SUSE 5022 Published by

The following updates are available for openSUSE Leap and SUSE Linux Enterprise:

SUSE-SU-2024:1306-1: important: Security update for nodejs16
SUSE-SU-2024:1309-1: important: Security update for nodejs18
SUSE-SU-2024:1304-1: moderate: Security update for eclipse, maven-surefire, tycho
SUSE-SU-2024:1308-1: important: Security update for nodejs16
SUSE-SU-2024:1310-1: low: Security update for texlive
SUSE-SU-2024:1301-1: important: Security update for nodejs20
SUSE-SU-2024:1287-1: important: Security update for vim
SUSE-SU-2024:1294-1: moderate: Security update for emacs
SUSE-SU-2024:1259-1: moderate: Security update for xen
SUSE-SU-2024:1262-1: important: Security update for xorg-x11-server
SUSE-SU-2024:1271-1: moderate: Security update for gnutls
SUSE-SU-2024:1256-1: moderate: Security update for perl-Net-CIDR-Lite
SUSE-SU-2024:1204-1: important: Security update for tomcat10
SUSE-SU-2024:1192-1: important: Security update for less
SUSE-SU-2024:1174-1: moderate: Security update for qt6-base




SUSE-SU-2024:1306-1: important: Security update for nodejs16


# Security update for nodejs16

Announcement ID: SUSE-SU-2024:1306-1
Rating: important
References:

* bsc#1222244
* bsc#1222384

Cross-References:

* CVE-2024-27982
* CVE-2024-27983

CVSS scores:

* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for nodejs16 fixes the following issues:

* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2024-1306=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1306=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1306=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1306=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1306=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* corepack16-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* openSUSE Leap 15.3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* nodejs16-debuginfo-16.20.2-150300.7.36.2
* nodejs16-devel-16.20.2-150300.7.36.2
* nodejs16-debugsource-16.20.2-150300.7.36.2
* npm16-16.20.2-150300.7.36.2
* nodejs16-16.20.2-150300.7.36.2
* SUSE Enterprise Storage 7.1 (noarch)
* nodejs16-docs-16.20.2-150300.7.36.2

## References:

* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384



SUSE-SU-2024:1309-1: important: Security update for nodejs18


# Security update for nodejs18

Announcement ID: SUSE-SU-2024:1309-1
Rating: important
References:

* bsc#1220053
* bsc#1222244
* bsc#1222384
* bsc#1222530
* bsc#1222603

Cross-References:

* CVE-2024-24806
* CVE-2024-27982
* CVE-2024-27983
* CVE-2024-30260
* CVE-2024-30261

CVSS scores:

* CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-30260 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-30261 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP5

An update that solves five vulnerabilities can now be installed.

## Description:

This update for nodejs18 fixes the following issues:

Update to 18.20.1

Security fixes:

* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
* CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin
redirect in undici (bsc#1222530)
* CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm
is specified but hash value is in incorrect in undici (bsc#1222603)
* CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF
attacks in libuv (bsc#1220053)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1309=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1309=1

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1309=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1309=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1309=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1309=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1309=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1309=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* corepack18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* openSUSE Leap 15.4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* corepack18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* openSUSE Leap 15.5 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* Web and Scripting Module 15-SP5 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* npm18-18.20.1-150400.9.21.3
* nodejs18-devel-18.20.1-150400.9.21.3
* nodejs18-18.20.1-150400.9.21.3
* nodejs18-debugsource-18.20.1-150400.9.21.3
* nodejs18-debuginfo-18.20.1-150400.9.21.3
* SUSE Manager Server 4.3 (noarch)
* nodejs18-docs-18.20.1-150400.9.21.3

## References:

* https://www.suse.com/security/cve/CVE-2024-24806.html
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://www.suse.com/security/cve/CVE-2024-30260.html
* https://www.suse.com/security/cve/CVE-2024-30261.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220053
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
* https://bugzilla.suse.com/show_bug.cgi?id=1222530
* https://bugzilla.suse.com/show_bug.cgi?id=1222603



SUSE-SU-2024:1304-1: moderate: Security update for eclipse, maven-surefire, tycho


# Security update for eclipse, maven-surefire, tycho

Announcement ID: SUSE-SU-2024:1304-1
Rating: moderate
References:

* bsc#1216992

Cross-References:

* CVE-2023-4218

CVSS scores:

* CVE-2023-4218 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2023-4218 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Affected Products:

* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for eclipse, maven-surefire, tycho fixes the following issues:

eclipse received the following security fix:

* CVE-2023-4218: Fixed a bug where parsing files with xml content laeds to XXE
attacks. (bsc#1216992)

maven-sunfire was updated from version 2.22.0 to 2.22.2:

* Changes in version 2.22.2:

* Bugs fixed:

* Fixed JUnit Runner that writes to System.out corrupts Surefire’s STDOUT when using JUnit’s Vintage Engine
* Changes in version 2.22.1:

* Bugs fixed:

* Fixed Surefire unable to run testng suites in parallel
* Fixed Git wrongly considering PNG files as changed when there is no change
* Fixed the surefire XSD published on maven site lacking of some rerun element
* Fixed XML Report elements rerunError, rerunFailure, flakyFailure, flakyError
* Fixed overriding platform version through project/plugin dependencies
* Fixed mixed up characters in standard output
* Logs in Parallel Tests are mixed up when `forkMode=never` or `forkCount=0`
* MIME type for javascript is now officially application/javascript
* Improvements:

* Elapsed time in XML Report should satisfy pattern in XSD.
* Fix old test resources TEST-*.xml in favor of continuing with SUREFIRE-1550
* Nil element “failureMessage” in failsafe-summary.xml should have self closed tag
* Removed obsolete module `surefire-setup-integration-tests`
* Support Java 11
* Surefire should support parameterized reportsDirectory
* Dependency upgrades:

* Upgraded maven-plugins parent to version 32
* Upgraded maven-plugins parent to version 33

tycho received the following bug fixes:

* Fixed build against maven-surefire 2.22.1 and newer
* Fixed build against newer plexus-compiler
* Fixed issues with plexus-archiver 4.4.0 and newer
* Require explicitely artifacts that will not be required automatically any
more

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1304=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1304=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1304=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1304=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1304=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1304=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1304=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1304=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1304=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1304=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1304=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1304=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1304=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1304=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1304=1

