SUSE 5168 Published by

SUSE Linux has announced the release of multiple security updates, which include Linux Kernel, as well as updates for Python, OpenSSL, and Mozilla Firefox:

SUSE-SU-2024:3884-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)
SUSE-SU-2024:3880-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)
SUSE-SU-2024:3881-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
SUSE-SU-2024:3882-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
SUSE-SU-2024:3885-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)
openSUSE-SU-2024:14456-1: moderate: python312-3.12.7-2.1 on GA media
openSUSE-SU-2024:14455-1: moderate: python311-3.11.10-3.1 on GA media
SUSE-SU-2024:3905-1: moderate: Security update for openssl-1_1
SUSE-SU-2024:3898-1: important: Security update for MozillaFirefox




SUSE-SU-2024:3884-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)


# Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6)

Announcement ID: SUSE-SU-2024:3884-1
Release Date: 2024-11-04T07:03:37Z
Rating: important
References:

* bsc#1225819
* bsc#1228349
* bsc#1228786

Cross-References:

* CVE-2023-52752
* CVE-2024-40909
* CVE-2024-40954

CVSS scores:

* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves three vulnerabilities can now be installed.

## Description:

This update for the Linux Kernel 6.4.0-150600_23_17 fixes several issues.

The following security issues were fixed:

* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3884=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3884=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_3-debugsource-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-4-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_17-default-4-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_3-debugsource-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-4-150600.13.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228786



SUSE-SU-2024:3880-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)


# Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6)

Announcement ID: SUSE-SU-2024:3880-1
Release Date: 2024-11-04T06:33:25Z
Rating: important
References:

* bsc#1225011
* bsc#1225012
* bsc#1225099
* bsc#1225309
* bsc#1225311
* bsc#1225312
* bsc#1225313
* bsc#1225739
* bsc#1225819
* bsc#1226325
* bsc#1226327
* bsc#1228786
* bsc#1231419

Cross-References:

* CVE-2023-52752
* CVE-2023-52846
* CVE-2024-35817
* CVE-2024-35861
* CVE-2024-35862
* CVE-2024-35863
* CVE-2024-35864
* CVE-2024-35867
* CVE-2024-35905
* CVE-2024-36899
* CVE-2024-36964
* CVE-2024-40954
* CVE-2024-42133

CVSS scores:

* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52846 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35862 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35863 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35864 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35867 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35905 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36964 ( SUSE ): 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 13 vulnerabilities can now be installed.

## Description:

This update for the Linux Kernel 6.4.0-150600_21 fixes several issues.

The following security issues were fixed:

* CVE-2024-35905: Fixed int overflow for stack access size (bsc#1226327).
* CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG
(bsc#1231419)
* CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break()
(bsc#1225011).
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()
(bsc#1225311).
* CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1225012).
* CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()
(bsc#1225309).
* CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect()
(bsc#1225312).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000
(bsc#1226325).
* CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame()
(bsc#1225099).
* CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1225313).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3880=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3880=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-6-150600.4.10.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-6-150600.4.10.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_21-default-6-150600.4.10.1
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-6-150600.4.10.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-6-150600.4.10.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2023-52846.html
* https://www.suse.com/security/cve/CVE-2024-35817.html
* https://www.suse.com/security/cve/CVE-2024-35861.html
* https://www.suse.com/security/cve/CVE-2024-35862.html
* https://www.suse.com/security/cve/CVE-2024-35863.html
* https://www.suse.com/security/cve/CVE-2024-35864.html
* https://www.suse.com/security/cve/CVE-2024-35867.html
* https://www.suse.com/security/cve/CVE-2024-35905.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-36964.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225011
* https://bugzilla.suse.com/show_bug.cgi?id=1225012
* https://bugzilla.suse.com/show_bug.cgi?id=1225099
* https://bugzilla.suse.com/show_bug.cgi?id=1225309
* https://bugzilla.suse.com/show_bug.cgi?id=1225311
* https://bugzilla.suse.com/show_bug.cgi?id=1225312
* https://bugzilla.suse.com/show_bug.cgi?id=1225313
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1226325
* https://bugzilla.suse.com/show_bug.cgi?id=1226327
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1231419



SUSE-SU-2024:3881-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)


# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)

Announcement ID: SUSE-SU-2024:3881-1
Release Date: 2024-11-04T06:33:33Z
Rating: important
References:

* bsc#1225739
* bsc#1225819
* bsc#1228786
* bsc#1231419

Cross-References:

* CVE-2023-52752
* CVE-2024-36899
* CVE-2024-40954
* CVE-2024-42133

CVSS scores:

* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36899 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves four vulnerabilities can now be installed.

