SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-336
Security update for jasper
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for jasper fixes the following issues:
- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
jasper-2.0.14-3.22.1.src.rpm
libjasper-devel-2.0.14-3.22.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2687
Security update for fwupd
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for fwupd fixes the following issues:
- Ignore non-PCI NVMe devices (e.g. NVMe-over-Fabrics) when probing (bsc#1193921)
- package was rebuilt with new UEFI secure boot key. (bsc#1198581)
fwupd-1.7.3-150400.3.3.19.src.rpm
fwupd-1.7.3-150400.3.3.19.x86_64.rpm
fwupd-devel-1.7.3-150400.3.3.19.x86_64.rpm
fwupd-lang-1.7.3-150400.3.3.19.noarch.rpm
libfwupd2-1.7.3-150400.3.3.19.x86_64.rpm
libfwupdplugin5-1.7.3-150400.3.3.19.x86_64.rpm
typelib-1_0-Fwupd-2_0-1.7.3-150400.3.3.19.x86_64.rpm
typelib-1_0-FwupdPlugin-1_0-1.7.3-150400.3.3.19.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2088
Recommended update for firewalld
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for firewalld fixes the following issues:
- Fixes setting the default zone to external during installation problem (bsc#1191837)
firewall-applet-0.9.3-150400.8.3.19.noarch.rpm
firewall-config-0.9.3-150400.8.3.19.noarch.rpm
firewalld-0.9.3-150400.8.3.19.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1739
Optional update for SUSE Package Hub
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This optional update provides the following changes:
- Provide binaries for non x86_64 architectures directly to SUSE Package Hub.
- There are no visible changes for the final user.
- Affected source packages: libGLw motif
libMrm4-2.3.4-150000.3.5.1.x86_64.rpm
libUil4-2.3.4-150000.3.5.1.x86_64.rpm
libUil4-32bit-2.3.4-150000.3.5.1.x86_64.rpm
libXm4-2.3.4-150000.3.5.1.x86_64.rpm
motif-2.3.4-150000.3.5.1.src.rpm
motif-2.3.4-150000.3.5.1.x86_64.rpm
motif-devel-2.3.4-150000.3.5.1.x86_64.rpm
libMrm4-32bit-2.3.4-150000.3.5.1.x86_64.rpm
libXm4-32bit-2.3.4-150000.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1579
Recommended update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.9.0 ESR
MFSA 2022-17 (bsc#1198970)
* CVE-2022-29914: Fullscreen notification bypass using popups
* CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
* CVE-2022-29916: Leaking browser history with CSS variables
* CVE-2022-29911: iframe Sandbox bypass
* CVE-2022-29912: Reader mode bypassed SameSite cookies
* CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
MozillaFirefox-91.9.0-150200.152.33.1.src.rpm
MozillaFirefox-91.9.0-150200.152.33.1.x86_64.rpm
MozillaFirefox-devel-91.9.0-150200.152.33.1.x86_64.rpm
MozillaFirefox-translations-common-91.9.0-150200.152.33.1.x86_64.rpm
MozillaFirefox-translations-other-91.9.0-150200.152.33.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1767
Optional update for SUSE Package Hub
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This optional update provides the following changes:
- Provide binaries for non x86_64 architectures directly to SUSE Package Hub.
- There are no visible changes for the final user.
- Affected source packages: rasqal redland raptor
libraptor-devel-2.0.15-150200.9.9.1.x86_64.rpm
libraptor2-0-2.0.15-150200.9.9.1.x86_64.rpm
raptor-2.0.15-150200.9.9.1.src.rpm
raptor-2.0.15-150200.9.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1864
Recommended update for leveldb
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for leveldb fixes the following issue:
- fix tests (bsc#1197742)
leveldb-1.18-150000.3.3.1.src.rpm
leveldb-devel-1.18-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1867
Recommended update for v4l-utils
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for v4l-utils fixes the following issues:
- fix build (bsc#1197861)
libdvbv5-0-1.14.1-150000.3.3.1.x86_64.rpm
libdvbv5-devel-1.14.1-150000.3.3.1.x86_64.rpm
libv4l-devel-1.14.1-150000.3.3.1.x86_64.rpm
libv4l2rds0-1.14.1-150000.3.3.1.x86_64.rpm
v4l-utils-1.14.1-150000.3.3.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2093
Recommended update for open-vm-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- Update to 12.0.0 (build 19345655) (bsc#1196803)
- Update open-vm-tools 12.0.0. (jsc#SLE-24097)
- Support for managing Salt Minion through guest variables. A new open-vm-tools-salt-minion rpm is added to handle this support.
- New ComponentMgr plugin to manage (add, remove, monitor) components on the guest VM.
- Patch to fix potential Fail to Build from Source. (bsc#1196804)
- Build vmhgfs with either libfuse2 or libfuse3.
open-vm-tools-12.0.0-150300.16.1.src.rpm
open-vm-tools-desktop-12.0.0-150300.16.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2737
Recommended update for gedit
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gedit fixes the following issues:
- Add necessary dependency to resolve schema "is not installed" error after install in WSL (bsc#1198312)
gedit-40.1-150400.4.3.1.src.rpm
gedit-40.1-150400.4.3.1.x86_64.rpm
gedit-devel-40.1-150400.4.3.1.x86_64.rpm
gedit-lang-40.1-150400.4.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1748
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970):
- CVE-2022-29914: Fullscreen notification bypass using popups
- CVE-2022-29909: Bypassing permission prompt in nested browsing contexts
- CVE-2022-29916: Leaking browser history with CSS variables
- CVE-2022-29911: iframe Sandbox bypass
- CVE-2022-29912: Reader mode bypassed SameSite cookies
- CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9
MozillaFirefox-91.9.0-150200.152.37.3.src.rpm
MozillaFirefox-91.9.0-150200.152.37.3.x86_64.rpm
MozillaFirefox-devel-91.9.0-150200.152.37.3.x86_64.rpm
MozillaFirefox-translations-common-91.9.0-150200.152.37.3.x86_64.rpm
MozillaFirefox-translations-other-91.9.0-150200.152.37.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1898
Security update for fribidi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for fribidi fixes the following issues:
- CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147).
- CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148).
- CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150).
fribidi-1.0.10-150400.3.3.1.src.rpm
libfribidi0-32bit-1.0.10-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2804
Recommended update for gvfs
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gvfs fixes the following issues:
- Fixes inability to mount smb shares with samba 4.16 (bsc#1198718)
- Fix build with meson 0.61 and newer
- Package org.gtk.vfs.file-operations.rules polkit rules file as an example in docs
gvfs-1.48.1-150400.4.3.1.src.rpm
gvfs-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-backend-afc-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-backend-samba-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-backends-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-devel-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-fuse-1.48.1-150400.4.3.1.x86_64.rpm
gvfs-lang-1.48.1-150400.4.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2087
Optional update for SUSE Package Hub
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This optional update provides the following changes:
- Provide binaries for non x86_64 architectures directly to SUSE Package Hub.
- There are no visible changes for the final user.
