SUSE 5171 Published by

The following security updates are available for openSUSE Leap and SUSE Linux Enterprise:

SUSE-SU-2024:2627-1: moderate: Security update for ghostscript
SUSE-SU-2024:2619-1: important: Security update for libgit2
SUSE-SU-2024:2631-1: important: Security update for freerdp
SUSE-SU-2024:2625-1: important: Security update for p7zip
SUSE-SU-2024:2635-1: important: Security update for openssl-3
SUSE-SU-2024:2638-1: moderate: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadprox ...
SUSE-SU-2024:2633-1: important: Security update for gtk3
SUSE-SU-2024:2639-1: moderate: Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-containe ...




SUSE-SU-2024:2627-1: moderate: Security update for ghostscript


# Security update for ghostscript

Announcement ID: SUSE-SU-2024:2627-1
Rating: moderate
References:

* bsc#1227380

Cross-References:

* CVE-2024-29508

CVSS scores:

* CVE-2024-29508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for ghostscript fixes the following issues:

* CVE-2024-29508: Fixed heap pointer leak in pdf_base_font_alloc (bsc#1227380)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2627=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2627=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2627=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2627=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.197.1
* ghostscript-debuginfo-9.52-150000.197.1
* ghostscript-debugsource-9.52-150000.197.1
* ghostscript-devel-9.52-150000.197.1
* ghostscript-x11-9.52-150000.197.1
* ghostscript-x11-debuginfo-9.52-150000.197.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.197.1
* ghostscript-debuginfo-9.52-150000.197.1
* ghostscript-debugsource-9.52-150000.197.1
* ghostscript-devel-9.52-150000.197.1
* ghostscript-x11-9.52-150000.197.1
* ghostscript-x11-debuginfo-9.52-150000.197.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.197.1
* ghostscript-debuginfo-9.52-150000.197.1
* ghostscript-debugsource-9.52-150000.197.1
* ghostscript-devel-9.52-150000.197.1
* ghostscript-x11-9.52-150000.197.1
* ghostscript-x11-debuginfo-9.52-150000.197.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* ghostscript-9.52-150000.197.1
* ghostscript-debuginfo-9.52-150000.197.1
* ghostscript-debugsource-9.52-150000.197.1
* ghostscript-devel-9.52-150000.197.1
* ghostscript-x11-9.52-150000.197.1
* ghostscript-x11-debuginfo-9.52-150000.197.1

## References:

* https://www.suse.com/security/cve/CVE-2024-29508.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227380



SUSE-SU-2024:2619-1: important: Security update for libgit2


# Security update for libgit2

Announcement ID: SUSE-SU-2024:2619-1
Rating: important
References:

* bsc#1219660

Cross-References:

* CVE-2024-24577

CVSS scores:

* CVE-2024-24577 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2024-24577 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Development Tools Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for libgit2 fixes the following issues:

* CVE-2024-24577: Fixed arbitrary code execution due to heap corruption in
git_index_add (bsc#1219660)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-2619=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2619=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-2619=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2619=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2619=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2619=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2619=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2619=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* libgit2-1_3-32bit-debuginfo-1.3.0-150400.3.9.1
* libgit2-1_3-32bit-1.3.0-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgit2-1_3-64bit-debuginfo-1.3.0-150400.3.9.1
* libgit2-1_3-64bit-1.3.0-150400.3.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* openSUSE Leap 15.5 (x86_64)
* libgit2-1_3-32bit-debuginfo-1.3.0-150400.3.9.1
* libgit2-1_3-32bit-1.3.0-150400.3.9.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libgit2-devel-1.3.0-150400.3.9.1
* libgit2-1_3-1.3.0-150400.3.9.1
* libgit2-1_3-debuginfo-1.3.0-150400.3.9.1
* libgit2-debugsource-1.3.0-150400.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2024-24577.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219660



SUSE-SU-2024:2631-1: important: Security update for freerdp


# Security update for freerdp

Announcement ID: SUSE-SU-2024:2631-1
Rating: important
References:

* bsc#1219049
* bsc#1223346
* bsc#1223347
* bsc#1223348
* bsc#1223353

Cross-References:

* CVE-2024-22211
* CVE-2024-32658
* CVE-2024-32659
* CVE-2024-32660
* CVE-2024-32661

CVSS scores:

* CVE-2024-22211 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-22211 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-32658 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-32659 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2024-32660 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-32661 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves five vulnerabilities can now be installed.

