for hash types in the ipset tool - Limit the maximum range of consecutive elements to add/delete - Support the '-exist' flag with the destroy command - For the full list of changes please consult the changelog at https://ipset.netfilter.org/changelog.html ipset-7.15-150400.12.3.2.src.rpm ipset-7.15-150400.12.3.2.x86_64.rpm libipset13-7.15-150400.12.3.2.x86_64.rpm ipset-7.15-150400.12.3.2.s390x.rpm libipset13-7.15-150400.12.3.2.s390x.rpm ipset-7.15-150400.12.3.2.ppc64le.rpm libipset13-7.15-150400.12.3.2.ppc64le.rpm ipset-7.15-150400.12.3.2.aarch64.rpm libipset13-7.15-150400.12.3.2.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4212 Recommended update for openssl-1_1 moderate SUSE Updates openSUSE-Leap-Micro 5.3 This update for openssl-1_1 fixes the following issues: - FIPS: Mark PBKDF2 with key shorter than 112 bits as non-approved (bsc#1190651) - FIPS: Consider RSA siggen/sigver with PKCS1 padding also approved (bsc#1190651) - FIPS: Return the correct indicator for a given EC group order bits (bsc#1190651) libopenssl-1_1-devel-1.1.1l-150400.7.16.1.x86_64.rpm libopenssl1_1-1.1.1l-150400.7.16.1.x86_64.rpm libopenssl1_1-hmac-1.1.1l-150400.7.16.1.x86_64.rpm openssl-1_1-1.1.1l-150400.7.16.1.src.rpm openssl-1_1-1.1.1l-150400.7.16.1.x86_64.rpm libopenssl-1_1-devel-1.1.1l-150400.7.16.1.aarch64.rpm libopenssl1_1-1.1.1l-150400.7.16.1.aarch64.rpm libopenssl1_1-hmac-1.1.1l-150400.7.16.1.aarch64.rpm openssl-1_1-1.1.1l-150400.7.16.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4209 Security update for libarchive low SUSE Updates openSUSE-Leap-Micro 5.3 This update for libarchive fixes the following issues: - CVE-2022-36227: Fixed potential NULL pointer dereference in __archive_write_allocate_filter() (bsc#1205629). libarchive-3.5.1-150400.3.12.1.src.rpm libarchive13-3.5.1-150400.3.12.1.x86_64.rpm libarchive13-3.5.1-150400.3.12.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4282 Security update for vim important SUSE Updates openSUSE-Leap-Micro 5.3 This update for vim fixes the following issues: Updated to version 9.0 with patch level 0814: - CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478). - CVE-2022-3234: Fixed heap-based buffer overflow (bsc#1203508). - CVE-2022-3235: Fixed use-after-free (bsc#1203509). - CVE-2022-3324: Fixed stack-based buffer overflow (bsc#1203820). - CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c (bsc#1204779). - CVE-2022-2982: Fixed use-after-free in qf_fill_buffer() (bsc#1203152). - CVE-2022-3296: Fixed stack out of bounds read in ex_finally() in ex_eval.c (bsc#1203796). - CVE-2022-3297: Fixed use-after-free in process_next_cpt_value() at insexpand.c (bsc#1203797). - CVE-2022-3099: Fixed use-after-free in ex_docmd.c (bsc#1203110). - CVE-2022-3134: Fixed use-after-free in do_tag() (bsc#1203194). - CVE-2022-3153: Fixed NULL pointer dereference (bsc#1203272). - CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank() in eval.c (bsc#1203799). - CVE-2022-3352: Fixed use-after-free (bsc#1203924). - CVE-2022-2980: Fixed NULL pointer dereference in do_mouse() (bsc#1203155). - CVE-2022-3037: Fixed use-after-free (bsc#1202962). vim-9.0.0814-150000.5.28.1.src.rpm vim-data-common-9.0.0814-150000.5.28.1.noarch.rpm vim-small-9.0.0814-150000.5.28.1.x86_64.rpm vim-small-9.0.0814-150000.5.28.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4311 Recommended update for open-vm-tools critical SUSE Updates openSUSE-Leap-Micro 5.3 This update for open-vm-tools fixes the following issues: - Include binaries of open-vm-tools for ARM architecture aarch64 in SUSE Linux Enterprise 15 Service Pack 4 (jsc#SLE-22385) libvmtools0-12.1.0-150300.21.2.x86_64.rpm open-vm-tools-12.1.0-150300.21.2.src.rpm open-vm-tools-12.1.0-150300.21.2.x86_64.rpm openSUSE-Leap-Micro-5.3-2022-4411 Security update for tiff important SUSE Updates openSUSE-Leap-Micro 5.3 This update for tiff fixes the following issues: - CVE-2022-3570: Fixed heap buffer overflows in tiffcrop.c (bsc#1205422). - CVE-2022-3598: Fixed out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c [bsc#1204642] libtiff5-4.0.9-150000.45.22.1.x86_64.rpm tiff-4.0.9-150000.45.22.1.src.rpm libtiff5-4.0.9-150000.45.22.1.aarch64.rpm openSUSE-Leap-Micro-5.3-2022-4367 Recommended update for cloud-regionsrv-client critical SUSE Updates openSUSE-Leap-Micro 5.3 This update for cloud-regionsrv-client fixes the following issues: - Update to version 10.0.7 (bsc#1191880, bsc#1195925, bsc#1195924) - Implement functionality to detect if an update server has a new cert. Import the new cert when it is detected. - From 10.0.6 (bsc#1205089) - Credentials are equal when username and password are the same ignore other entries in the credentials file - Handle multiple zypper names in process table, zypper and Zypp-main to properly detect the running process - Require dmidecode only on supported archs (bsc#1206082) cloud-regionsrv-client-10.0.7-150000.6.83.2.noarch.rpm cloud-regionsrv-client-10.0.7-150000.6.83.2.src.rpm cloud-regionsrv-client-addon-azure-1.0.5-150000.6.83.2.noarch.rpm cloud-regionsrv-client-generic-config-1.0.0-150000.6.83.2.noarch.rpm cloud-regionsrv-client-plugin-azure-2.0.0-150000.6.83.2.noarch.rpm cloud-regionsrv-client-plugin-ec2-1.0.2-150000.6.83.2.noarch.rpm cloud-regionsrv-client-plugin-gce-1.0.0-150000.6.83.2.noarch.rpm