- Affected source packages: rp-pppoe linux-atm ppp
ppp-2.4.7-150000.5.8.1.src.rpm
ppp-2.4.7-150000.5.8.1.x86_64.rpm
ppp-devel-2.4.7-150000.5.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1830
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768):
- CVE-2022-1802: Prototype pollution in Top-Level Await implementation
- CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution
MozillaFirefox-91.9.1-150200.152.40.1.src.rpm
MozillaFirefox-91.9.1-150200.152.40.1.x86_64.rpm
MozillaFirefox-devel-91.9.1-150200.152.40.1.x86_64.rpm
MozillaFirefox-translations-common-91.9.1-150200.152.40.1.x86_64.rpm
MozillaFirefox-translations-other-91.9.1-150200.152.40.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2994
Recommended update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame adds some missing 32bit libraries to some products. (bsc#1198925)
No codechanges were done in this update.
lame-3.100-150000.3.2.1.src.rpm
libass-0.14.0-150000.3.11.1.src.rpm
libass-devel-0.14.0-150000.3.11.1.x86_64.rpm
libass9-0.14.0-150000.3.11.1.x86_64.rpm
libcdio-0.94-150000.6.11.1.src.rpm
libcdio-paranoia-10.2+0.93+1-150000.3.2.1.src.rpm
libcdio-paranoia-devel-10.2+0.93+1-150000.3.2.1.x86_64.rpm
libcdio16-0.94-150000.6.11.1.x86_64.rpm
libcdio_cdda2-10.2+0.93+1-150000.3.2.1.x86_64.rpm
libcdio_paranoia2-10.2+0.93+1-150000.3.2.1.x86_64.rpm
libdc1394-2.2.5-150000.3.2.1.src.rpm
libdc1394-22-2.2.5-150000.3.2.1.x86_64.rpm
libdc1394-devel-2.2.5-150000.3.2.1.x86_64.rpm
libdc1394-tools-2.2.5-150000.3.2.1.x86_64.rpm
libgsm-1.0.14-150000.3.4.1.src.rpm
libgsm-devel-1.0.14-150000.3.4.1.x86_64.rpm
libgsm1-1.0.14-150000.3.4.1.x86_64.rpm
libmp3lame-devel-3.100-150000.3.2.1.x86_64.rpm
libopenjpeg1-1.5.2-150000.4.7.1.x86_64.rpm
libraw1394-11-2.1.1-150000.3.2.1.x86_64.rpm
libraw1394-2.1.1-150000.3.2.1.src.rpm
libraw1394-devel-2.1.1-150000.3.2.1.x86_64.rpm
libtwolame-devel-0.3.13-150000.3.2.2.x86_64.rpm
libvdpau-1.1.1-150000.3.2.1.src.rpm
libvdpau-devel-1.1.1-150000.3.2.1.x86_64.rpm
libvdpau1-1.1.1-150000.3.2.1.x86_64.rpm
libvpx-1.6.1-150000.6.8.1.src.rpm
libvpx4-1.6.1-150000.6.8.1.x86_64.rpm
libxcb-1.13-150000.3.9.1.src.rpm
libxcb-render0-32bit-1.13-150000.3.9.1.x86_64.rpm
openjpeg-1.5.2-150000.4.7.1.src.rpm
openjpeg-devel-1.5.2-150000.4.7.1.x86_64.rpm
twolame-0.3.13-150000.3.2.2.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1904
Recommended update for libbluray
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libbluray fixes the following issues:
- Implement the new java.io.FileSystem.isInvalid method that entered all
supported java versions with April 2022 CPU (bsc#1199463)
libbluray-1.3.0-150300.10.7.1.src.rpm
libbluray-devel-1.3.0-150300.10.7.1.x86_64.rpm
libbluray2-1.3.0-150300.10.7.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1924
Recommended update for mutter
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for mutter fixes the following issues:
- Fix SIGSEGV in meta_context_terminate (bsc#1199382 glgo#GNOME/mutter#2267).
- Update to version 41.5:
+ Fix X11 wayland drops ending up in the wrong wayland client.
+ Allow forcing EGLStream backend.
+ Updated translations.
mutter-41.5-150400.3.3.1.src.rpm
mutter-41.5-150400.3.3.1.x86_64.rpm
mutter-devel-41.5-150400.3.3.1.x86_64.rpm
mutter-lang-41.5-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1920
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027)
- CVE-2022-31736: Cross-Origin resource's length leaked
- CVE-2022-31737: Heap buffer overflow in WebGL
- CVE-2022-31738: Browser window spoof using fullscreen mode
- CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files
- CVE-2022-31740: Register allocation problem in WASM on arm64
- CVE-2022-31741: Uninitialized variable leads to invalid memory read
- CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information
- CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10
MozillaFirefox-91.10.0-150200.152.43.1.src.rpm
MozillaFirefox-91.10.0-150200.152.43.1.x86_64.rpm
MozillaFirefox-devel-91.10.0-150200.152.43.1.x86_64.rpm
MozillaFirefox-translations-common-91.10.0-150200.152.43.1.x86_64.rpm
MozillaFirefox-translations-other-91.10.0-150200.152.43.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3300
Recommended update for gnome-shell-extension-desktop-icons
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gnome-shell-extension-desktop-icons fixes the following issues:
- Fix desktop icons to be Compatible with GNOME 41 (bsc#1199377, bsc#1203262)
gnome-shell-extension-desktop-icons-20.10.0-150400.4.5.1.noarch.rpm
gnome-shell-extension-desktop-icons-20.10.0-150400.4.5.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3089
Recommended update for gnome-packagekit
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gnome-packagekit fixes the following issues:
- Fix runtime error to make it work as before. (bsc#1198801)
gnome-packagekit-3.32.0-150400.12.3.1.src.rpm
gnome-packagekit-3.32.0-150400.12.3.1.x86_64.rpm
gnome-packagekit-lang-3.32.0-150400.12.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2071
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.36.3 (bsc#1200106)
- CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287).
- CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
- CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106).
libjavascriptcoregtk-4_1-0-2.36.3-150400.4.3.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.36.3-150400.4.3.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.36.3-150400.4.3.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.36.3-150400.4.3.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.36.3-150400.4.3.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.36.3-150400.4.3.1.x86_64.rpm
webkit2gtk3-2.36.3-150400.4.3.1.src.rpm
webkit2gtk3-devel-2.36.3-150400.4.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2298
Security update for liblouis
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for liblouis fixes the following issues:
- CVE-2022-26981: fix buffer overrun in compilePassOpcode (bsc#1197085).
- CVE-2022-31783: prevent an invalid memory write in compileRule (bsc#1200120).
liblouis-3.20.0-150400.3.3.1.src.rpm
liblouis-data-3.20.0-150400.3.3.1.noarch.rpm
liblouis-devel-3.20.0-150400.3.3.1.x86_64.rpm
liblouis20-3.20.0-150400.3.3.1.x86_64.rpm
python3-louis-3.20.0-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3149
Recommended update for hplip
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for hplip fixes the following issues:
- Fix C compiler flags which results in better device detection. (bsc#1198794)
hplip-3.21.10-150400.3.3.1.src.rpm
hplip-3.21.10-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2102
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955).
- CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770).
- CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167).
- CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902).
- CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903).
- CVE-2021-3974: Fixed use-after-free (bsc#1192904).
- CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466).
- CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905).
- CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093).
- CVE-2021-4192: Fixed use-after-free (bsc#1194217).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388).
- CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885).
- CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872).
- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203).
- CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332).
- CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354).
- CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361).
- CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596).
- CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748).
- CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331).
- CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333).
- CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334).
- CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655).
- CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651).
- CVE-2022-1771: Fixed stack exhaustion (bsc#1199693).
- CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745).
- CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747).
- CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936).
- CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010).
- CVE-2022-1898: Fixed use-after-free (bsc#1200011).
- CVE-2022-1927: Fixed buffer over-read (bsc#1200012).
gvim-8.2.5038-150000.5.21.1.x86_64.rpm
vim-8.2.5038-150000.5.21.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2322
Security update for fwupd
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of fwupd fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
fwupd-1.5.8-150300.3.5.1.src.rpm
fwupdtpmevlog-1.5.8-150300.3.5.1.x86_64.rpm
libfwupdplugin1-1.5.8-150300.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2301
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2022-32545: Fixed an outside the range of representable values of type. (bsc#1200388)
- CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389)
- CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387)
ImageMagick-7.1.0.9-150400.6.3.1.src.rpm
ImageMagick-7.1.0.9-150400.6.3.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.3.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.3.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.3.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.3.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.3.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.3.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2313
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793):
- CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381)
- CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604)
- CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537)
- CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951)
- CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123)
- CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717)
- CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595)
- CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246)
- CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651)
MozillaFirefox-91.11.0-150200.152.48.1.src.rpm
MozillaFirefox-91.11.0-150200.152.48.1.x86_64.rpm
MozillaFirefox-devel-91.11.0-150200.152.48.1.x86_64.rpm
MozillaFirefox-translations-common-91.11.0-150200.152.48.1.x86_64.rpm
MozillaFirefox-translations-other-91.11.0-150200.152.48.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2473
Recommended update for firewalld
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for firewalld fixes the following issues:
- Fix regression introduced in previous patch (an api change to a
function also needed backporting) (bsc#1198814)
firewall-applet-0.9.3-150400.8.6.1.noarch.rpm
firewall-config-0.9.3-150400.8.6.1.noarch.rpm
firewalld-0.9.3-150400.8.6.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2928
Recommended update for bluez
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of bluez ships the missing bluez-deprecated package. (bsc#1201060)
bluez-5.62-150400.4.2.1.src.rpm
bluez-devel-5.62-150400.4.2.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3148
Recommended update for branding-SLE
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for branding-SLE fixes the following issues:
- Fix bootloader menu to display correct operating system information (bsc#997317, bsc#1199818)
branding-SLE-15-150400.38.3.1.src.rpm
gdm-branding-SLE-15-150400.38.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2736
Recommended update for libqt5-qttools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libqt5-qttools fixes the following issues:
- Increase the disk constraint to 4.5G (bsc#1200152)
libQt5Designer5-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libQt5DesignerComponents5-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libQt5Help5-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libqt5-linguist-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libqt5-linguist-devel-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libqt5-qttools-5.15.2+kde17-150400.3.3.1.src.rpm
libqt5-qttools-devel-5.15.2+kde17-150400.3.3.1.x86_64.rpm
libqt5-qttools-private-headers-devel-5.15.2+kde17-150400.3.3.1.noarch.rpm
libqt5-qttools-qhelpgenerator-5.15.2+kde17-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3113
Recommended update for PackageKit
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for PackageKit fixes the following issues:
- Ensure locked packages are not listed as being able to be updated (bsc#1199895)
PackageKit-1.2.4-150400.3.3.1.src.rpm
True
PackageKit-1.2.4-150400.3.3.1.x86_64.rpm
True
PackageKit-backend-zypp-1.2.4-150400.3.3.1.x86_64.rpm
True
PackageKit-devel-1.2.4-150400.3.3.1.x86_64.rpm
True
PackageKit-lang-1.2.4-150400.3.3.1.noarch.rpm
True
libpackagekit-glib2-18-1.2.4-150400.3.3.1.x86_64.rpm
True
libpackagekit-glib2-devel-1.2.4-150400.3.3.1.x86_64.rpm
True
typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.3.1.x86_64.rpm
True
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2523
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.36.4 (bsc#1201221):
- CVE-2022-22662: Processing maliciously crafted web content may disclose sensitive user information.
- CVE-2022-22677: The video in a webRTC call may be interrupted if the audio capture gets interrupted.
- CVE-2022-26710: Processing maliciously crafted web content may lead to arbitrary code execution.
libjavascriptcoregtk-4_1-0-2.36.4-150400.4.6.2.x86_64.rpm
libwebkit2gtk-4_1-0-2.36.4-150400.4.6.2.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.36.4-150400.4.6.2.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.36.4-150400.4.6.2.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.36.4-150400.4.6.2.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.36.4-150400.4.6.2.x86_64.rpm
webkit2gtk3-2.36.4-150400.4.6.2.src.rpm
webkit2gtk3-devel-2.36.4-150400.4.6.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3086
Feature update for iio-sensor-proxy
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for iio-sensor-proxy fixes the following issues:
- New package iio-sensor-proxy required because otherwise libQt5Sensors5 can't be installed (bsc#1199308, jsc#SLE-24553)
iio-sensor-proxy-3.3-150400.9.3.1.src.rpm
iio-sensor-proxy-3.3-150400.9.3.1.x86_64.rpm
iio-sensor-proxy-doc-3.3-150400.9.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3130
Recommended update for libqt5-qtbase
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libqt5-qtbase fixes the following issues:
- Fix some HTTP/2 communication (bsc#1200715)
- Mitigate issue with -D_FORTIFY_SOURCE=3 seen with GCC 12
libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.3.1.x86_64.rpm
libQt5Sql5-mysql-5.15.2+kde294-150400.6.3.1.x86_64.rpm
libQt5Sql5-postgresql-5.15.2+kde294-150400.6.3.1.x86_64.rpm
libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.3.1.x86_64.rpm
libqt5-qtbase-5.15.2+kde294-150400.6.3.1.src.rpm
libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3011
Recommended update for tigervnc
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for tigervnc fixes the following issues:
- Fix VNC client not refreshing screen correctly due to an issue on TLS stream buffers (bsc#1199477)
libXvnc-devel-1.10.1-150400.7.5.2.x86_64.rpm
tigervnc-1.10.1-150400.7.5.2.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3204
Recommended update for xdg-desktop-portal-gtk
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for xdg-desktop-portal-gtk fixes the following issues:
- Make the process exit after one second unless it has active sessions (bsc#1179465)
xdg-desktop-portal-gtk-1.10.0-150400.4.3.1.src.rpm
xdg-desktop-portal-gtk-1.10.0-150400.4.3.1.x86_64.rpm
xdg-desktop-portal-gtk-lang-1.10.0-150400.4.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2681
Security update for wavpack
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wavpack fixes the following issues:
- CVE-2022-2476: Fixed a Null pointer dereference in wvunpack (bsc#1201716).