## Description:

This update for freerdp fixes the following issues:

* CVE-2024-22211: Fixed integer overflow in
`freerdp_bitmap_planar_context_reset` that could lead to heap-buffer
overflow (bsc#1219049)
* CVE-2024-32658: Fixed out-of-bounds read in Interleaved RLE Bitmap Codec in
FreeRDP based clients (bsc#1223353)
* CVE-2024-32659: Fixed out-of-bounds read if `((nWidth == 0) and (nHeight ==
0))` (bsc#1223346)
* CVE-2024-32660: Fixed client crash via invalid huge allocation size
(bsc#1223347)
* CVE-2024-32661: Fixed client NULL pointer dereference (bsc#1223348)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2631=1 openSUSE-SLE-15.6-2024-2631=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2631=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-2631=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwinpr2-2-debuginfo-2.11.2-150600.4.3.1
* freerdp-2.11.2-150600.4.3.1
* freerdp-debuginfo-2.11.2-150600.4.3.1
* freerdp-devel-2.11.2-150600.4.3.1
* freerdp-wayland-debuginfo-2.11.2-150600.4.3.1
* libuwac0-0-2.11.2-150600.4.3.1
* libwinpr2-2-2.11.2-150600.4.3.1
* freerdp-proxy-2.11.2-150600.4.3.1
* uwac0-0-devel-2.11.2-150600.4.3.1
* freerdp-server-2.11.2-150600.4.3.1
* libfreerdp2-2-debuginfo-2.11.2-150600.4.3.1
* winpr-devel-2.11.2-150600.4.3.1
* freerdp-server-debuginfo-2.11.2-150600.4.3.1
* freerdp-proxy-debuginfo-2.11.2-150600.4.3.1
* libuwac0-0-debuginfo-2.11.2-150600.4.3.1
* freerdp-wayland-2.11.2-150600.4.3.1
* libfreerdp2-2-2.11.2-150600.4.3.1
* freerdp-debugsource-2.11.2-150600.4.3.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* freerdp-2.11.2-150600.4.3.1
* freerdp-debuginfo-2.11.2-150600.4.3.1
* freerdp-devel-2.11.2-150600.4.3.1
* freerdp-wayland-debuginfo-2.11.2-150600.4.3.1
* libuwac0-0-2.11.2-150600.4.3.1
* uwac0-0-devel-2.11.2-150600.4.3.1
* freerdp-proxy-2.11.2-150600.4.3.1
* freerdp-server-2.11.2-150600.4.3.1
* freerdp-server-debuginfo-2.11.2-150600.4.3.1
* freerdp-proxy-debuginfo-2.11.2-150600.4.3.1
* libuwac0-0-debuginfo-2.11.2-150600.4.3.1
* freerdp-wayland-2.11.2-150600.4.3.1
* freerdp-debugsource-2.11.2-150600.4.3.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* libwinpr2-2-debuginfo-2.11.2-150600.4.3.1
* freerdp-2.11.2-150600.4.3.1
* freerdp-debuginfo-2.11.2-150600.4.3.1
* freerdp-devel-2.11.2-150600.4.3.1
* libwinpr2-2-2.11.2-150600.4.3.1
* freerdp-proxy-2.11.2-150600.4.3.1
* freerdp-server-2.11.2-150600.4.3.1
* libfreerdp2-2-debuginfo-2.11.2-150600.4.3.1
* winpr-devel-2.11.2-150600.4.3.1
* freerdp-server-debuginfo-2.11.2-150600.4.3.1
* freerdp-proxy-debuginfo-2.11.2-150600.4.3.1
* libfreerdp2-2-2.11.2-150600.4.3.1
* freerdp-debugsource-2.11.2-150600.4.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-22211.html
* https://www.suse.com/security/cve/CVE-2024-32658.html
* https://www.suse.com/security/cve/CVE-2024-32659.html
* https://www.suse.com/security/cve/CVE-2024-32660.html
* https://www.suse.com/security/cve/CVE-2024-32661.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219049
* https://bugzilla.suse.com/show_bug.cgi?id=1223346
* https://bugzilla.suse.com/show_bug.cgi?id=1223347
* https://bugzilla.suse.com/show_bug.cgi?id=1223348
* https://bugzilla.suse.com/show_bug.cgi?id=1223353