## Package List:

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Enterprise Storage 7.1 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* eclipse-platform-debuginfo-4.15-150200.4.16.4
* eclipse-swt-debuginfo-4.15-150200.4.16.4
* eclipse-swt-4.15-150200.4.16.4
* eclipse-swt-bootstrap-4.15-150200.4.16.5
* eclipse-platform-4.15-150200.4.16.4
* eclipse-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-emf-core-2.22.0-150200.4.9.3
* eclipse-emf-core-bootstrap-2.22.0-150200.4.9.3
* eclipse-equinox-osgi-4.15-150200.4.16.4
* eclipse-swt-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-pde-bootstrap-4.15-150200.4.16.5
* eclipse-contributor-tools-4.15-150200.4.16.4
* eclipse-platform-bootstrap-4.15-150200.4.16.5
* eclipse-platform-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-debuginfo-4.15-150200.4.16.4
* eclipse-bootstrap-debugsource-4.15-150200.4.16.5
* eclipse-pde-4.15-150200.4.16.4
* eclipse-equinox-osgi-bootstrap-4.15-150200.4.16.5
* eclipse-debugsource-4.15-150200.4.16.4
* openSUSE Leap 15.5 (noarch)
* eclipse-emf-xsd-2.22.0-150200.4.9.3
* eclipse-p2-discovery-4.15-150200.4.16.4
* maven-failsafe-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-report-parser-2.22.2-150200.3.9.9.1
* tycho-javadoc-1.6.0-150200.4.9.5
* tycho-1.6.0-150200.4.9.5
* maven-surefire-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* eclipse-emf-sdk-2.22.0-150200.4.9.3
* maven-surefire-javadoc-2.22.2-150200.3.9.9.1
* eclipse-p2-discovery-bootstrap-4.15-150200.4.16.5
* eclipse-jdt-bootstrap-4.15-150200.4.16.5
* maven-surefire-report-plugin-bootstrap-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-plugins-javadoc-2.22.2-150200.3.9.9.1
* eclipse-emf-runtime-2.22.0-150200.4.9.3
* maven-surefire-provider-junit5-javadoc-2.22.2-150200.3.9.9.1
* eclipse-jdt-4.15-150200.4.16.4
* tycho-bootstrap-1.6.0-150200.4.9.2
* maven-surefire-report-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit5-2.22.2-150200.3.9.9.1
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-failsafe-plugin-2.22.2-150200.3.9.9.1
* Development Tools Module 15-SP5 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* eclipse-platform-debuginfo-4.15-150200.4.16.4
* eclipse-swt-debuginfo-4.15-150200.4.16.4
* eclipse-swt-4.15-150200.4.16.4
* eclipse-swt-bootstrap-4.15-150200.4.16.5
* eclipse-platform-4.15-150200.4.16.4
* eclipse-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-emf-core-2.22.0-150200.4.9.3
* eclipse-emf-core-bootstrap-2.22.0-150200.4.9.3
* eclipse-equinox-osgi-4.15-150200.4.16.4
* eclipse-swt-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-pde-bootstrap-4.15-150200.4.16.5
* eclipse-contributor-tools-4.15-150200.4.16.4
* eclipse-platform-bootstrap-4.15-150200.4.16.5
* eclipse-platform-bootstrap-debuginfo-4.15-150200.4.16.5
* eclipse-debuginfo-4.15-150200.4.16.4
* eclipse-bootstrap-debugsource-4.15-150200.4.16.5
* eclipse-pde-4.15-150200.4.16.4
* eclipse-equinox-osgi-bootstrap-4.15-150200.4.16.5
* eclipse-debugsource-4.15-150200.4.16.4
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* maven-surefire-2.22.2-150200.3.9.9.1
* maven-surefire-plugin-2.22.2-150200.3.9.9.1
* maven-surefire-provider-junit-2.22.2-150200.3.9.9.1
* maven-surefire-provider-testng-2.22.2-150200.3.9.9.1

## References:

* https://www.suse.com/security/cve/CVE-2023-4218.html
* https://bugzilla.suse.com/show_bug.cgi?id=1216992



SUSE-SU-2024:1308-1: important: Security update for nodejs16


# Security update for nodejs16

Announcement ID: SUSE-SU-2024:1308-1
Rating: important
References:

* bsc#1222244
* bsc#1222384

Cross-References:

* CVE-2024-27982
* CVE-2024-27983

CVSS scores:

* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Server 4.3

An update that solves two vulnerabilities can now be installed.

## Description:

This update for nodejs16 fixes the following issues:

* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1308=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1308=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1308=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1308=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1308=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1308=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* corepack16-16.20.2-150400.3.33.1
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* openSUSE Leap 15.4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* nodejs16-debuginfo-16.20.2-150400.3.33.1
* npm16-16.20.2-150400.3.33.1
* nodejs16-16.20.2-150400.3.33.1
* nodejs16-debugsource-16.20.2-150400.3.33.1
* nodejs16-devel-16.20.2-150400.3.33.1
* SUSE Manager Server 4.3 (noarch)
* nodejs16-docs-16.20.2-150400.3.33.1

## References:

* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384



SUSE-SU-2024:1310-1: low: Security update for texlive


# Security update for texlive

Announcement ID: SUSE-SU-2024:1310-1
Rating: low
References:

* bsc#1222126
* bsc#1222127

Cross-References:

* CVE-2023-46048
* CVE-2023-46051

CVSS scores:

* CVE-2023-46048 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-46051 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for texlive fixes the following issues:

* CVE-2023-46048: Fixed NULL pointer dereference in
texk/web2c/pdftexdir/writet1.c (bsc#1222126)
* CVE-2023-46051: Fixed NULL pointer dereference in
texk/web2c/pdftexdir/tounicode.c (bsc#1222127)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1310=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1310=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1310=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1310=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* openSUSE Leap 15.4 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* openSUSE Leap 15.5 (aarch64 x86_64)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* openSUSE Leap 15.5 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* Basesystem Module 15-SP5 (noarch)
* perl-biber-2021.20210325.svn30357-150400.31.6.4
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4
* texlive-bibtex8-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4
* texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4
* texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4
* libptexenc1-1.3.9-150400.31.6.4
* texlive-dviljk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-xml2pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4
* texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4
* texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4
* texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4
* texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4
* texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-context-bin-2021.20210325.svn34112-150400.31.6.4
* texlive-dvipos-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-autosp-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4
* texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-synctex-devel-1.21-150400.31.6.4
* texlive-dvidvi-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4
* texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4
* texlive-uptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-afm2pl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-luahbtex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-musixtnt-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4
* texlive-dvicopy-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-axodraw2-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-xdvi-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-synctex-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-fontware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texlua-devel-5.3.6-150400.31.6.4
* texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4
* texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4
* texlive-makeindex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-aleph-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4
* texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4
* texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4
* texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4
* texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4
* texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4
* texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4
* texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4
* texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4
* texlive-kpathsea-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4
* texlive-cjkutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4
* texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4
* texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4
* texlive-kpathsea-devel-6.3.3-150400.31.6.4
* texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4
* texlive-pdftex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4
* texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4
* texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4
* texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4
* texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4
* texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4
* texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4
* texlive-velthuis-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4
* texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4
* texlive-2021.20210325-150400.31.6.4
* texlive-dvisvgm-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4
* texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4
* texlive-seetexk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lacheck-bin-debuginfo-2021.20210325.svn53999-150400.31.6.4
* texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4
* texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-dvipng-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* libtexlua53-5-debuginfo-5.3.6-150400.31.6.4
* texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4
* texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4
* texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4
* texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4
* texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4
* texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4
* libsynctex2-debuginfo-1.21-150400.31.6.4
* texlive-debuginfo-2021.20210325-150400.31.6.4
* texlive-bin-devel-2021.20210325-150400.31.6.4
* texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4
* texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4
* texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4
* texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4
* texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4
* texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-gregoriotex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4
* texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4
* texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4
* texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4
* texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4
* texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4
* texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4
* texlive-dviout-util-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4
* texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4
* texlive-cweb-bin-debuginfo-2021.20210325.svn58136-150400.31.6.4
* texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4
* texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4
* texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4
* texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4
* texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-patgen-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4
* texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4
* texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4
* texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4
* texlive-gsftopk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4
* texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4
* texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4
* texlive-dvipdfmx-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4
* texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4
* texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4
* texlive-pmx-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4
* texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bibtexu-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4
* texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4
* texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-tie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4
* texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4
* texlive-xetex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4
* texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4
* texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4
* texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4
* texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4
* texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4
* libkpathsea6-debuginfo-6.3.3-150400.31.6.4
* texlive-omegaware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lcdftypetools-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4
* texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4
* texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4
* texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4
* texlive-ps2pk-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-web-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4
* texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4
* texlive-ttfutils-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4
* texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4
* texlive-asymptote-bin-debuginfo-2021.20210325.svn57890-150400.31.6.4
* texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4
* texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4
* texlive-chktex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4
* texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4
* texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4
* texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-mflua-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-debugsource-2021.20210325-150400.31.6.4
* libsynctex2-1.21-150400.31.6.4
* texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4
* texlive-luatex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4
* texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4
* texlive-m-tx-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-vlna-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4
* texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4
* texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4
* texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pdftosrc-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4
* texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4
* texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4
* texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4
* texlive-ps2eps-bin-debuginfo-2021.20210325.svn50281-150400.31.6.4
* texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4
* texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4
* texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4
* texlive-ptex-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-ctie-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4
* texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4
* texlive-dtl-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-detex-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-dvips-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4
* texlive-metapost-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mfware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4
* texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4
* texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4
* texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4
* libkpathsea6-6.3.3-150400.31.6.4
* texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4
* texlive-texware-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4
* libtexlua53-5-5.3.6-150400.31.6.4
* texlive-ptexenc-devel-1.3.9-150400.31.6.4
* libptexenc1-debuginfo-1.3.9-150400.31.6.4
* texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4
* texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4
* texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4
* texlive-metafont-bin-debuginfo-2021.20210325.svn58378-150400.31.6.4
* texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4
* texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4
* texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4
* texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4
* texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4
* texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4
* texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4
* texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4
* texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4
* texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4
* texlive-xpdfopen-bin-debuginfo-2021.20210325.svn52917-150400.31.6.4
* texlive-tex4ht-bin-debuginfo-2021.20210325.svn57878-150400.31.6.4
* texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4
* Desktop Applications Module 15-SP5 (aarch64 x86_64)
* libtexluajit2-debuginfo-2.1.0beta3-150400.31.6.4
* texlive-luajittex-bin-debuginfo-2021.20210325.svn58535-150400.31.6.4
* texlive-texluajit-devel-2.1.0beta3-150400.31.6.4
* libtexluajit2-2.1.0beta3-150400.31.6.4
* Desktop Applications Module 15-SP5 (noarch)
* texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4
* texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4

## References:

* https://www.suse.com/security/cve/CVE-2023-46048.html
* https://www.suse.com/security/cve/CVE-2023-46051.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222126
* https://bugzilla.suse.com/show_bug.cgi?id=1222127



SUSE-SU-2024:1301-1: important: Security update for nodejs20


# Security update for nodejs20

Announcement ID: SUSE-SU-2024:1301-1
Rating: important
References:

* bsc#1220053
* bsc#1222244
* bsc#1222384
* bsc#1222530
* bsc#1222603

Cross-References:

* CVE-2024-24806
* CVE-2024-27982
* CVE-2024-27983
* CVE-2024-30260
* CVE-2024-30261

CVSS scores:

* CVE-2024-24806 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-24806 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-27982 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-27983 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-30260 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-30261 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5

An update that solves five vulnerabilities can now be installed.