wavpack-5.4.0-150000.4.15.1.src.rpm
wavpack-5.4.0-150000.4.15.1.x86_64.rpm
wavpack-devel-5.4.0-150000.4.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2969
Optional update for SUSE Package Hub
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This optional update provides the following changes:
- Fix KDE Plasma 5 missing binaries in SUSE Linux Enterprise Desktop 15 Service Pack 4 via PackageHub (bsc#1201055)
- Affected source packages: AppStream attica-qt5 ffmpeg-4 gucharmap karchive kauth kbookmarks kcodecs kcompletion
kconfig kconfigwidgets kcoreaddons kcrash kdbusaddons kded kdoctools kglobalaccel kguiaddons ki18n kiconthemes
kitemviews kjobwidgets knotifications kservice ktextwidgets kwallet kwidgetsaddons kwindowsystem kxmlgui
libqt5-qtvirtualkeyboard polkit-qt5-1 solid sonnet xcb-util-cursor
AppStream-0.15.1-150400.3.2.3.src.rpm
AppStream-devel-0.15.1-150400.3.2.3.x86_64.rpm
ffmpeg-4-4.4-150400.3.2.1.src.rpm
libappstream4-0.15.1-150400.3.2.3.x86_64.rpm
libavcodec58_134-4.4-150400.3.2.1.x86_64.rpm
libavutil56_70-4.4-150400.3.2.1.x86_64.rpm
libswresample3_9-4.4-150400.3.2.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2640
Recommended update for yaml-cpp
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for yaml-cpp fixes the following issue:
- Version 0.6.3 changed ABI without changing SONAME. Re-add symbol from the old
ABI to prevent ABI breakage and crash of applications compiled with 0.6.1
(bsc#1200624, bsc#1178332, bsc#1178331, bsc#1160171).
yaml-cpp-0.6.3-150400.4.3.1.src.rpm
yaml-cpp-devel-0.6.3-150400.4.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2611
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.12.0 ESR (bsc#1201758):
- CVE-2022-36319: Mouse Position spoofing with CSS transforms
- CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters
MozillaFirefox-91.12.0-150200.152.53.1.src.rpm
MozillaFirefox-91.12.0-150200.152.53.1.x86_64.rpm
MozillaFirefox-devel-91.12.0-150200.152.53.1.x86_64.rpm
MozillaFirefox-translations-common-91.12.0-150200.152.53.1.x86_64.rpm
MozillaFirefox-translations-other-91.12.0-150200.152.53.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3128
Recommended update for gtk3 and gtk3-branding
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gtk3 and gtk3-branding fixes the following issues:
gtk3:
- Ensure python3-gobject-Gdk is isntalled as dependency (bsc#1200614)
- Include legacy hicolor icons (bsc#1197480)
- Fix axis name handling in GtkFontChooser
- Fix border color for tiled windows.
- Fix cell accessible leak in Accessibility
- Fix the build with gcc 12
- Wayland: Fix problem with textview scrolling
- Wayland: Support new high-contrast setting
- Wayland: Avoid unnecessary display scale changes
gtk3-branding:
- Resolve installation issues
gtk3-devel-doc-3.24.34-150400.3.3.1.x86_64.rpm
gtk3-doc-3.24.34-150400.3.3.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3102
Recommended update for gtk4
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gtk4 fixes the following issues:
- Ensure python3-gobject-Gdk is isntalled as dependency (bsc#1200614)
gtk4-4.6.0-150400.3.3.1.src.rpm
gtk4-devel-4.6.0-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2848
Recommended update for gdm
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gdm fixes the following issues:
- Disable Wayland on aspeed chipsets because of performance issues (bsc#1200323)
gdm-41.3-150400.4.3.1.src.rpm
gdm-41.3-150400.4.3.1.x86_64.rpm
gdm-devel-41.3-150400.4.3.1.x86_64.rpm
gdm-lang-41.3-150400.4.3.1.noarch.rpm
gdm-schema-41.3-150400.4.3.1.noarch.rpm
gdm-systemd-41.3-150400.4.3.1.noarch.rpm
gdmflexiserver-41.3-150400.4.3.1.noarch.rpm
libgdm1-41.3-150400.4.3.1.x86_64.rpm
typelib-1_0-Gdm-1_0-41.3-150400.4.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2826
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- Update to version 2.36.5 (bsc#1201980):
- Add support for PAC proxy in the WebDriver implementation.
- Fix video playback when loaded through custom URIs, this fixes
video playback in the Yelp documentation browser.
- Fix WebKitWebView::context-menu when using GTK4.
- Fix LTO builds with GCC.
- Fix several crashes and rendering issues.
- Security fixes:
- CVE-2022-32792: Fixed processing maliciously crafted web content may lead to
arbitrary code execution.
- CVE-2022-32816: Fixed visiting a website that frames malicious content may lead to
UI spoofing.
libjavascriptcoregtk-4_1-0-2.36.5-150400.4.9.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.36.5-150400.4.9.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.36.5-150400.4.9.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.36.5-150400.4.9.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.36.5-150400.4.9.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.36.5-150400.4.9.1.x86_64.rpm
webkit2gtk3-2.36.5-150400.4.9.1.src.rpm
webkit2gtk3-devel-2.36.5-150400.4.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2896
Security update for raptor
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for raptor fixes the following issues:
- CVE-2020-25713: Fixed an out of bounds access triggered via a
malformed input file (bsc#1178903).
libraptor-devel-2.0.15-150200.9.12.1.x86_64.rpm
libraptor2-0-2.0.15-150200.9.12.1.x86_64.rpm
raptor-2.0.15-150200.9.12.1.src.rpm
raptor-2.0.15-150200.9.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2889
Recommended update for emacs-apel
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for emacs-apel fixes the following issues:
- Fix build issue on SUSE Linux Enterprise 15 Service Pack 4 (bsc#1197714)
emacs-apel-10.8-150000.3.3.1.noarch.rpm
emacs-apel-10.8-150000.3.3.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3946
Recommended update for wireplumber
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireplumber fixes the following issues:
- Fix to automatically enable wireplumber user service in new and current installations (bsc#1200485, bsc#1202008)
libwireplumber-0_4-0-0.4.9-150400.3.3.2.x86_64.rpm
wireplumber-0.4.9-150400.3.3.2.src.rpm
wireplumber-0.4.9-150400.3.3.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3103
Security update for python-bottle
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for python-bottle fixes the following issues:
- CVE-2022-31799: Fixed an error mishandling issue that could lead to
remote denial of service (bsc#1200286).
python-bottle-0.12.13-150000.3.6.1.src.rpm
python3-bottle-0.12.13-150000.3.6.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2998
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2022-2719: Fixed a reachable assertion that could lead to denial
of service via a crafted file (bsc#1202250).
- CVE-2022-28463: Fixed a buffer overflow that could be triggered by
a crafted input file (bsc#1199350).
ImageMagick-7.1.0.9-150400.6.6.1.src.rpm
ImageMagick-7.1.0.9-150400.6.6.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.6.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.6.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.6.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.6.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.6.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.6.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3252
Security update for freetype2
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for freetype2 fixes the following issues:
- CVE-2022-27404 Fixed a segmentation fault via a crafted typeface (bsc#1198830).
- CVE-2022-27405 Fixed a buffer overflow via a crafted typeface (bsc#1198832).
- CVE-2022-27406 Fixed a segmentation fault via a crafted typeface (bsc#1198823).