SUSE-SU-2024:2625-1: important: Security update for p7zip


# Security update for p7zip

Announcement ID: SUSE-SU-2024:2625-1
Rating: important
References:

* bsc#1227358
* bsc#1227359

Cross-References:

* CVE-2023-52168
* CVE-2023-52169

CVSS scores:

* CVE-2023-52168 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-52169 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* Basesystem Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for p7zip fixes the following issues:

* CVE-2023-52168: Fixed heap-based buffer overflow in the NTFS handler allows
two bytes to be overwritten at multiple offsets (bsc#1227358)
* CVE-2023-52169: Fixed out-of-bounds read in NTFS handler (bsc#1227359)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-2625=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-2625=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-2625=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2625=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2625=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2625=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-2625=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-2625=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-2625=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2625=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2625=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-2625=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2625=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2625=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-2625=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-2625=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-2625=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-2625=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-2625=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* openSUSE Leap 15.5 (noarch)
* p7zip-doc-16.02-150200.14.12.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* openSUSE Leap 15.6 (noarch)
* p7zip-doc-16.02-150200.14.12.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Manager Proxy 4.3 (x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* p7zip-full-16.02-150200.14.12.1
* p7zip-debugsource-16.02-150200.14.12.1
* p7zip-16.02-150200.14.12.1
* p7zip-full-debuginfo-16.02-150200.14.12.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52168.html
* https://www.suse.com/security/cve/CVE-2023-52169.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227358
* https://bugzilla.suse.com/show_bug.cgi?id=1227359



SUSE-SU-2024:2635-1: important: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2024:2635-1
Rating: important
References:

* bsc#1222899
* bsc#1223336
* bsc#1226463
* bsc#1227138

Cross-References:

* CVE-2024-5535

CVSS scores:

* CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability and has three security fixes can now be
installed.

## Description:

This update for openssl-3 fixes the following issues:

Security fixes:

* CVE-2024-5535: Fixed SSL_select_next_proto buffer overread (bsc#1227138)

Other fixes:

* Build with no-afalgeng (bsc#1226463)
* Build with enabled sm2 and sm4 support (bsc#1222899)
* Fix non-reproducibility issue (bsc#1223336)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2635=1 openSUSE-SLE-15.6-2024-2635=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2635=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-debuginfo-3.1.4-150600.5.10.1
* openssl-3-debugsource-3.1.4-150600.5.10.1
* openssl-3-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-3.1.4-150600.5.10.1
* openssl-3-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-devel-3.1.4-150600.5.10.1
* libopenssl3-3.1.4-150600.5.10.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl3-32bit-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.10.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.10.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.10.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.10.1
* libopenssl3-64bit-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.10.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-devel-64bit-3.1.4-150600.5.10.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libopenssl3-debuginfo-3.1.4-150600.5.10.1
* openssl-3-debugsource-3.1.4-150600.5.10.1
* openssl-3-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-3.1.4-150600.5.10.1
* openssl-3-debuginfo-3.1.4-150600.5.10.1
* libopenssl-3-devel-3.1.4-150600.5.10.1
* libopenssl3-3.1.4-150600.5.10.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.10.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.10.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.10.1
* libopenssl3-32bit-3.1.4-150600.5.10.1

## References:

* https://www.suse.com/security/cve/CVE-2024-5535.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222899
* https://bugzilla.suse.com/show_bug.cgi?id=1223336
* https://bugzilla.suse.com/show_bug.cgi?id=1226463
* https://bugzilla.suse.com/show_bug.cgi?id=1227138



SUSE-SU-2024:2638-1: moderate: Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadprox ...


