openSUSE-Leap-Micro-5.3-2022-4081
Security update for dpkg
low
SUSE Updates openSUSE-Leap-Micro 5.3
This update for dpkg fixes the following issues:
- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).
update-alternatives-1.19.0.4-150000.4.4.1.src.rpm
update-alternatives-1.19.0.4-150000.4.4.1.x86_64.rpm
update-alternatives-1.19.0.4-150000.4.4.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4226
Recommended update for suseconnect-ng
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for suseconnect-ng fixes the following issues:
- Fix System-Token support in ruby binding (bsc#1203341)
- Use system-wide proxy settings (bsc#1200994)
- Add timer for SUSEConnect --keepalive (bsc#1196076)
- Added support for the System-Token header
- Add Keepalive command line option
- Print nested zypper errors (bsc#1200803)
- Fix migration json error with SMT (bsc#1198625)
- Packaging adjustments (bsc#1204821)
- Add option to run local scc tests
suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.src.rpm
suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.x86_64.rpm
suseconnect-ng-1.0.0~git0.faee7c196dc1-150400.3.7.3.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4256
Recommended update for gcc12
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for gcc12 fixes the following issues:
This update ship the GCC 12 compiler suite and its base libraries.
The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP3 and SP4, and provided in the "Development Tools" module.
The Go, D and Ada language compiler parts are available unsupported via the
PackageHub repositories.
To use gcc12 compilers use:
- install "gcc12" or "gcc12-c++" or one of the other "gcc12-COMPILER" frontend packages.
- override your Makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.
For a full changelog with all new GCC12 features, check out
https://gcc.gnu.org/gcc-12/changes.html
gcc12-12.2.1+git416-150000.1.5.1.src.rpm
libgcc_s1-12.2.1+git416-150000.1.5.1.x86_64.rpm
libstdc++6-12.2.1+git416-150000.1.5.1.x86_64.rpm
libgcc_s1-12.2.1+git416-150000.1.5.1.aarch64.rpm
libstdc++6-12.2.1+git416-150000.1.5.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4262
Recommended update for lvm2
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for lvm2 fixes the following issues:
- Fix terminated lvmlockd not clearing/adopting locks, leading to inability to start volume group (bsc#1203216)
- Fix device-mapper rpm package versioning to prevent migration issues (bsc#1199074)
- Fix lvmlockd to support sanlock (bsc#1203482)
device-mapper-2.03.05_1.02.163-150400.185.1.x86_64.rpm
libdevmapper-event1_03-2.03.05_1.02.163-150400.185.1.x86_64.rpm
libdevmapper1_03-2.03.05_1.02.163-150400.185.1.x86_64.rpm
liblvm2cmd2_03-2.03.05-150400.185.1.x86_64.rpm
lvm2-2.03.05-150400.185.1.src.rpm
lvm2-2.03.05-150400.185.1.x86_64.rpm
lvm2-device-mapper-2.03.05-150400.185.1.src.rpm
device-mapper-2.03.05_1.02.163-150400.185.1.aarch64.rpm
libdevmapper-event1_03-2.03.05_1.02.163-150400.185.1.aarch64.rpm
libdevmapper1_03-2.03.05_1.02.163-150400.185.1.aarch64.rpm
liblvm2cmd2_03-2.03.05-150400.185.1.aarch64.rpm
lvm2-2.03.05-150400.185.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4281
Security update for python3
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for python3 fixes the following issues:
- CVE-2022-37454: Fixed a buffer overflow in hashlib.sha3_* implementations. (bsc#1204577)
- CVE-2020-10735: Fixed a bug to limit amount of digits converting text to int and vice vera. (bsc#1203125)
The following non-security bug was fixed:
- Fixed a crash in the garbage collection (bsc#1188607).