Non-security fixes:
- Updated to version 2.10.4
ft2demos-2.10.4-150000.4.12.1.nosrc.rpm
ftdump-2.10.4-150000.4.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3030
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 91.13.0 ESR (bsc#1202645):
- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
MozillaFirefox-91.13.0-150200.152.56.2.src.rpm
MozillaFirefox-91.13.0-150200.152.56.2.x86_64.rpm
MozillaFirefox-branding-SLE-91-150200.9.7.1.src.rpm
MozillaFirefox-branding-SLE-91-150200.9.7.1.x86_64.rpm
MozillaFirefox-devel-91.13.0-150200.152.56.2.x86_64.rpm
MozillaFirefox-translations-common-91.13.0-150200.152.56.2.x86_64.rpm
MozillaFirefox-translations-other-91.13.0-150200.152.56.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2936
Security update for open-vm-tools
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- Updated to version 12.1.0 (build 20219665) (bsc#1202733):
- CVE-2022-31676: Fixed an issue that could allow unprivileged users
inside a virtual machine to escalate privileges (bsc#1202657).
open-vm-tools-12.1.0-150300.19.1.src.rpm
open-vm-tools-desktop-12.1.0-150300.19.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3137
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- Updated to version 2.36.7 (bsc#1202807):
- CVE-2022-32893: Fixed an issue that would be triggered when
processing malicious web content and that could lead to arbitrary
code execution.
- Fixed several crashes and rendering issues.
- Updated to version 2.36.6:
- Fixed handling of touchpad scrolling on GTK4 builds
- Fixed WebKitGTK not allowing to be used from non-main threads
(bsc#1202169).
- Fixed several crashes and rendering issues
libjavascriptcoregtk-4_1-0-2.36.7-150400.4.12.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.36.7-150400.4.12.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.36.7-150400.4.12.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.36.7-150400.4.12.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.36.7-150400.4.12.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.36.7-150400.4.12.1.x86_64.rpm
webkit2gtk3-2.36.7-150400.4.12.1.src.rpm
webkit2gtk3-devel-2.36.7-150400.4.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3094
Security update for libostree
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libostree fixes the following issues:
- CVE-2014-9862: Fixed a memory corruption issue that could be
triggered when diffing binary files (bsc#1201770).
libostree-2021.6-150400.3.3.1.src.rpm
libostree-2021.6-150400.3.3.1.x86_64.rpm
libostree-devel-2021.6-150400.3.3.1.x86_64.rpm
typelib-1_0-OSTree-1_0-2021.6-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3229
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 0313:
- CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902).
- CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903).
- CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904).
- CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249).
- CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356).
- CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359).
- CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363).
- CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414).
- CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552).
- CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270).
- CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697).
- CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698).
- CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700).
- CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701).
- CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732).
- CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132).
- CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133).
- CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134).
- CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135).
- CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136).
- CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150).
- CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151).
- CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152).
- CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153).
- CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154).
- CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155).
- CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863).
- CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046).
- CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049).
- CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050).
- CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051).
- CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420).
- CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421).
- CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511).
- CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512).
- CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515).
- CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599).
- CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687).
- CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689).
- CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862).
Bugfixes:
- Fixing vim error on startup (bsc#1200884).
- Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620).
gvim-9.0.0313-150000.5.25.1.x86_64.rpm
vim-9.0.0313-150000.5.25.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3396
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Mozilla Firefox was updated to 102.3.0esr ESR (bsc#1200793, bsc#1201758, bsc#1202645, bsc#1203477):
- CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages.
- CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads.
- CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix.
- CVE-2022-40956: Fixed content-security-policy base-uri bypass.
- CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64.
- CVE-2022-40962: Fixed memory safety bugs.
- CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling.
- CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions.
- CVE-2022-38478: Fixed various memory safety issues.
- CVE-2022-38476: Fixed data race and potential use-after-free in PK11_ChangePW.
- CVE-2022-38477: Fixed memory safety bugs.
- CVE-2022-36319: Fixed mouse position spoofing with CSS transforms.
- CVE-2022-36318: Fixed directory indexes for bundled resources reflected URL parameters.
- CVE-2022-36314: Fixed unexpected network loads when opening local .lnk files.
- CVE-2022-2505: Fixed memory safety bugs.
- CVE-2022-34479: Fixed vulnerabilty where a popup window could be resized in a way to overlay the address bar with web content.
- CVE-2022-34470: Fixed use-after-free in nsSHistory.
- CVE-2022-34468: Fixed bypass of CSP sandbox header without `allow-scripts` via retargeted javascript: URI.
- CVE-2022-34482: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution.
- CVE-2022-34483: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution.
- CVE-2022-34476: Fixed vulnerability where ASN.1 parser could have been tricked into accepting malformed ASN.1.
- CVE-2022-34481: Fixed potential integer overflow in ReplaceElementsAt
- CVE-2022-34474: Fixed vulnerability where sandboxed iframes could redirect to external schemes.
- CVE-2022-34469: Fixed TLS certificate errors on HSTS-protected domains which could be bypassed by the user on Firefox for Android.
- CVE-2022-34471: Fixed vulnerability where a compromised server could trick a browser into an addon downgrade.
- CVE-2022-34472: Fixed vulnerability where an unavailable PAC file resulted in OCSP requests being blocked.
- CVE-2022-34478: Fixed vulnerability where Microsoft protocols can be attacked if a user accepts a prompt.
- CVE-2022-2200: Fixed vulnerability where undesired attributes could be set as part of prototype pollution.
- CVE-2022-34480: Fixed free of uninitialized pointer in lg_init.
- CVE-2022-34477: Fixed vulnerability in MediaError message property leaking information on cross-origin same-site pages.
- CVE-2022-34475: Fixed vulnerability where the HTML Sanitizer could have been bypassed via same-origin script via use tags.
- CVE-2022-34473: Fixed vulnerability where the HTML Sanitizer could have been bypassed via use tags.
- CVE-2022-34484: Fixed memory safety bugs.
- CVE-2022-34485: Fixed memory safety bugs.
MozillaFirefox-102.3.0-150200.152.61.1.src.rpm
MozillaFirefox-102.3.0-150200.152.61.1.x86_64.rpm
MozillaFirefox-branding-SLE-102-150200.9.10.1.src.rpm
MozillaFirefox-branding-SLE-102-150200.9.10.1.x86_64.rpm
MozillaFirefox-devel-102.3.0-150200.152.61.1.x86_64.rpm
MozillaFirefox-translations-common-102.3.0-150200.152.61.1.x86_64.rpm
MozillaFirefox-translations-other-102.3.0-150200.152.61.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3247
Security update for bluez
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for bluez fixes the following issues:
- CVE-2022-0204: Fixed check if the prepare writes would append more than the allowed maximum attribute length (bsc#1194704).
bluez-5.62-150400.4.5.1.src.rpm
bluez-devel-5.62-150400.4.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3684
Recommended update for celt, jack, libogg, libtheora
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for celt, jack, libogg, libtheora fixes the following issue:
- celt, jack, libogg, libtheora 32bit base libraries are shipped to meet dependencies of the ffmpeg 32bit libraries (bsc#1198925).