## Description:

This update for nodejs20 fixes the following issues:

Update to 20.12.1

Security fixes:

* CVE-2024-27983: Fixed failed assertion in
node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server
crash (bsc#1222244)
* CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation
(bsc#1222384)
* CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin
redirect in undici (bsc#1222530)
* CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm
is specified but hash value is in incorrect in undici (bsc#1222603)
* CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF
attacks in libuv (bsc#1220053)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1301=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1301=1 openSUSE-SLE-15.5-2024-1301=1

## Package List:

* Web and Scripting Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* nodejs20-debugsource-20.12.1-150500.11.9.2
* nodejs20-debuginfo-20.12.1-150500.11.9.2
* nodejs20-devel-20.12.1-150500.11.9.2
* npm20-20.12.1-150500.11.9.2
* nodejs20-20.12.1-150500.11.9.2
* Web and Scripting Module 15-SP5 (noarch)
* nodejs20-docs-20.12.1-150500.11.9.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* nodejs20-debugsource-20.12.1-150500.11.9.2
* corepack20-20.12.1-150500.11.9.2
* nodejs20-debuginfo-20.12.1-150500.11.9.2
* nodejs20-devel-20.12.1-150500.11.9.2
* npm20-20.12.1-150500.11.9.2
* nodejs20-20.12.1-150500.11.9.2
* openSUSE Leap 15.5 (noarch)
* nodejs20-docs-20.12.1-150500.11.9.2

## References:

* https://www.suse.com/security/cve/CVE-2024-24806.html
* https://www.suse.com/security/cve/CVE-2024-27982.html
* https://www.suse.com/security/cve/CVE-2024-27983.html
* https://www.suse.com/security/cve/CVE-2024-30260.html
* https://www.suse.com/security/cve/CVE-2024-30261.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220053
* https://bugzilla.suse.com/show_bug.cgi?id=1222244
* https://bugzilla.suse.com/show_bug.cgi?id=1222384
* https://bugzilla.suse.com/show_bug.cgi?id=1222530
* https://bugzilla.suse.com/show_bug.cgi?id=1222603



SUSE-SU-2024:1287-1: important: Security update for vim


# Security update for vim

Announcement ID: SUSE-SU-2024:1287-1
Rating: important
References:

* bsc#1215005
* bsc#1217316
* bsc#1217320
* bsc#1217321
* bsc#1217324
* bsc#1217326
* bsc#1217329
* bsc#1217330
* bsc#1217432
* bsc#1219581

Cross-References:

* CVE-2023-4750
* CVE-2023-48231
* CVE-2023-48232
* CVE-2023-48233
* CVE-2023-48234
* CVE-2023-48235
* CVE-2023-48236
* CVE-2023-48237
* CVE-2023-48706
* CVE-2024-22667

CVSS scores:

* CVE-2023-4750 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4750 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-4750 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-48231 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48231 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48232 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48232 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48233 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48233 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48234 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48234 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48235 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48235 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48236 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
* CVE-2023-48236 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48237 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48237 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-48706 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
* CVE-2023-48706 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-22667 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-22667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 10 vulnerabilities can now be installed.

## Description:

This update for vim fixes the following issues:

Updated to version 9.1.0111, fixes the following security problems

* CVE-2023-48231: Use-After-Free in win_close() (bsc#1217316).
* CVE-2023-48232: Floating point Exception in adjust_plines_for_skipcol()
(bsc#1217320).
* CVE-2023-48233: overflow with count for :s command (bsc#1217321).
* CVE-2023-48234: overflow in nv_z_get_count (bsc#1217324).
* CVE-2023-48235: overflow in ex address parsing (CVE-2023-48235).
* CVE-2023-48236: overflow in get_number (bsc#1217329).
* CVE-2023-48237: overflow in shift_line (bsc#1217330).
* CVE-2023-48706: heap-use-after-free in ex_substitute (bsc#1217432).
* CVE-2024-22667: stack-based buffer overflow in did_set_langmap function in
map.c (bsc#1219581).
* CVE-2023-4750: Heap use-after-free in function bt_quickfix (bsc#1215005).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1287=1 openSUSE-SLE-15.5-2024-1287=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1287=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1287=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1287=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* gvim-debuginfo-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* vim-9.1.0111-150500.20.9.1
* vim-small-9.1.0111-150500.20.9.1
* gvim-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* openSUSE Leap 15.5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* vim-data-9.1.0111-150500.20.9.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* vim-small-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1
* vim-9.1.0111-150500.20.9.1
* vim-small-9.1.0111-150500.20.9.1
* vim-small-debuginfo-9.1.0111-150500.20.9.1
* Basesystem Module 15-SP5 (noarch)
* vim-data-common-9.1.0111-150500.20.9.1
* vim-data-9.1.0111-150500.20.9.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gvim-debuginfo-9.1.0111-150500.20.9.1
* gvim-9.1.0111-150500.20.9.1
* vim-debuginfo-9.1.0111-150500.20.9.1
* vim-debugsource-9.1.0111-150500.20.9.1

## References:

* https://www.suse.com/security/cve/CVE-2023-4750.html
* https://www.suse.com/security/cve/CVE-2023-48231.html
* https://www.suse.com/security/cve/CVE-2023-48232.html
* https://www.suse.com/security/cve/CVE-2023-48233.html
* https://www.suse.com/security/cve/CVE-2023-48234.html
* https://www.suse.com/security/cve/CVE-2023-48235.html
* https://www.suse.com/security/cve/CVE-2023-48236.html
* https://www.suse.com/security/cve/CVE-2023-48237.html
* https://www.suse.com/security/cve/CVE-2023-48706.html
* https://www.suse.com/security/cve/CVE-2024-22667.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215005
* https://bugzilla.suse.com/show_bug.cgi?id=1217316
* https://bugzilla.suse.com/show_bug.cgi?id=1217320
* https://bugzilla.suse.com/show_bug.cgi?id=1217321
* https://bugzilla.suse.com/show_bug.cgi?id=1217324
* https://bugzilla.suse.com/show_bug.cgi?id=1217326
* https://bugzilla.suse.com/show_bug.cgi?id=1217329
* https://bugzilla.suse.com/show_bug.cgi?id=1217330
* https://bugzilla.suse.com/show_bug.cgi?id=1217432
* https://bugzilla.suse.com/show_bug.cgi?id=1219581



SUSE-SU-2024:1294-1: moderate: Security update for emacs


# Security update for emacs

Announcement ID: SUSE-SU-2024:1294-1
Rating: moderate
References:

* bsc#1222050
* bsc#1222052
* bsc#1222053

Cross-References:

* CVE-2024-30203
* CVE-2024-30204
* CVE-2024-30205

CVSS scores:

* CVE-2024-30203 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-30204 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
* CVE-2024-30205 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP5
* Desktop Applications Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves three vulnerabilities can now be installed.