## Description:

This update for the Linux Kernel 6.4.0-150600_23_7 fixes several issues.

The following security issues were fixed:

* CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG
(bsc#1231419)
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify
(bsc#1225739).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3881=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3881=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-4-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-4-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-4-150600.13.6.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-4-150600.13.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-36899.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225739
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1231419



SUSE-SU-2024:3882-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)


# Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)

Announcement ID: SUSE-SU-2024:3882-1
Release Date: 2024-11-04T06:33:41Z
Rating: important
References:

* bsc#1225819
* bsc#1228349
* bsc#1228786
* bsc#1231419

Cross-References:

* CVE-2023-52752
* CVE-2024-40909
* CVE-2024-40954
* CVE-2024-42133

CVSS scores:

* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40954 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42133 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-42133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves four vulnerabilities can now be installed.

## Description:

This update for the Linux Kernel 6.4.0-150600_23_14 fixes several issues.

The following security issues were fixed:

* CVE-2024-42133: Bluetooth: Ignore too large handle values in BIG
(bsc#1231419)
* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).
* CVE-2024-40954: net: do not leave a dangling sk pointer, when socket
creation fails (bsc#1227808)
* CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free()
(bsc#1228349).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3882=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3882=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-4-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_14-default-4-150600.13.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://www.suse.com/security/cve/CVE-2024-40909.html
* https://www.suse.com/security/cve/CVE-2024-40954.html
* https://www.suse.com/security/cve/CVE-2024-42133.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225819
* https://bugzilla.suse.com/show_bug.cgi?id=1228349
* https://bugzilla.suse.com/show_bug.cgi?id=1228786
* https://bugzilla.suse.com/show_bug.cgi?id=1231419



SUSE-SU-2024:3885-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)


# Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)

Announcement ID: SUSE-SU-2024:3885-1
Release Date: 2024-11-04T07:03:47Z
Rating: important
References:

* bsc#1225819

Cross-References:

* CVE-2023-52752

CVSS scores:

* CVE-2023-52752 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for the Linux Kernel 6.4.0-150600_23_22 fixes one issue.

The following security issue was fixed:

* CVE-2023-52752: smb: client: fix use-after-free bug in
cifs_debug_data_proc_show() (bsc#1225819).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2024-3885=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3885=1

## Package List:

* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-2-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-2-150600.13.6.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-2-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_22-default-2-150600.13.6.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-2-150600.13.6.1

## References:

* https://www.suse.com/security/cve/CVE-2023-52752.html
* https://bugzilla.suse.com/show_bug.cgi?id=1225819



openSUSE-SU-2024:14456-1: moderate: python312-3.12.7-2.1 on GA media


# python312-3.12.7-2.1 on GA media

Announcement ID: openSUSE-SU-2024:14456-1
Rating: moderate

Cross-References:

* CVE-2024-9287

CVSS scores:

* CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python312-3.12.7-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python312 3.12.7-2.1
* python312-32bit 3.12.7-2.1
* python312-curses 3.12.7-2.1
* python312-dbm 3.12.7-2.1
* python312-idle 3.12.7-2.1
* python312-tk 3.12.7-2.1
* python312-x86-64-v3 3.12.7-2.1

## References:

* https://www.suse.com/security/cve/CVE-2024-9287.html



openSUSE-SU-2024:14455-1: moderate: python311-3.11.10-3.1 on GA media


# python311-3.11.10-3.1 on GA media

Announcement ID: openSUSE-SU-2024:14455-1
Rating: moderate

Cross-References:

* CVE-2024-9287

CVSS scores:

* CVE-2024-9287 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-9287 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-3.11.10-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311 3.11.10-3.1
* python311-32bit 3.11.10-3.1
* python311-curses 3.11.10-3.1
* python311-dbm 3.11.10-3.1
* python311-idle 3.11.10-3.1
* python311-tk 3.11.10-3.1
* python311-x86-64-v3 3.11.10-3.1