Also two bugs in jack were fixed (bsc#1132458 bsc#1108981).
celt-0.11.3-150000.3.3.1.src.rpm
celt-0.11.3-150000.3.3.1.x86_64.rpm
jack-1.9.12-150000.3.3.1.src.rpm
libcelt-devel-0.11.3-150000.3.3.1.x86_64.rpm
libcelt0-2-0.11.3-150000.3.3.1.x86_64.rpm
libjack-devel-1.9.12-150000.3.3.1.x86_64.rpm
libjack0-1.9.12-150000.3.3.1.x86_64.rpm
libjacknet0-1.9.12-150000.3.3.1.x86_64.rpm
libjackserver0-1.9.12-150000.3.3.1.x86_64.rpm
libtheora-1.1.1-150000.3.3.1.src.rpm
libtheora-devel-1.1.1-150000.3.3.1.x86_64.rpm
libtheora0-1.1.1-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3309
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Updated to Wireshark 3.6.8:
- CVE-2022-3190: Fixed F5 Ethernet Trailer dissector infinite loop (bsc#1203388).
- CVE-2021-4186: Fixed Gryphon dissector crash (bsc#1194165).
wireshark-3.6.8-150000.3.74.1.src.rpm
wireshark-devel-3.6.8-150000.3.74.1.x86_64.rpm
wireshark-ui-qt-3.6.8-150000.3.74.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3673
Security update for jasper
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for jasper fixes the following issues:
- CVE-2022-2963: Fixed memory leaks in function cmdopts_parse (bsc#1202642).
jasper-2.0.14-150000.3.28.1.src.rpm
libjasper-devel-2.0.14-150000.3.28.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3487
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2022-3213: Fixed heap buffer overflow when processing a malformed TIFF file (bsc#1203450).
ImageMagick-7.1.0.9-150400.6.9.1.src.rpm
ImageMagick-7.1.0.9-150400.6.9.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.9.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.9.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.9.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.9.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.9.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.9.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4299
Recommended update for dconf
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for dconf fixes the following issues:
- Re-enable fix for `dconf update` to restore correct permissions on db files (bsc#971074, bsc#1203344)
dconf-0.40.0-150400.3.3.2.src.rpm
dconf-devel-0.40.0-150400.3.3.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3904
Recommended update for openssh
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openssh fixes the following issue:
- Prevent empty messages from being sent. (bsc#1192439)
openssh-askpass-gnome-8.4p1-150300.3.12.1.src.rpm
openssh-askpass-gnome-8.4p1-150300.3.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3733
Recommended update for libheif
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libheif fixes the following issues:
- Add missing gdk-pixbuf loader scriptlets (bsc#1199987)
libheif-1.12.0-150400.3.3.1.src.rpm
libheif1-1.12.0-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3496
Security update for colord
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for colord fixes the following issues:
- CVE-2021-42523: Fixed a small memory leak in sqlite3_exec (bsc#1202802).
colord-1.4.5-150400.4.3.1.src.rpm
colord-color-profiles-1.4.5-150400.4.3.1.x86_64.rpm
libcolord-devel-1.4.5-150400.4.3.1.x86_64.rpm
libcolorhug2-1.4.5-150400.4.3.1.x86_64.rpm
typelib-1_0-Colord-1_0-1.4.5-150400.4.3.1.x86_64.rpm
typelib-1_0-Colorhug-1_0-1.4.5-150400.4.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3488
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Updated to version 2.36.8 (bsc#1203530):
- CVE-2022-32886: Fixed a buffer overflow issue that could potentially lead to code execution.
- CVE-2022-32912: Fixed an out-of-bounds read that could potentially lead to code execution.
libjavascriptcoregtk-4_1-0-2.36.8-150400.4.15.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.36.8-150400.4.15.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.36.8-150400.4.15.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.36.8-150400.4.15.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.36.8-150400.4.15.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.36.8-150400.4.15.1.x86_64.rpm
webkit2gtk3-2.36.8-150400.4.15.1.src.rpm
webkit2gtk3-devel-2.36.8-150400.4.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3598
Security update for exiv2
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for exiv2 fixes the following issues:
- CVE-2021-37621: Fixed denial of service due to infinite loop in Image:printIFDStructure (bsc#1189333).
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332).
- CVE-2021-37619: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1189331).
- CVE-2021-37618: Fixed out-of-bounds read in Exiv2:Jp2Image:printStructure (bsc#1189330).
- CVE-2021-32617: Fixed denial of service inside inefficient algorithm (quadratic complexity) (bsc#1186192).
- CVE-2021-31292: Fixed integer overflow in CrwMap:encode0x1810 (bsc#1188756).
- CVE-2021-31291: Fixed heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service (bsc#1188733).
- CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447).
- CVE-2020-18899: Fixed uncontrolled memory allocation (bsc#1189636).
- CVE-2020-18898: Fixed remote denial of service in printIFDStructure function (bsc#1189780).
- CVE-2018-8977: Fixed remote denial of service in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (bsc#1086798).
- CVE-2018-8976: Fixed remote denial of service in image.cpp Exiv2::Internal::stringFormat via out-of-bounds read (bsc#1086810).
- CVE-2018-5772: Fixed segmentation fault caused by uncontrolled recursion inthe Exiv2::Image::printIFDStructure (bsc#1076579).
- CVE-2018-18915: Fixed an infinite loop in the Exiv2:Image:printIFDStructure function (bsc#1114690).
- CVE-2018-10772: Fixed segmentation fault when the function Exiv2::tEXtToDataBuf() is finished (bsc#1092096).
exiv2-0.26-150000.6.16.1.src.rpm
libexiv2-26-0.26-150000.6.16.1.x86_64.rpm
libexiv2-devel-0.26-150000.6.16.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3889
Security update for exiv2
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for exiv2 fixes the following issues:
Updated to version 0.27.5 (jsc#PED-1393):
- CVE-2017-1000128: Fixed stack out of bounds read in JPEG2000 parser (bsc#1068871).
- CVE-2019-13108: Fixed integer overflow PngImage:readMetadata (bsc#1142675).
- CVE-2020-19716: Fixed buffer overflow vulnerability in the Databuf function in types.cpp (bsc#1188645).
- CVE-2021-29457: Fixed heap buffer overflow when write metadata into a crafted image file (bsc#1185002).
- CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447).
- CVE-2021-29623: Fixed read of uninitialized memory (bsc#1186053).
- CVE-2021-31291: Fixed heap-based buffer overflow in jp2image.cpp (bsc#1188733).
- CVE-2021-32617: Fixed denial of service due to inefficient algorithm (bsc#1186192).
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332).
- CVE-2021-37621: Fixed DoS due to infinite loop in Image:printIFDStructure (bsc#1189333).
- CVE-2021-37622: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189334)
- CVE-2021-34334: Fixed DoS due to integer overflow in loop counter(bsc#1189338)
- CVE-2021-37623: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189335)
- CVE-2021-29463: Fixed out-of-bounds read in webpimage.cpp (bsc#1185913).
- CVE-2021-34334: Fixed DoS due to integer overflow in loop counter (bsc#1189338)
- CVE-2019-13111: Fixed integer overflow in WebPImage:decodeChunks that lead to denial of service (bsc#1142679)
- CVE-2021-29463: Fixed an out-of-bounds read was found in webpimage.cpp (bsc#1185913)
Bugfixes:
- Fixed build using GCC 11 (bsc#1185218).
A new libexiv2-2_27 shared library is shipped, the libexiv2-2_26 is provided only for compatibility now.