# Security update for cdi-apiserver-container, cdi-cloner-container, cdi-
controller-container, cdi-importer-container, cdi-operator-container, cdi-
uploadproxy-container, cdi-uploadserver-container, cont

Announcement ID: SUSE-SU-2024:2638-1
Rating: moderate
References:

Affected Products:

* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that can now be installed.

## Description:

This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-
container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-
container, cdi-uploadserver-container, containerized-data-importer fixes the
following issues:

Update to version 1.59.0

* Release notes https://github.com/kubevirt/containerized-data-
importer/releases/tag/v1.59.0
* Release notes https://github.com/kubevirt/containerized-data-
importer/releases/tag/v1.58.1

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2638=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2638=1 openSUSE-SLE-15.6-2024-2638=1

## Package List:

* Containers Module 15-SP6 (x86_64)
* containerized-data-importer-manifests-1.59.0-150600.3.6.1
* openSUSE Leap 15.6 (x86_64)
* containerized-data-importer-cloner-1.59.0-150600.3.6.1
* containerized-data-importer-uploadserver-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-operator-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-controller-1.59.0-150600.3.6.1
* containerized-data-importer-operator-1.59.0-150600.3.6.1
* containerized-data-importer-uploadproxy-1.59.0-150600.3.6.1
* containerized-data-importer-uploadserver-1.59.0-150600.3.6.1
* containerized-data-importer-importer-1.59.0-150600.3.6.1
* obs-service-cdi_containers_meta-1.59.0-150600.3.6.1
* containerized-data-importer-manifests-1.59.0-150600.3.6.1
* containerized-data-importer-importer-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-uploadproxy-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-controller-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-api-1.59.0-150600.3.6.1
* containerized-data-importer-cloner-debuginfo-1.59.0-150600.3.6.1
* containerized-data-importer-api-debuginfo-1.59.0-150600.3.6.1



SUSE-SU-2024:2633-1: important: Security update for gtk3


# Security update for gtk3

Announcement ID: SUSE-SU-2024:2633-1
Rating: important
References:

* bsc#1228120

Cross-References:

* CVE-2024-6655

CVSS scores:

* CVE-2024-6655 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for gtk3 fixes the following issues:

* CVE-2024-6655: Fixed library injection from current working directory
(bsc#1228120)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2633=1 openSUSE-SLE-15.6-2024-2633=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-2633=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-2633=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* gtk3-lang-3.24.38+111-150600.3.3.1
* gtk3-devel-doc-3.24.38+111-150600.3.3.1
* gtk3-branding-upstream-3.24.38+111-150600.3.3.1
* gtk3-schema-3.24.38+111-150600.3.3.1
* gettext-its-gtk3-3.24.38+111-150600.3.3.1
* gtk3-data-3.24.38+111-150600.3.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Gtk-3_0-3.24.38+111-150600.3.3.1
* gtk3-immodule-thai-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-tools-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-3.24.38+111-150600.3.3.1
* gtk3-immodule-vietnamese-debuginfo-3.24.38+111-150600.3.3.1
* libgtk-3-0-3.24.38+111-150600.3.3.1
* gtk3-immodule-thai-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-vietnamese-3.24.38+111-150600.3.3.1
* gtk3-devel-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-broadway-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-3.24.38+111-150600.3.3.1
* gtk3-debugsource-3.24.38+111-150600.3.3.1
* gtk3-tools-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-devel-3.24.38+111-150600.3.3.1
* gtk3-immodule-broadway-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-debuginfo-3.24.38+111-150600.3.3.1
* libgtk-3-0-debuginfo-3.24.38+111-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* gtk3-immodule-vietnamese-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-thai-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-32bit-3.24.38+111-150600.3.3.1
* gtk3-devel-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-32bit-debuginfo-3.24.38+111-150600.3.3.1
* libgtk-3-0-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-devel-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-tools-32bit-debuginfo-3.24.38+111-150600.3.3.1
* libgtk-3-0-32bit-3.24.38+111-150600.3.3.1
* gtk3-tools-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-thai-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-32bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-vietnamese-32bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-32bit-debuginfo-3.24.38+111-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* gtk3-immodule-thai-64bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-vietnamese-64bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-64bit-3.24.38+111-150600.3.3.1
* gtk3-devel-64bit-3.24.38+111-150600.3.3.1
* gtk3-tools-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-thai-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-64bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-multipress-64bit-3.24.38+111-150600.3.3.1
* libgtk-3-0-64bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-inuktitut-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-tools-64bit-3.24.38+111-150600.3.3.1
* libgtk-3-0-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-vietnamese-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-64bit-3.24.38+111-150600.3.3.1
* gtk3-immodule-xim-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-amharic-64bit-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-immodule-tigrigna-64bit-3.24.38+111-150600.3.3.1
* gtk3-devel-64bit-debuginfo-3.24.38+111-150600.3.3.1
* Basesystem Module 15-SP6 (noarch)
* gtk3-lang-3.24.38+111-150600.3.3.1
* gtk3-schema-3.24.38+111-150600.3.3.1
* gtk3-data-3.24.38+111-150600.3.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libgtk-3-0-3.24.38+111-150600.3.3.1
* typelib-1_0-Gtk-3_0-3.24.38+111-150600.3.3.1
* gtk3-tools-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-debugsource-3.24.38+111-150600.3.3.1
* gtk3-devel-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-tools-3.24.38+111-150600.3.3.1
* libgtk-3-0-debuginfo-3.24.38+111-150600.3.3.1
* gtk3-devel-3.24.38+111-150600.3.3.1
* Desktop Applications Module 15-SP6 (noarch)
* gtk3-devel-doc-3.24.38+111-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-6655.html
* https://bugzilla.suse.com/show_bug.cgi?id=1228120