## Description:

This update for emacs fixes the following issues:

* CVE-2024-30203: Fixed treating inline MIME contents as trusted (bsc#1222053)
* CVE-2024-30204: Fixed LaTeX preview enabled by default for e-mail
attachments (bsc#1222052)
* CVE-2024-30205: Fixed Org mode considering contents of remote files as
trusted (bsc#1222050)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1294=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1294=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1294=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1294=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* emacs-x11-27.2-150400.3.11.1
* etags-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* openSUSE Leap 15.4 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* emacs-x11-27.2-150400.3.11.1
* etags-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* openSUSE Leap 15.5 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* etags-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* etags-debuginfo-27.2-150400.3.11.1
* emacs-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-nox-27.2-150400.3.11.1
* emacs-nox-debuginfo-27.2-150400.3.11.1
* Basesystem Module 15-SP5 (noarch)
* emacs-el-27.2-150400.3.11.1
* emacs-info-27.2-150400.3.11.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* emacs-x11-27.2-150400.3.11.1
* emacs-debugsource-27.2-150400.3.11.1
* emacs-debuginfo-27.2-150400.3.11.1
* emacs-x11-debuginfo-27.2-150400.3.11.1

## References:

* https://www.suse.com/security/cve/CVE-2024-30203.html
* https://www.suse.com/security/cve/CVE-2024-30204.html
* https://www.suse.com/security/cve/CVE-2024-30205.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222050
* https://bugzilla.suse.com/show_bug.cgi?id=1222052
* https://bugzilla.suse.com/show_bug.cgi?id=1222053



SUSE-SU-2024:1259-1: moderate: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2024:1259-1
Rating: moderate
References:

* bsc#1027519
* bsc#1221984
* bsc#1222302
* bsc#1222453

Cross-References:

* CVE-2023-46842
* CVE-2024-2201
* CVE-2024-31142

CVSS scores:

* CVE-2023-46842 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-31142 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves three vulnerabilities and has one security fix can now be
installed.

## Description:

This update for xen fixes the following issues:

* CVE-2023-46842: Fixed denial of service due to Xen bug check triggered by
HVM hypercalls (XSA-454) in xen x86 (bsc#1221984)
* CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455) in
xen x86 (bsc#1222302)
* CVE-2024-2201: Fixed memory disclosure via Native Branch History Injection
(XSA-456) in xen x86 (bsc#1222453)

Other fixes:

* Update to Xen 4.16.6 (bsc#1027519)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1259=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1259=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1259=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1259=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1259=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1259=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1259=1

## Package List:

* openSUSE Leap 15.4 (aarch64 x86_64 i586)
* xen-tools-domU-4.16.6_02-150400.4.55.1
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-tools-domU-debuginfo-4.16.6_02-150400.4.55.1
* xen-devel-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* openSUSE Leap 15.4 (x86_64)
* xen-libs-32bit-4.16.6_02-150400.4.55.1
* xen-libs-32bit-debuginfo-4.16.6_02-150400.4.55.1
* openSUSE Leap 15.4 (aarch64 x86_64)
* xen-doc-html-4.16.6_02-150400.4.55.1
* xen-tools-debuginfo-4.16.6_02-150400.4.55.1
* xen-tools-4.16.6_02-150400.4.55.1
* xen-4.16.6_02-150400.4.55.1
* openSUSE Leap 15.4 (noarch)
* xen-tools-xendomains-wait-disk-4.16.6_02-150400.4.55.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* xen-libs-64bit-4.16.6_02-150400.4.55.1
* xen-libs-64bit-debuginfo-4.16.6_02-150400.4.55.1
* openSUSE Leap Micro 5.3 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* openSUSE Leap Micro 5.4 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* SUSE Linux Enterprise Micro 5.3 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1
* SUSE Linux Enterprise Micro 5.4 (x86_64)
* xen-debugsource-4.16.6_02-150400.4.55.1
* xen-libs-debuginfo-4.16.6_02-150400.4.55.1
* xen-libs-4.16.6_02-150400.4.55.1

## References:

* https://www.suse.com/security/cve/CVE-2023-46842.html
* https://www.suse.com/security/cve/CVE-2024-2201.html
* https://www.suse.com/security/cve/CVE-2024-31142.html
* https://bugzilla.suse.com/show_bug.cgi?id=1027519
* https://bugzilla.suse.com/show_bug.cgi?id=1221984
* https://bugzilla.suse.com/show_bug.cgi?id=1222302
* https://bugzilla.suse.com/show_bug.cgi?id=1222453



SUSE-SU-2024:1262-1: important: Security update for xorg-x11-server


# Security update for xorg-x11-server

Announcement ID: SUSE-SU-2024:1262-1
Rating: important
References:

* bsc#1222309
* bsc#1222310
* bsc#1222311
* bsc#1222312
* bsc#1222442

Cross-References:

* CVE-2024-31080
* CVE-2024-31081
* CVE-2024-31082
* CVE-2024-31083

CVSS scores:

* CVE-2024-31080 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31081 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-31082 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2024-31083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves four vulnerabilities and has one security fix can now be
installed.

## Description:

This update for xorg-x11-server fixes the following issues:

* CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length
(bsc#1222309).
* CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to
send reply (bsc#1222310).
* CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to
send reply (bsc#1222311).
* CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs
(bsc#1222312).

Other fixes: \- Fixed regression for security fix for CVE-2024-31083 when using
Android Studio (bnc#1222442)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1262=1 openSUSE-SLE-15.5-2024-1262=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1262=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1262=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* xorg-x11-server-extra-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
* xorg-x11-server-source-21.1.4-150500.7.26.1
* xorg-x11-server-extra-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-sdk-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-21.1.4-150500.7.26.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xorg-x11-server-extra-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-Xvfb-21.1.4-150500.7.26.1
* xorg-x11-server-extra-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1
* xorg-x11-server-21.1.4-150500.7.26.1
* Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* xorg-x11-server-debugsource-21.1.4-150500.7.26.1
* xorg-x11-server-sdk-21.1.4-150500.7.26.1
* xorg-x11-server-debuginfo-21.1.4-150500.7.26.1

## References:

* https://www.suse.com/security/cve/CVE-2024-31080.html
* https://www.suse.com/security/cve/CVE-2024-31081.html
* https://www.suse.com/security/cve/CVE-2024-31082.html
* https://www.suse.com/security/cve/CVE-2024-31083.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222309
* https://bugzilla.suse.com/show_bug.cgi?id=1222310
* https://bugzilla.suse.com/show_bug.cgi?id=1222311
* https://bugzilla.suse.com/show_bug.cgi?id=1222312
* https://bugzilla.suse.com/show_bug.cgi?id=1222442



SUSE-SU-2024:1271-1: moderate: Security update for gnutls


# Security update for gnutls

Announcement ID: SUSE-SU-2024:1271-1
Rating: moderate
References:

* bsc#1221242
* bsc#1221746
* bsc#1221747

Cross-References:

* CVE-2024-28834
* CVE-2024-28835

CVSS scores:

* CVE-2024-28834 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-28835 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities and has one security fix can now be
installed.