Please recompile your applications using the exiv2 library.
exiv2-0.27.5-150400.15.4.1.src.rpm
exiv2-0_26-0.26-150400.9.16.1.src.rpm
libexiv2-26-0.26-150400.9.16.1.x86_64.rpm
libexiv2-27-0.27.5-150400.15.4.1.x86_64.rpm
libexiv2-devel-0.27.5-150400.15.4.1.x86_64.rpm
libexiv2-xmp-static-0.27.5-150400.15.4.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3726
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Updated to version 102.4.0 ESR (bsc#1204421)
- CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs.
- CVE-2022-42928: Fixed memory Corruption in JS Engine.
- CVE-2022-42929: Fixed denial of Service via window.print.
- CVE-2022-42932: Fixed memory safety bugs.
MozillaFirefox-102.4.0-150200.152.64.1.src.rpm
MozillaFirefox-102.4.0-150200.152.64.1.x86_64.rpm
MozillaFirefox-devel-102.4.0-150200.152.64.1.x86_64.rpm
MozillaFirefox-translations-common-102.4.0-150200.152.64.1.x86_64.rpm
MozillaFirefox-translations-other-102.4.0-150200.152.64.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3782
Security update for libmad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libmad fixes the following issues:
- CVE-2017-8373: Fixed heap-based buffer overflow in mad_layer_III (bsc#1036968).
- CVE-2017-8372: Fixed assertion failure in layer3.c (bsc#1036969).
libmad-0.15.1b-150000.5.3.1.src.rpm
libmad-devel-0.15.1b-150000.5.3.1.x86_64.rpm
libmad0-0.15.1b-150000.5.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4164
Recommended update for PackageKit
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for PackageKit fixes the following issues:
- Ensure that package locks are honored (bsc#1199895):
* Avoid clearing status information on locked packages
* Check if packages are locked before attempting to remove them
* Don't refresh repos before searching
* Updatelibzypp dependency version to 17.31.0
* Restore pool status after simulating an update
- Add repository data in the package id (bsc#1202585)
- Implement upgrade-system method in openSUSE Leap (not supported in SUSE Linux Enterprise)
PackageKit-1.2.4-150400.3.6.1.src.rpm
True
PackageKit-1.2.4-150400.3.6.1.x86_64.rpm
True
PackageKit-backend-zypp-1.2.4-150400.3.6.1.x86_64.rpm
True
PackageKit-devel-1.2.4-150400.3.6.1.x86_64.rpm
True
PackageKit-lang-1.2.4-150400.3.6.1.noarch.rpm
True
libpackagekit-glib2-18-1.2.4-150400.3.6.1.x86_64.rpm
True
libpackagekit-glib2-devel-1.2.4-150400.3.6.1.x86_64.rpm
True
typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.6.1.x86_64.rpm
True
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1766
Security update for libheif
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libheif fixes the following issues:
- CVE-2023-0996: Fixed a buffer overflow in heif_js_decode_image (bsc#1208640).
libheif-1.12.0-150400.3.8.1.src.rpm
libheif1-1.12.0-150400.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4082
Security update for openjpeg
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openjpeg fixes the following issues:
- CVE-2018-20846: Fixed an Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi. (bsc#1140205)
- CVE-2018-21010: Fixed a heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789)
- CVE-2020-27824: Fixed an OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821)
- CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043)
- CVE-2020-27843: Fixed an out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044)
- CVE-2020-27845: Fixed a heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046)
libopenjpeg1-1.5.2-150000.4.10.1.x86_64.rpm
openjpeg-1.5.2-150000.4.10.1.src.rpm
openjpeg-devel-1.5.2-150000.4.10.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4601
Feature update for GNOME 41
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for GNOME 41 fixes the following issues:
atkmm1_6:
- Version update from 2.28.1 to 2.28.3 (jsc#PED-2235):
* Meson build: Avoid unnecessary configuration warnings
* Meson build: Perl is not required by new versions of mm-common
* Meson build: Require meson >= 0.55.0
* Meson build: Specify 'check' option in run_command(). Will be necessary with future versions of Meson.
* Require atk >= 2.12.0 Not a new requirement, but previously it was not specified in configure.ac and meson.build
* Support building with Visual Studio 2022
eog:
- Version update from 41.1 to 41.2 (jsc#PED-2235):
* eog-window: use correct type for display_profile
* Fix discovery of Evince for multi-page images
evince:
- Version update 41.3 to 41.4 (jsc#PED-2235):
* shell: Fix failures when thumbnail extraction takes too long
* Fix build with meson 0.60.0 and newer
evolution:
- Ensure evolution-devel is forward compatible with evolution-data-server-devel in a same major version (jsc#PED-2235)
evolution-data-center:
- Version update from 3.42.4 to 3.42.5 (jsc#PED-2235):
* Google OAuth out-of-band (oob) flow will be deprecated
folks:
- Version update 0.15.3 to 0.15.5 (jsc#PED-2235):
* vapi: Add missing generic type argument
* Fix docs build against newer eds version
* Fix build against newer eds version
* Remove volatile keyword from tests
gcr:
- Version update 3.41.0 to 3.41.1 (jsc#PED-2235):
* Add G_SPAWN_CLOEXEC_PIPES flag to all the g_spawn commands
* Add gi-docgen dependency which is needed by the docs
* Fix build with meson 0.60.0 and newer
* Fix build without systemd
* Several CI fixes
geocode-glib:
- Version update from 3.26.2 to 3.26.4 (jsc#PED-2235):
* Fix to a test data file not being installed, and a bug fix for a bug in the libsoup3 port
* Add support for libsoup 3.x
gjs:
- Version update from 1.70.1 to 1.70.2 (jsc#PED-2235):
* Build and compatibility fixes backported from the development branch
* Reverse order of running-from-source checks
- Require xorg-x11-Xvfb for proper package build (bsc#1203274)
glib2:
- Version update from 2.70.4 to 2.70.5 (jsc#PED-2235):
* Bugs fixed: glgo#GNOME/GLib#2620, glgo#GNOME/GLib!2537, glgo#GNOME/GLib!2555
* Split gtk-docs from -devel package, these are not needed during building projects using glib2
gnome-control-center:
- Fix the size of logo icon in About system (bsc#1200581)
- Version update from 41.4 to 41.7 (jsc#PED-2235):
* Cellular: Remove duplicate line from .desktop
* Info: Allow changing "Device Name" by pressing "Enter"
* Info: Remove trailing space after CPU name
* Keyboard: Fix crash resetting all keyboard shortcuts
* Keyboard: Fix leaks
* Network: Fix saving passwords for non-wifi connections
* Network: Fix critical when opening VPN details page
* Wacom: Fix leaks
gnome-desktop:
- Version update from 41.2 to 41.8 (jsc#PED-2235):
* Version increase but no actual changes
gnome-music:
- Version update from 41.0 to 41.1 (jsc#PED-2235):
* Ensure the correct album is played
* Fix build with meson 0.61.0 and newer
* Fix crash on empty selection
* Fix incorrect playlist import
* Fix time displayed in RTL languages
* Improve async queue work
* Make random shuffle actually random
* Make shuffle random
* Speed increase on first startup on larger collections
* Time is reversed in RTL
gnome-remote-desktop:
- Version update from 41.2 to 41.3 (jsc#PED-2235):
* Add Icelandic translation
gnome-session:
- Clear error messages that can be ignored because expected to happen for GDM sessions (bsc#1204867)
- Add fix for gnome-session to exit immediately when lost name on bus (bsc#1175622, bsc#1188882)
gnome-shell:
- Disable offline update suggestion before shutdown/reboot in SLE and openSUSE Leap (bsc#944832)
- Version update from 41.4 to 41.9 (jsc#PED-2235):
* Allow extension updates with only Extension Manager installed
* Allow more intermediate icon sizes in app grid
* Disable workspace switching while in search.