## References:

* https://www.suse.com/security/cve/CVE-2024-9287.html



SUSE-SU-2024:3905-1: moderate: Security update for openssl-1_1


# Security update for openssl-1_1

Announcement ID: SUSE-SU-2024:3905-1
Release Date: 2024-11-04T12:39:19Z
Rating: moderate
References:

* bsc#1220262
* bsc#1224258
* bsc#1224260
* bsc#1224264
* bsc#1224265
* bsc#1224266
* bsc#1224267
* bsc#1224268
* bsc#1224269
* bsc#1224270
* bsc#1224271
* bsc#1224272
* bsc#1224273
* bsc#1224275
* bsc#1228618
* bsc#1228619
* bsc#1228623

Cross-References:

* CVE-2023-50782

CVSS scores:

* CVE-2023-50782 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-50782 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability and has 16 security fixes can now be
installed.

## Description:

This update for openssl-1_1 fixes the following issues:

Security fixes:

* CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)

Other fixes:

* FIPS: AES GCM external IV implementation (bsc#1228618)
* FIPS: Mark PBKDF2 and HKDF HMAC input keys with size >= 112 bits as approved
in the SLI. (bsc#1228623)
* FIPS: Enforce KDF in FIPS style (bsc#1224270)
* FIPS: Mark HKDF and TLSv1.3 KDF as approved in the SLI (bsc#1228619)
* FIPS: The X9.31 scheme is not approved for RSA signature operations in FIPS
186-5. (bsc#1224269)
* FIPS: Differentiate the PSS length requirements (bsc#1224275)
* FIPS: Mark sigGen and sigVer primitives as non-approved (bsc#1224272)
* FIPS: Disable PKCSv1.5 and shake in FIPS mode (bsc#1224271)
* FIPS: Mark SHA1 as non-approved in the SLI (bsc#1224266)
* FIPS: DH FIPS selftest and safe prime group (bsc#1224264)
* FIPS: Remove not needed FIPS DRBG files (bsc#1224268)
* FIPS: Add Pair-wise Consistency Test when generating DH key (bsc#1224265)
* FIPS: Disallow non-approved KDF types (bsc#1224267)
* FIPS: Disallow RSA sigVer with 1024 and ECDSA sigVer/keyVer P-192
(bsc#1224273)
* FIPS: DRBG component chaining (bsc#1224258)
* FIPS: Align CRNGT_BUFSIZ with Jitter RNG output size (bsc#1224260)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2024-3905=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2024-3905=1 openSUSE-SLE-15.6-2024-3905=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-3905=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-3905=1

## Package List:

* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.9.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.9.1
* openssl-1_1-1.1.1w-150600.5.9.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-1_1-devel-1.1.1w-150600.5.9.1
* openssl-1_1-1.1.1w-150600.5.9.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.9.1
* libopenssl1_1-debuginfo-1.1.1w-150600.5.9.1
* openssl-1_1-debugsource-1.1.1w-150600.5.9.1
* libopenssl1_1-1.1.1w-150600.5.9.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl1_1-32bit-1.1.1w-150600.5.9.1
* libopenssl-1_1-devel-32bit-1.1.1w-150600.5.9.1
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.9.1
* openSUSE Leap 15.6 (noarch)
* openssl-1_1-doc-1.1.1w-150600.5.9.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl1_1-64bit-1.1.1w-150600.5.9.1
* libopenssl-1_1-devel-64bit-1.1.1w-150600.5.9.1
* libopenssl1_1-64bit-debuginfo-1.1.1w-150600.5.9.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.9.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.9.1
* libopenssl1_1-debuginfo-1.1.1w-150600.5.9.1
* libopenssl1_1-1.1.1w-150600.5.9.1
* Basesystem Module 15-SP6 (x86_64)
* libopenssl1_1-32bit-1.1.1w-150600.5.9.1
* libopenssl1_1-32bit-debuginfo-1.1.1w-150600.5.9.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssl-1_1-debugsource-1.1.1w-150600.5.9.1
* libopenssl-1_1-devel-1.1.1w-150600.5.9.1
* openssl-1_1-debuginfo-1.1.1w-150600.5.9.1