## Description:

This update for gnutls fixes the following issues:

* CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746)
* CVE-2024-28835: Fixed denial of service during certificate chain
verification (bsc#1221747)

Other fixes: \- jitterentropy: Release the memory of the entropy collector when
using jitterentropy with phtreads as there is also a pre-intitization done in
the main thread (bsc#1221242)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1271=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1271=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1271=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1271=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1271=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1271=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1271=1

## Package List:

* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutlsxx28-3.7.3-150400.4.44.1
* gnutls-guile-3.7.3-150400.4.44.1
* libgnutls-devel-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1
* gnutls-guile-debuginfo-3.7.3-150400.4.44.1
* libgnutlsxx-devel-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* openSUSE Leap 15.5 (x86_64)
* libgnutls30-32bit-3.7.3-150400.4.44.1
* libgnutls-devel-32bit-3.7.3-150400.4.44.1
* libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1
* libgnutls30-hmac-32bit-3.7.3-150400.4.44.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutlsxx28-3.7.3-150400.4.44.1
* libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1
* libgnutls-devel-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* libgnutlsxx-devel-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* Basesystem Module 15-SP5 (x86_64)
* libgnutls30-32bit-3.7.3-150400.4.44.1
* libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1
* libgnutls30-hmac-32bit-3.7.3-150400.4.44.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gnutls-3.7.3-150400.4.44.1
* libgnutls30-hmac-3.7.3-150400.4.44.1
* libgnutlsxx28-3.7.3-150400.4.44.1
* gnutls-guile-3.7.3-150400.4.44.1
* libgnutls-devel-3.7.3-150400.4.44.1
* libgnutls30-debuginfo-3.7.3-150400.4.44.1
* libgnutlsxx28-debuginfo-3.7.3-150400.4.44.1
* gnutls-guile-debuginfo-3.7.3-150400.4.44.1
* libgnutlsxx-devel-3.7.3-150400.4.44.1
* gnutls-debugsource-3.7.3-150400.4.44.1
* libgnutls30-3.7.3-150400.4.44.1
* gnutls-debuginfo-3.7.3-150400.4.44.1
* openSUSE Leap 15.4 (x86_64)
* libgnutls30-32bit-3.7.3-150400.4.44.1
* libgnutls-devel-32bit-3.7.3-150400.4.44.1
* libgnutls30-32bit-debuginfo-3.7.3-150400.4.44.1
* libgnutls30-hmac-32bit-3.7.3-150400.4.44.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgnutls-devel-64bit-3.7.3-150400.4.44.1
* libgnutls30-64bit-debuginfo-3.7.3-150400.4.44.1
* libgnutls30-64bit-3.7.3-150400.4.44.1
* libgnutls30-hmac-64bit-3.7.3-150400.4.44.1

## References:

* https://www.suse.com/security/cve/CVE-2024-28834.html
* https://www.suse.com/security/cve/CVE-2024-28835.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221242
* https://bugzilla.suse.com/show_bug.cgi?id=1221746
* https://bugzilla.suse.com/show_bug.cgi?id=1221747



SUSE-SU-2024:1256-1: moderate: Security update for perl-Net-CIDR-Lite


# Security update for perl-Net-CIDR-Lite

Announcement ID: SUSE-SU-2024:1256-1
Rating: moderate
References:

* bsc#1221564

Cross-References:

* CVE-2021-47154

CVSS scores:

* CVE-2021-47154 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

Affected Products:

* Development Tools Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for perl-Net-CIDR-Lite fixes the following issues:

* CVE-2021-47154: Fixed leading zeroes in IPv4 octets may allow attackers to
bypass certain access controls (bsc#1221564).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1256=1

* Development Tools Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1256=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* perl-Net-CIDR-Lite-0.21-150100.6.3.1
* Development Tools Module 15-SP5 (noarch)
* perl-Net-CIDR-Lite-0.21-150100.6.3.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47154.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221564



SUSE-SU-2024:1204-1: important: Security update for tomcat10


# Security update for tomcat10

Announcement ID: SUSE-SU-2024:1204-1
Rating: important
References:

* bsc#1221385
* bsc#1221386

Cross-References:

* CVE-2024-23672
* CVE-2024-24549

CVSS scores:

* CVE-2024-23672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-24549 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for tomcat10 fixes the following issues:

* CVE-2024-24549: Fixed denial of service during header validation for HTTP/2
stream (bsc#1221386)
* CVE-2024-23672: Fixed denial of service due to malicious WebSocket client
keeping connection open (bsc#1221385)