SUSE-SU-2024:2639-1: moderate: Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-containe ...


# Security update for kubevirt, virt-api-container, virt-controller-container,
virt-exportproxy-container, virt-exportserver-container, virt-handler-container,
virt-launcher-container, virt-libguestfs-t

Announcement ID: SUSE-SU-2024:2639-1
Rating: moderate
References:

Affected Products:

* Containers Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that can now be installed.

## Description:

This update for kubevirt, virt-api-container, virt-controller-container, virt-
exportproxy-container, virt-exportserver-container, virt-handler-container,
virt-launcher-container, virt-libguestfs-tools-container, virt-operator-
container, virt-pr-helper-container fixes the following issues:

* Update to version 1.2.2

Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.2 Release
notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.1 Release notes
https://github.com/kubevirt/kubevirt/releases/tag/v1.2.0

* Use predefined configuration files for libvirt
* Install psmisc (provides killall for tests)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-2639=1 openSUSE-SLE-15.6-2024-2639=1

* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2024-2639=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* kubevirt-tests-1.2.2-150600.5.6.1
* kubevirt-virt-api-1.2.2-150600.5.6.1
* kubevirt-container-disk-1.2.2-150600.5.6.1
* kubevirt-virt-exportproxy-1.2.2-150600.5.6.1
* kubevirt-virt-exportserver-1.2.2-150600.5.6.1
* kubevirt-pr-helper-conf-1.2.2-150600.5.6.1
* kubevirt-virt-api-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-launcher-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-launcher-1.2.2-150600.5.6.1
* kubevirt-virt-handler-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-controller-1.2.2-150600.5.6.1
* kubevirt-virt-handler-1.2.2-150600.5.6.1
* kubevirt-virt-exportproxy-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-controller-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-operator-1.2.2-150600.5.6.1
* kubevirt-virt-operator-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virt-exportserver-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virtctl-debuginfo-1.2.2-150600.5.6.1
* kubevirt-container-disk-debuginfo-1.2.2-150600.5.6.1
* kubevirt-tests-debuginfo-1.2.2-150600.5.6.1
* kubevirt-virtctl-1.2.2-150600.5.6.1
* obs-service-kubevirt_containers_meta-1.2.2-150600.5.6.1
* kubevirt-manifests-1.2.2-150600.5.6.1
* Containers Module 15-SP6 (x86_64)
* kubevirt-virtctl-1.2.2-150600.5.6.1
* kubevirt-manifests-1.2.2-150600.5.6.1
* kubevirt-virtctl-debuginfo-1.2.2-150600.5.6.1