## References:

* https://www.suse.com/security/cve/CVE-2023-50782.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220262
* https://bugzilla.suse.com/show_bug.cgi?id=1224258
* https://bugzilla.suse.com/show_bug.cgi?id=1224260
* https://bugzilla.suse.com/show_bug.cgi?id=1224264
* https://bugzilla.suse.com/show_bug.cgi?id=1224265
* https://bugzilla.suse.com/show_bug.cgi?id=1224266
* https://bugzilla.suse.com/show_bug.cgi?id=1224267
* https://bugzilla.suse.com/show_bug.cgi?id=1224268
* https://bugzilla.suse.com/show_bug.cgi?id=1224269
* https://bugzilla.suse.com/show_bug.cgi?id=1224270
* https://bugzilla.suse.com/show_bug.cgi?id=1224271
* https://bugzilla.suse.com/show_bug.cgi?id=1224272
* https://bugzilla.suse.com/show_bug.cgi?id=1224273
* https://bugzilla.suse.com/show_bug.cgi?id=1224275
* https://bugzilla.suse.com/show_bug.cgi?id=1228618
* https://bugzilla.suse.com/show_bug.cgi?id=1228619
* https://bugzilla.suse.com/show_bug.cgi?id=1228623



SUSE-SU-2024:3898-1: important: Security update for MozillaFirefox


# Security update for MozillaFirefox

Announcement ID: SUSE-SU-2024:3898-1
Release Date: 2024-11-04T11:15:08Z
Rating: important
References:

* bsc#1231879

Cross-References:

* CVE-2024-10458
* CVE-2024-10459
* CVE-2024-10460
* CVE-2024-10461
* CVE-2024-10462
* CVE-2024-10463
* CVE-2024-10464
* CVE-2024-10465
* CVE-2024-10466
* CVE-2024-10467

CVSS scores:

* CVE-2024-10458 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10458 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2024-10458 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-10458 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
* CVE-2024-10459 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-10459 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10459 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-10459 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10460 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10460 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-10460 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2024-10460 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-10461 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
* CVE-2024-10461 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-10461 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-10462 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10462 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2024-10462 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-10463 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10463 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-10463 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-10464 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-10464 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-10464 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10465 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10465 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2024-10465 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-10466 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-10466 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-10466 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-10467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-10467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-10467 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 10 vulnerabilities can now be installed.

## Description:

This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 128.4.0 ESR (bsc#1231879):

* CVE-2024-10458: Permission leak via embed or object elements
* CVE-2024-10459: Use-after-free in layout with accessibility
* CVE-2024-10460: Confusing display of origin for external protocol handler
prompt
* CVE-2024-10461: XSS due to Content-Disposition being ignored in
multipart/x-mixed-replace response
* CVE-2024-10462: Origin of permission prompt could be spoofed by long URL
* CVE-2024-10463: Cross origin video frame leak
* CVE-2024-10464: History interface could have been used to cause a Denial of
Service condition in the browser
* CVE-2024-10465: Clipboard "paste" button persisted across tabs
* CVE-2024-10466: DOM push subscription message could hang Firefox
* CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132,
Firefox ESR 128.4, and Thunderbird 128.4

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3898=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3898=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3898=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3898=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3898=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3898=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-3898=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-3898=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-3898=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-3898=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-3898=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3898=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3898=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3898=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3898=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-3898=1

## Package List:

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* MozillaFirefox-branding-upstream-128.4.0-150200.152.158.1
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* MozillaFirefox-branding-upstream-128.4.0-150200.152.158.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-debuginfo-128.4.0-150200.152.158.1
* MozillaFirefox-translations-other-128.4.0-150200.152.158.1
* MozillaFirefox-128.4.0-150200.152.158.1
* MozillaFirefox-debugsource-128.4.0-150200.152.158.1
* MozillaFirefox-translations-common-128.4.0-150200.152.158.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-128.4.0-150200.152.158.1

## References:

* https://www.suse.com/security/cve/CVE-2024-10458.html
* https://www.suse.com/security/cve/CVE-2024-10459.html
* https://www.suse.com/security/cve/CVE-2024-10460.html
* https://www.suse.com/security/cve/CVE-2024-10461.html
* https://www.suse.com/security/cve/CVE-2024-10462.html
* https://www.suse.com/security/cve/CVE-2024-10463.html
* https://www.suse.com/security/cve/CVE-2024-10464.html
* https://www.suse.com/security/cve/CVE-2024-10465.html
* https://www.suse.com/security/cve/CVE-2024-10466.html
* https://www.suse.com/security/cve/CVE-2024-10467.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231879