Other fixes: \- Update to Tomcat 10.1.20 * Catalina \+ Fix: Minor performance
improvement for building filter chains. Based on ideas from #702 by Luke Miao.
(remm) \+ Fix: Align error handling for Writer and OutputStream. Ensure use of
either once the response has been recycled triggers a NullPointerException
provided that discardFacades is configured with the default value of true.
(markt) \+ Fix: 68692: The standard thread pool implementations that are
configured using the Executor element now implement ExecutorService for better
support NIO2. (remm) \+ Fix: 68495: When restoring a saved POST request after a
successful FORM authentication, ensure that neither the URI, the query string
nor the protocol are corrupted when restoring the request body. (markt) \+ Fix:
After forwarding a request, attempt to unwrap the response in order to suspend
it, instead of simply closing it if it was wrapped. Add a new
suspendWrappedResponseAfterForward boolean attribute on Context to control the
bahavior, defaulting to false. (remm) \+ Fix: 68721: Workaround a possible cause
of duplicate class definitions when using ClassFileTransformers and the
transformation of a class also triggers the loading of the same class. (markt)
\+ Fix: The rewrite valve should not do a rewrite if the output is identical to
the input. (remm) \+ Update: Add a new valveSkip (or VS) rule flag to the
rewrite valve to allow skipping over the next valve in the Catalina pipeline.
(remm) \+ Update: Add highConcurrencyStatus attribute to the SemaphoreValve to
optionally allow the valve to return an error status code to the client when a
permit cannot be acquired from the semaphore. (remm) \+ Add: Add checking of the
"age" of the running Tomcat instance since its build-date to the
SecurityListener, and log a warning if the server is old. (schultz) \+ Fix: When
using the AsyncContext, throw an IllegalStateException, rather than allowing an
NullPointerException, if an attempt is made to use the AsyncContext after it has
been recycled. (markt) \+ Fix: Correct JPMS and OSGi meta-data for tomcat-embed-
core.jar by removing reference to org.apache.catalina.ssi package that is no
longer included in the JAR. Based on pull request #684 by Jendrik Johannes.
(markt) \+ Fix: Fix ServiceBindingPropertySource so that trailing \r\n sequences
are correctly removed from files containing property values when configured to
do so. Bug identified by Coverity Scan. (markt) \+ Add: Add improvements to the
CSRF prevention filter including the ability to skip adding nonces for resource
name and subtree URL patterns. (schultz) \+ Fix: Review usage of debug logging
and downgrade trace or data dumping operations from debug level to trace. (remm)
\+ Fix: 68089: Further improve the performance of request attribute access for
ApplicationHttpRequest and ApplicationRequest. (markt) \+ Fix: 68559: Allow
asynchronous error handling to write to the response after an error during
asynchronous processing. (markt) * Coyote \+ Fix: Improve the HTTP/2 stream
prioritisation process. If a stream uses all of the connection windows and still
has content to write, it will now be added to the backlog immediately rather
than waiting until the write attempt for the remaining content. (markt) \+ Fix:
Add threadsMaxIdleTime attribute to the endpoint, to allow configuring the
amount of time before an internal executor will scale back to the configured
minSpareThreads size. (remm) \+ Fix: Correct a regression in the support for
user provided SSLContext instances that broke the
org.apache.catalina.security.TLSCertificateReloadListener. (markt) \+ Fix:
Setting a null value for a cookie attribute should remove the attribute. (markt)
\+ Fix: Make asynchronous error handling more robust. Ensure that once a
connection is marked to be closed, further asynchronous processing cannot change
that. (markt) \+ Fix: Make asynchronous error handling more robust. Ensure that
once the call to AsyncListener.onError() has returned to the container, only
container threads can access the AsyncContext. This protects against various
race conditions that woudl otherwise occur if application threads continued to
access the AsyncContext. \+ Fix: Review usage of debug logging and downgrade
trace or data dumping operations from debug level to trace. In particular, most
of the HTTP/2 debug logging has been changed to trace level. (remm) \+ Fix: Add
support for user provided SSLContext instances configured on
SSLHostConfigCertificate instances. Based on pull request #673 provided by Hakan
Altındağ. (markt) \+ Fix: Partial fix for 68558: Cache the result of converting
to String for request URI, HTTP header names and the request Content-Type value
to improve performance by reducing repeated byte[] to String conversions.
(markt) \+ Fix: Improve error reporting to HTTP/2 clients for header processing
errors by reporting problems at the end of the frame where the error was
detected rather than at the end of the headers. (markt) \+ Fix: Remove the
remaining reference to a stream once the stream has been recycled. This makes
the stream eligible for garbage collection earlier and thereby improves
scalability. (markt) * Jasper \+ Add: Add support for specifying Java 22 (with
the value 22) as the compiler source and/or compiler target for JSP compilation.
If used with an Eclipse JDT compiler version that does not support these values,
a warning will be logged and the default will used. (markt) \+ Fix: Handle the
case where the JSP engine forwards a request/response to a Servlet that uses an
OutputStream rather than a Writer. This was triggering an IllegalStateException
on code paths where there was a subsequent attempt to obtain a Writer. (markt)
\+ Fix: Correctly handle the case where a tag library is packaged in a JAR file
and the web application is deployed as a WAR file rather than an unpacked
directory. (markt) \+ Fix: 68546: Generate optimal size and types for JSP
imports maps, as suggested by John Engebretson. (remm) \+ Fix: Review usage of
debug logging and downgrade trace or data dumping operations from debug level to
trace. (remm) * Cluster \+ Fix: Avoid updating request count stats on async.
(remm) * WebSocket \+ Fix: Correct a regression in the fix for 66508 that could
cause an UpgradeProcessor leak in some circumstances. (markt) \+ Fix: Review
usage of debug logging and downgrade trace or data dumping operations from debug
level to trace. (remm) \+ Fix: Ensure that WebSocket connection closure
completes if the connection is closed when the server side has used the
proprietary suspend/resume feature to suspend the connection. (markt) * Web
applications Add: Add support for responses in JSON format from the examples
application RequestHeaderExample. (schultz) * Other \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt) \+ Fix: 57130: Allow digest.(sh|bat) to accept password from a
file or stdin. (csutherl/schultz) \+ Update: Update Checkstyle to 10.14.1.
(markt) \+ Fix: Correct the remaining OSGi contract references in the manifest
files to refer to the Jakarta EE contract names rather than the Java EE contract
names. Based on pull request #685 provided by Paul A. Nicolucci. (markt) \+
Update: Update Checkstyle to 10.13.0. (markt) \+ Update: Update JSign to 6.0.
(markt) \+ Update: Update the packaged version of the Tomcat Migration Tool for
Jakarta EE to 1.0.7. (markt) \+ Update: Update Tomcat Native to 2.0.7. (markt)
\+ Update: Add strings for debug level messages. (remm) \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1204=1

* Web and Scripting Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1204=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-embed-10.1.20-150200.5.22.2
* tomcat10-jsvc-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2
* tomcat10-docs-webapp-10.1.20-150200.5.22.2
* Web and Scripting Module 15-SP5 (noarch)
* tomcat10-admin-webapps-10.1.20-150200.5.22.2
* tomcat10-lib-10.1.20-150200.5.22.2
* tomcat10-webapps-10.1.20-150200.5.22.2
* tomcat10-el-5_0-api-10.1.20-150200.5.22.2
* tomcat10-10.1.20-150200.5.22.2
* tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2
* tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2

## References:

* https://www.suse.com/security/cve/CVE-2024-23672.html
* https://www.suse.com/security/cve/CVE-2024-24549.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221385
* https://bugzilla.suse.com/show_bug.cgi?id=1221386



SUSE-SU-2024:1192-1: important: Security update for less


# Security update for less

Announcement ID: SUSE-SU-2024:1192-1
Rating: important
References:

* bsc#1219901

Cross-References:

* CVE-2022-48624

CVSS scores:

* CVE-2022-48624 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap Micro 5.3
* openSUSE Leap Micro 5.4
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for less fixes the following issues:

* CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell
metacharacters (bsc#1219901).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2024-1192=1

* openSUSE Leap Micro 5.3
zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1192=1

* openSUSE Leap Micro 5.4
zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1192=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1192=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2024-1192=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2024-1192=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1192=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1192=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1192=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1192=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1192=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1192=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1192=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1192=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1192=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1192=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.3 (aarch64 x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Proxy 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* less-debugsource-590-150400.3.6.2
* less-debuginfo-590-150400.3.6.2
* less-590-150400.3.6.2

## References:

* https://www.suse.com/security/cve/CVE-2022-48624.html
* https://bugzilla.suse.com/show_bug.cgi?id=1219901



SUSE-SU-2024:1174-1: moderate: Security update for qt6-base


# Security update for qt6-base

Announcement ID: SUSE-SU-2024:1174-1
Rating: moderate
References:

* bsc#1221926

Cross-References:

* CVE-2024-30161

CVSS scores:

* CVE-2024-30161 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Affected Products:

* Desktop Applications Module 15-SP5
* openSUSE Leap 15.5
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Package Hub 15 15-SP5

An update that solves one vulnerability can now be installed.

## Description:

This update for qt6-base fixes the following issues:

* CVE-2024-30161: Fixed QNetworkReply header data access via a dangling
pointer (bsc#1221926).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Package Hub 15 15-SP5
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1174=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2024-1174=1 openSUSE-SLE-15.5-2024-1174=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1174=1

## Package List:

* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* SUSE Package Hub 15 15-SP5 (noarch)
* qt6-base-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* qt6-gui-private-devel-6.4.2-150500.3.17.1
* qt6-base-common-devel-debuginfo-6.4.2-150500.3.17.1
* qt6-concurrent-devel-6.4.2-150500.3.17.1
* qt6-kmssupport-devel-static-6.4.2-150500.3.17.1
* qt6-test-devel-6.4.2-150500.3.17.1
* libQt6Sql6-6.4.2-150500.3.17.1
* qt6-printsupport-cups-debuginfo-6.4.2-150500.3.17.1
* qt6-test-private-devel-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* qt6-sql-devel-6.4.2-150500.3.17.1
* libQt6Concurrent6-debuginfo-6.4.2-150500.3.17.1
* qt6-printsupport-cups-6.4.2-150500.3.17.1
* qt6-dbus-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-6.4.2-150500.3.17.1
* qt6-base-docs-html-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-6.4.2-150500.3.17.1
* libQt6Concurrent6-6.4.2-150500.3.17.1
* qt6-networkinformation-nm-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-debuginfo-6.4.2-150500.3.17.1
* qt6-widgets-private-devel-6.4.2-150500.3.17.1
* qt6-platformsupport-private-devel-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* qt6-core-private-devel-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6Sql6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-6.4.2-150500.3.17.1
* qt6-platformsupport-devel-static-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.17.1
* qt6-xml-devel-6.4.2-150500.3.17.1
* qt6-opengl-devel-6.4.2-150500.3.17.1
* qt6-core-devel-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* qt6-sql-private-devel-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-6.4.2-150500.3.17.1
* libQt6PrintSupport6-6.4.2-150500.3.17.1
* qt6-sql-sqlite-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-widgets-devel-6.4.2-150500.3.17.1
* qt6-printsupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-docs-qch-6.4.2-150500.3.17.1
* qt6-sql-mysql-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-platformtheme-gtk3-6.4.2-150500.3.17.1
* qt6-openglwidgets-devel-6.4.2-150500.3.17.1
* libQt6Xml6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-private-devel-6.4.2-150500.3.17.1
* qt6-sql-postgresql-debuginfo-6.4.2-150500.3.17.1
* qt6-gui-devel-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* qt6-networkinformation-glib-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* libQt6Xml6-6.4.2-150500.3.17.1
* qt6-platformtheme-xdgdesktopportal-debuginfo-6.4.2-150500.3.17.1
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-sql-mysql-debuginfo-6.4.2-150500.3.17.1
* qt6-xml-private-devel-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-6.4.2-150500.3.17.1
* qt6-kmssupport-private-devel-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* qt6-sql-sqlite-6.4.2-150500.3.17.1
* qt6-sql-unixODBC-6.4.2-150500.3.17.1
* qt6-network-devel-6.4.2-150500.3.17.1
* libQt6Test6-debuginfo-6.4.2-150500.3.17.1
* qt6-base-examples-debuginfo-6.4.2-150500.3.17.1
* qt6-opengl-private-devel-6.4.2-150500.3.17.1
* qt6-printsupport-devel-6.4.2-150500.3.17.1
* libQt6Test6-6.4.2-150500.3.17.1
* qt6-base-common-devel-6.4.2-150500.3.17.1
* libQt6PrintSupport6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGLWidgets6-debuginfo-6.4.2-150500.3.17.1
* qt6-dbus-private-devel-6.4.2-150500.3.17.1
* openSUSE Leap 15.5 (noarch)
* qt6-base-private-devel-6.4.2-150500.3.17.1
* qt6-base-devel-6.4.2-150500.3.17.1
* qt6-docs-common-6.4.2-150500.3.17.1
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libQt6Network6-6.4.2-150500.3.17.1
* qt6-network-tls-debuginfo-6.4.2-150500.3.17.1
* libQt6Core6-6.4.2-150500.3.17.1
* libQt6OpenGL6-6.4.2-150500.3.17.1
* qt6-base-debuginfo-6.4.2-150500.3.17.1
* qt6-base-debugsource-6.4.2-150500.3.17.1
* libQt6Network6-debuginfo-6.4.2-150500.3.17.1
* libQt6DBus6-debuginfo-6.4.2-150500.3.17.1
* qt6-network-tls-6.4.2-150500.3.17.1
* libQt6Gui6-6.4.2-150500.3.17.1
* libQt6Widgets6-6.4.2-150500.3.17.1
* libQt6DBus6-6.4.2-150500.3.17.1
* libQt6Core6-debuginfo-6.4.2-150500.3.17.1
* libQt6Widgets6-debuginfo-6.4.2-150500.3.17.1
* libQt6Gui6-debuginfo-6.4.2-150500.3.17.1
* libQt6OpenGL6-debuginfo-6.4.2-150500.3.17.1

## References:

* https://www.suse.com/security/cve/CVE-2024-30161.html
* https://bugzilla.suse.com/show_bug.cgi?id=1221926