openSUSE-SLE-15.4-2022-19 Feature update for ghostscript and gswrap moderate SUSE Updates openSUSE-SLE 15.4 This update for ghostscript, gswrap fixes the following issues: We now ship an additional wraper for ghostscript, called gswrap, for SLE 15 SP2 and SLE15 SP3. You can install this wrapper by installing the gswrap package. - Allow the `gswrap` package to use its wrapper script for `ghostscript` (jsc#SLE-21705 jsc#SLE-21706) - Use `update-alternatives` to get the real `ghostscript` binary from `/usr/bin/gs` to `/usr/bin/gs.bin` ghostscript-9.52-158.1.src.rpm ghostscript-9.52-158.1.x86_64.rpm ghostscript-devel-9.52-158.1.x86_64.rpm ghostscript-x11-9.52-158.1.x86_64.rpm ghostscript-9.52-158.1.s390x.rpm ghostscript-devel-9.52-158.1.s390x.rpm ghostscript-x11-9.52-158.1.s390x.rpm ghostscript-9.52-158.1.ppc64le.rpm ghostscript-devel-9.52-158.1.ppc64le.rpm ghostscript-x11-9.52-158.1.ppc64le.rpm ghostscript-9.52-158.1.aarch64.rpm ghostscript-devel-9.52-158.1.aarch64.rpm ghostscript-x11-9.52-158.1.aarch64.rpm openSUSE-SLE-15.4-2022-143 Recommended update for java-11-openjdk moderate SUSE Updates openSUSE-SLE 15.4 This update for java-11-openjdk fixes the following issues: - Java Cryptography was always operating in FIPS mode if crypto-policies was not used. - Allow plain key import in fips mode unless "com.suse.fips.plainKeySupport" is set to false java-11-openjdk-11.0.13.0-3.68.1.src.rpm java-11-openjdk-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-accessibility-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-demo-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-devel-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-headless-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-javadoc-11.0.13.0-3.68.1.noarch.rpm java-11-openjdk-jmods-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-src-11.0.13.0-3.68.1.x86_64.rpm java-11-openjdk-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-accessibility-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-demo-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-devel-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-headless-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-jmods-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-src-11.0.13.0-3.68.1.s390x.rpm java-11-openjdk-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-accessibility-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-demo-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-devel-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-headless-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-jmods-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-src-11.0.13.0-3.68.1.ppc64le.rpm java-11-openjdk-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-accessibility-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-demo-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-devel-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-headless-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-jmods-11.0.13.0-3.68.1.aarch64.rpm java-11-openjdk-src-11.0.13.0-3.68.1.aarch64.rpm openSUSE-SLE-15.4-2022-157 Security update for zxing-cpp important SUSE Updates openSUSE-SLE 15.4 This update for zxing-cpp fixes the following issues: - CVE-2021-28021: Fixed buffer overflow vulnerability in function stbi__extend_receive in stb_image.h via a crafted JPEG file. (bsc#1191743). - CVE-2021-42715: Fixed buffer overflow in stb_image PNM loader (bsc#1191942). - CVE-2021-42716: Fixed denial of service in stb_image HDR loader when reading crafted HDR files (bsc#1191944). libZXing1-1.2.0-9.7.1.x86_64.rpm libZXing1-32bit-1.2.0-9.7.1.x86_64.rpm zxing-cpp-1.2.0-9.7.1.src.rpm zxing-cpp-devel-1.2.0-9.7.1.x86_64.rpm libZXing1-1.2.0-9.7.1.s390x.rpm zxing-cpp-devel-1.2.0-9.7.1.s390x.rpm libZXing1-1.2.0-9.7.1.ppc64le.rpm zxing-cpp-devel-1.2.0-9.7.1.ppc64le.rpm libZXing1-1.2.0-9.7.1.aarch64.rpm zxing-cpp-devel-1.2.0-9.7.1.aarch64.rpm openSUSE-SLE-15.4-2022-176 Security update for unbound important SUSE Updates openSUSE-SLE 15.4 This update for unbound fixes the following issues: - CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382). - CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383). - CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384). - CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385). - CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386). - CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387). - CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388). - CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389). - CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390). - CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391). - CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392). - CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393). - CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191). libunbound2-1.6.8-10.6.1.x86_64.rpm unbound-1.6.8-10.6.1.src.rpm unbound-1.6.8-10.6.1.x86_64.rpm unbound-anchor-1.6.8-10.6.1.x86_64.rpm unbound-devel-1.6.8-10.6.1.x86_64.rpm unbound-munin-1.6.8-10.6.1.noarch.rpm unbound-python-1.6.8-10.6.1.x86_64.rpm libunbound2-1.6.8-10.6.1.s390x.rpm unbound-1.6.8-10.6.1.s390x.rpm unbound-anchor-1.6.8-10.6.1.s390x.rpm unbound-devel-1.6.8-10.6.1.s390x.rpm unbound-python-1.6.8-10.6.1.s390x.rpm libunbound2-1.6.8-10.6.1.ppc64le.rpm unbound-1.6.8-10.6.1.ppc64le.rpm unbound-anchor-1.6.8-10.6.1.ppc64le.rpm unbound-devel-1.6.8-10.6.1.ppc64le.rpm unbound-python-1.6.8-10.6.1.ppc64le.rpm libunbound2-1.6.8-10.6.1.aarch64.rpm unbound-1.6.8-10.6.1.aarch64.rpm unbound-anchor-1.6.8-10.6.1.aarch64.rpm unbound-devel-1.6.8-10.6.1.aarch64.rpm unbound-python-1.6.8-10.6.1.aarch64.rpm