libpython3_6m1_0-3.6.15-150300.10.37.2.x86_64.rpm
python3-3.6.15-150300.10.37.2.src.rpm
python3-3.6.15-150300.10.37.2.x86_64.rpm
python3-base-3.6.15-150300.10.37.2.x86_64.rpm
python3-core-3.6.15-150300.10.37.2.src.rpm
libpython3_6m1_0-3.6.15-150300.10.37.2.aarch64.rpm
python3-3.6.15-150300.10.37.2.aarch64.rpm
python3-base-3.6.15-150300.10.37.2.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4312
Recommended update for tar
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for tar fixes the following issues:
- Fix unexpected inconsistency when making directory (bsc#1203600)
- Update race condition fix (bsc#1200657)
tar-1.34-150000.3.22.3.src.rpm
tar-1.34-150000.3.22.3.x86_64.rpm
tar-1.34-150000.3.22.3.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4153
Security update for krb5
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for krb5 fixes the following issues:
- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
krb5-1.19.2-150400.3.3.1.src.rpm
krb5-1.19.2-150400.3.3.1.x86_64.rpm
krb5-1.19.2-150400.3.3.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4206
Security update for pixman
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for pixman fixes the following issues:
- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
libpixman-1-0-0.40.0-150400.3.3.1.x86_64.rpm
pixman-0.40.0-150400.3.3.1.src.rpm
libpixman-1-0-0.40.0-150400.3.3.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4141
Security update for grub2
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for grub2 fixes the following issues:
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
Other:
- Bump upstream SBAT generation to 3
grub2-2.06-150400.11.17.1.src.rpm
grub2-2.06-150400.11.17.1.x86_64.rpm
grub2-i386-pc-2.06-150400.11.17.1.noarch.rpm
grub2-snapper-plugin-2.06-150400.11.17.1.noarch.rpm
grub2-x86_64-efi-2.06-150400.11.17.1.noarch.rpm
grub2-x86_64-xen-2.06-150400.11.17.1.noarch.rpm
grub2-2.06-150400.11.17.1.aarch64.rpm
grub2-arm64-efi-2.06-150400.11.17.1.noarch.rpm
openSUSE-Leap-Micro-5.3-2022-4278
Security update for supportutils
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for supportutils fixes the following issues:
Security issues fixed:
- Passwords correctly removed from email.txt, updates.txt and fs-iscsi.txt (bsc#1203818)
Bug fixes:
- Added lifecycle information
- Fixed KVM virtualization detection on bare metal (bsc#1184689)
- Added logging using journalctl (bsc#1200330)
- Get current sar data before collecting files (bsc#1192648)
- Collects everything in /etc/multipath/ (bsc#1192252)
- Collects power management information in hardware.txt (bsc#1197428)
- Checks for suseconnect-ng or SUSEConnect packages (bsc#1202337)
- Fixed conf_files and conf_text_files so y2log is gathered (bsc#1202269)
- Update to nvme_info and block_info (bsc#1202417)
- Added includedir directories from /etc/sudoers (bsc#1188086)
supportutils-3.1.21-150300.7.35.15.1.noarch.rpm
supportutils-3.1.21-150300.7.35.15.1.src.rpm
openSUSE-Leap-Micro-5.3-2022-4147
Security update for kubevirt stack
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update provides rebuilds of the kubevirt containers with up to date base images,
fixing various security issues.
kubevirt-0.54.0-150400.3.7.1.src.rpm
kubevirt-manifests-0.54.0-150400.3.7.1.x86_64.rpm
kubevirt-virtctl-0.54.0-150400.3.7.1.x86_64.rpm
openSUSE-Leap-Micro-5.3-2022-4138
Recommended update for python-msgpack
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for python-msgpack fixes the following issues:
- Fix build failures on SUSE Linux Enterprise 15 Service Pack 5 (bsc#1203743)
python-msgpack-0.5.6-150100.3.3.1.src.rpm
python3-msgpack-0.5.6-150100.3.3.1.x86_64.rpm
python3-msgpack-0.5.6-150100.3.3.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4191
Security update for containerized-data-importer
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update rebuilds the current containeried data importer images against
current base images, to fix security issues.
containerized-data-importer-1.51.0-150400.4.7.1.src.rpm
containerized-data-importer-manifests-1.51.0-150400.4.7.1.x86_64.rpm
openSUSE-Leap-Micro-5.3-2022-4328
Recommended update for audit-secondary
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for audit-secondary fixes the following issues:
- Fix rules not loaded when restarting auditd.service (bsc#1204844)
audit-3.0.6-150400.4.6.1.x86_64.rpm
audit-audispd-plugins-3.0.6-150400.4.6.1.x86_64.rpm
audit-secondary-3.0.6-150400.4.6.1.src.rpm
python3-audit-3.0.6-150400.4.6.1.x86_64.rpm
system-group-audit-3.0.6-150400.4.6.1.x86_64.rpm
audit-3.0.6-150400.4.6.1.aarch64.rpm
audit-audispd-plugins-3.0.6-150400.4.6.1.aarch64.rpm
python3-audit-3.0.6-150400.4.6.1.aarch64.rpm
system-group-audit-3.0.6-150400.4.6.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4214
Security update for libdb-4_8
low
SUSE Updates openSUSE-Leap-Micro 5.3
This update for libdb-4_8 fixes the following issues:
- CVE-2019-2708: Fixed partial DoS due to data store execution (bsc#1174414).
db48-utils-4.8.30-150000.7.6.1.x86_64.rpm
libdb-4_8-4.8.30-150000.7.6.1.src.rpm
libdb-4_8-4.8.30-150000.7.6.1.x86_64.rpm
db48-utils-4.8.30-150000.7.6.1.aarch64.rpm
libdb-4_8-4.8.30-150000.7.6.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4259
Security update for tiff
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for tiff fixes the following issues:
- CVE-2022-3597: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204641).
- CVE-2022-3599: Fixed out-of-bounds read in writeSingleSection in tools/tiffcrop.c (bnc#1204643).
- CVE-2022-3626: Fixed out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (bnc#1204644)
- CVE-2022-3627: Fixed out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (bnc#1204645).
- CVE-2022-3970: Fixed unsigned integer overflow in TIFFReadRGBATileExt() (bnc#1205392).
libtiff5-4.0.9-150000.45.19.1.x86_64.rpm
tiff-4.0.9-150000.45.19.1.src.rpm
libtiff5-4.0.9-150000.45.19.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4382
Recommended update for libnvme
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for libnvme fixes the following issues:
libnvme:
- Fix 'connect-all' failures when handling JSON configuration file (bsc#1205019)
nvme-cli:
- Honor JSON config file in 'connect-all' command (bsc#1203204 bsc#1203163)
- Add 'show-topology' command (bsc#1200089)
libnvme-1.0-150400.3.9.3.src.rpm
libnvme1-1.0-150400.3.9.3.x86_64.rpm
nvme-cli-2.0-150400.3.9.3.src.rpm
nvme-cli-2.0-150400.3.9.3.x86_64.rpm
libnvme1-1.0-150400.3.9.3.aarch64.rpm
nvme-cli-2.0-150400.3.9.3.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4383
Recommended update for iputils
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for iputils fixes the following issues:
- Fix occasional memory access violation when using `ping` (bsc#1203957)
iputils-20211215-150400.3.3.2.src.rpm
iputils-20211215-150400.3.3.2.x86_64.rpm
iputils-20211215-150400.3.3.2.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4380
Feature update for ipset
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for ipset fixes the following issues:
Version update from 6.36 to 7.15 (jsc#PED-2086):
- Update needed to match kernel protocol version
- Fix bug with 'ipset save -file <filename>' that wrongly produced empty files (bsc#1116432)
- A new internal protocol version between the kernel and userspace is used. This is required in order to support two
new functions and the extendend LIST operation, which makes possible to run ipset in every case entirely over netlink
without the need to use getsockopt()
- Allow specifying protocols by number
- Enable memory accounting for ipset allocations
- Fix argument parsing buffer overflow in ipset_parse_argv
- Fix parsing the service names for ports
- Fix memory accounting for hash types on resize
- Fix rename concurrency with listing, which can result broken list/save results
- Fix to list/save into file specified by option
- Implement sorting for hash types in the ipset tool
- Limit the maximum range of consecutive elements to add/delete
- Support the '-exist' flag with the destroy command
- For the full list of changes please consult the changelog at https://ipset.netfilter.org/changelog.html
ipset-7.15-150400.12.3.2.src.rpm
ipset-7.15-150400.12.3.2.x86_64.rpm
libipset13-7.15-150400.12.3.2.x86_64.rpm
ipset-7.15-150400.12.3.2.s390x.rpm
libipset13-7.15-150400.12.3.2.s390x.rpm
ipset-7.15-150400.12.3.2.ppc64le.rpm
libipset13-7.15-150400.12.3.2.ppc64le.rpm
ipset-7.15-150400.12.3.2.aarch64.rpm
libipset13-7.15-150400.12.3.2.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4212
Recommended update for openssl-1_1
moderate
SUSE Updates openSUSE-Leap-Micro 5.3
This update for openssl-1_1 fixes the following issues:
- FIPS: Mark PBKDF2 with key shorter than 112 bits as non-approved (bsc#1190651)
- FIPS: Consider RSA siggen/sigver with PKCS1 padding also approved (bsc#1190651)
- FIPS: Return the correct indicator for a given EC group order bits (bsc#1190651)
libopenssl-1_1-devel-1.1.1l-150400.7.16.1.x86_64.rpm
libopenssl1_1-1.1.1l-150400.7.16.1.x86_64.rpm
libopenssl1_1-hmac-1.1.1l-150400.7.16.1.x86_64.rpm
openssl-1_1-1.1.1l-150400.7.16.1.src.rpm
openssl-1_1-1.1.1l-150400.7.16.1.x86_64.rpm
libopenssl-1_1-devel-1.1.1l-150400.7.16.1.aarch64.rpm
libopenssl1_1-1.1.1l-150400.7.16.1.aarch64.rpm
libopenssl1_1-hmac-1.1.1l-150400.7.16.1.aarch64.rpm
openssl-1_1-1.1.1l-150400.7.16.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4209
Security update for libarchive
low
SUSE Updates openSUSE-Leap-Micro 5.3
This update for libarchive fixes the following issues:
- CVE-2022-36227: Fixed potential NULL pointer dereference in __archive_write_allocate_filter() (bsc#1205629).
libarchive-3.5.1-150400.3.12.1.src.rpm
libarchive13-3.5.1-150400.3.12.1.x86_64.rpm
libarchive13-3.5.1-150400.3.12.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4282
Security update for vim
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 0814:
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2022-3234: Fixed heap-based buffer overflow (bsc#1203508).
- CVE-2022-3235: Fixed use-after-free (bsc#1203509).
- CVE-2022-3324: Fixed stack-based buffer overflow (bsc#1203820).
- CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c (bsc#1204779).
- CVE-2022-2982: Fixed use-after-free in qf_fill_buffer() (bsc#1203152).
- CVE-2022-3296: Fixed stack out of bounds read in ex_finally() in ex_eval.c (bsc#1203796).
- CVE-2022-3297: Fixed use-after-free in process_next_cpt_value() at insexpand.c (bsc#1203797).
- CVE-2022-3099: Fixed use-after-free in ex_docmd.c (bsc#1203110).
- CVE-2022-3134: Fixed use-after-free in do_tag() (bsc#1203194).
- CVE-2022-3153: Fixed NULL pointer dereference (bsc#1203272).
- CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank() in eval.c (bsc#1203799).
- CVE-2022-3352: Fixed use-after-free (bsc#1203924).
- CVE-2022-2980: Fixed NULL pointer dereference in do_mouse() (bsc#1203155).
- CVE-2022-3037: Fixed use-after-free (bsc#1202962).
vim-9.0.0814-150000.5.28.1.src.rpm
vim-data-common-9.0.0814-150000.5.28.1.noarch.rpm
vim-small-9.0.0814-150000.5.28.1.x86_64.rpm
vim-small-9.0.0814-150000.5.28.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4311
Recommended update for open-vm-tools
critical
SUSE Updates openSUSE-Leap-Micro 5.3
This update for open-vm-tools fixes the following issues:
- Include binaries of open-vm-tools for ARM architecture aarch64 in SUSE Linux Enterprise 15 Service Pack 4
(jsc#SLE-22385)
libvmtools0-12.1.0-150300.21.2.x86_64.rpm
open-vm-tools-12.1.0-150300.21.2.src.rpm
open-vm-tools-12.1.0-150300.21.2.x86_64.rpm
openSUSE-Leap-Micro-5.3-2022-4411
Security update for tiff
important
SUSE Updates openSUSE-Leap-Micro 5.3
This update for tiff fixes the following issues:
- CVE-2022-3570: Fixed heap buffer overflows in tiffcrop.c (bsc#1205422).
- CVE-2022-3598: Fixed out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c [bsc#1204642]
libtiff5-4.0.9-150000.45.22.1.x86_64.rpm
tiff-4.0.9-150000.45.22.1.src.rpm
libtiff5-4.0.9-150000.45.22.1.aarch64.rpm
openSUSE-Leap-Micro-5.3-2022-4367
Recommended update for cloud-regionsrv-client
critical
SUSE Updates openSUSE-Leap-Micro 5.3
This update for cloud-regionsrv-client fixes the following issues:
- Update to version 10.0.7 (bsc#1191880, bsc#1195925, bsc#1195924)
- Implement functionality to detect if an update server has a new cert.
Import the new cert when it is detected.
- From 10.0.6 (bsc#1205089)
- Credentials are equal when username and password are the same ignore
other entries in the credentials file
- Handle multiple zypper names in process table, zypper and Zypp-main
to properly detect the running process
- Require dmidecode only on supported archs (bsc#1206082)
cloud-regionsrv-client-10.0.7-150000.6.83.2.noarch.rpm
cloud-regionsrv-client-10.0.7-150000.6.83.2.src.rpm
cloud-regionsrv-client-addon-azure-1.0.5-150000.6.83.2.noarch.rpm
cloud-regionsrv-client-generic-config-1.0.0-150000.6.83.2.noarch.rpm
cloud-regionsrv-client-plugin-azure-2.0.0-150000.6.83.2.noarch.rpm
cloud-regionsrv-client-plugin-ec2-1.0.2-150000.6.83.2.noarch.rpm
cloud-regionsrv-client-plugin-gce-1.0.0-150000.6.83.2.noarch.rpm