* Do not create systemd scope for D-Bus activated apps
* Fix calendar to correctly align world clocks header in RTL
* Fix drag placeholder position in dash in RTL locales
* Fix edge case where windows stay dimmed after a modal is closed
* Fix feedback when turning on a11y features by keyboard
* Fix focus tracking in magnifier on wayland
* Fix fractional timezone offsets in world clock
* Fix glitches in overview transition
* Fix logging in with realmd
* Fix memory leak
* Fix opening device settings for enterprise WPA networks
* Fix programatically set scrollview fade
* Fix regression in ibus support
* Fix unresponsive top bar in overview when in fullscreen
* Handle monitor changes during startup animation
* Hide overview after 'Show Details' from app context menu
* Improve Belgian on-screen keyboard layout
* Improve CSS shadow appearance
* Make sure startup animation completes
* Misc. bug fixes and cleanups
* Only close messages via delete key if they can be closed
* Respect IM hint for candidates list in on-screen keyboard
gnome-software:
- Disable offline update feature in SUSE Linux Enterprise and openSUSE Leap (bsc#944832)
- Version update from 41.4 to 41.5 (jsc#PED-2235):
* Added several appstream-related fixed
* Disable scroll-by-mouse-wheel on featured carousel
* Ensure details page shows app provided on command line
gnome-terminal:
- Version update from 3.42.2 to 3.42.3 (jsc#PED-2235):
* Fix build with meson 0.61.0 and newer
* window: Use a normal menu for the popup menu
gnome-user-docs:
- Version update from 41.1 to 41.5 (jsc#PED-2235):
* Added missing icon for network-wired-symbolic
gspell:
- Version update from 1.8.4 to 1.10.0 (jsc#PED-2235):
* Build: distribute more files in tarballs
* Documentation improvements
gtkmm3:
- Version update from 3.24.5 to 3.24.6 (jsc#PED-2235):
* Build with Meson: MSVC build: Support Visual Studio 2022
* Check if Perl is required for building documentation
* Don't use deprecated python3.path() and execute (..., gui_app...)
* GTK: TreeValueProxy: Declare copy constructor = default, avoiding warnings from the claing++ compiler
* Object::_release_c_instance(): Unref orphan managed widgets
* SizeGroup demo: Set active items in the combo boxs, so something is shown
* Specify 'check' option in run_command()
gtk-vnc:
- Version update from 1.3.0 to 1.3.1 (jsc#PED-2235):
* Add 'check' arg to meson run_command()
* Fix invalid use of subprojects with meson
* Support ZRLE encoding for zero size alpha cursors
gupnp-av:
- Version update from 0.12.11 to 0.14.1 (jsc#PED-2235):
* Add utility function to format GDateTime to the iso variant DIDL expects
* Allow to be used as a subproject
* Drop autotools
* Fix stripping @refID
* Fix unsetting subtitleFileType
* Make Feature derivable again
* Obsolete code removal.
* Port to modern GObject
* Remove hand-written ref-counting, use RcBox/AtomicRcBox instead.
* Switch to meson build system, following upstream
- Rename libgupnp-av-1_0-2 subpackage to libgupnp-av-1_0-3, correcting the package name to match the provided library
- Conflict with the wrongly provided libgupnp-av-1_0-2
gvfs:
- Version update from 1.48.1 to 1.48.2 (jsc#PED-2235):
* sftp: Adapt on new OpenSSH password prompts
* smb: Rework anonymous handling to avoid EINVAL
* smb: Ignore EINVAL for kerberos/ccache login
libgsf:
- Version update from 1.14.48 to 1.14.50 (jsc#PED-2235):
* Fix error handling problem when writing ole files
* Fix problems with non-western text in OLE properties
* Use g_date_time_new_from_iso8601 and g_date_time_format_iso8601 when available
libmediaart:
- Version update from 1.9.5 to 1.9.6 (jsc#PED-2235):
* build: Add introspection/vapi/tests options
* build: Use library() to optionally build a static library
libnma:
- Version update from 1.8.32 to 1.8.40 (jsc#PED-2235):
* Ad-Hoc networks now default to using WPA2 instead of WEP
* Add possibility of building libnma-gtk4 library with Gtk4 support
* Do not allow setting empty 802.1x domain for EAP TLS
* Fixed keyboard accelerator for certificate chooser
* Fixed libnma-gtk4 version of mobile-wizard
* Include OWE wireless security option
* The GtkBuilder files for Gtk4 are now included in the release tarball
* WEP is no longer provided as an option for connecting to hidden networks due to its deprecated status
- New sub-packages libnma-gtk4-0, typelib-1_0-NMA4-1_0 and libnma-gtk4-devel
- Split out documentation files in own docs sub-package
libnotify:
- Version update from 0.7.10 to 0.7.12 (jsc#PED-2235):
* Delete unused notifynotification.xml
* Fix potential build errors with old glib version we require
* docs/notify-send: Add --transient option to manpage
* notification: Bookend calling NotifyActionCallback with temporary reference
* notification: Include sender-pid hint by default if not provided
* notify-send: Add debug message about server not supporting persistence
* notify-send: Add explicit option to create transient notifications
* notify-send: Add support for boolean hints
* notify-send: Move server capabilities check to a separate function
* notify-send: Support passing any hint value, by parsing variant strings
libpeas:
- Version update from 1.30.0 to 1.32.0 (jsc#PED-2235):
* Icon licenses have been corrected
* Parallel build system operation fixes
* Use gi-docgen for documentation
* Various build warnings squashed
* Various GIR data that should not have been exported was removed
- Stop packaging the demo files/sub-package
librsvg:
- Version update from 2.52.6 to 2.52.9 (jsc#PED-2235):
* Catch circular references when rendering patterns
* Fix regressions when computing element geometries
* Fix regression outputting all text as paths
libsecret:
- Version update from 0.20.4 to 0.20.5 (jsc#PED-2235):
* Add bash-completion for secret-tool
* Add locking capabilities to secret tool
* Add support for TPM2 based secret storage
* Create default collection after DBus.Error.UnknownObject
* Detect local storage in snaps in the same way as flatpaks
* Drop autotools-based build
* GI annotation and documentation fixes
* Port documentation to gi-docgen
* Use G_GNUC_NULL_TERMINATED where appropriate collection, methods, prompt: Port to GTask
* secret-file-backend: Avoid closing the same file descriptor twice
mutter:
- Version update from 41.5 to 41.9 (jsc#PED-2235):
* Fix '--replace option'
* Fix missing root window properties after XWayland start
* Fix night light without GAMMA_LUT property
* KMS: Survive missing GAMMA_LUT property
* wayland: Fix rotation transform
* Misc. bug fixes
nautilus:
- Version update from 41.2 to 41.5(jsc#PED-2235):
* Drag-and-drop bugfixes
* HighContrast style fixes
orca:
- Version update from 41.1 to 41.3 (jsc#PED-2235):
* Add more event-flood detection and handling for improved performance
* Fix bug causing accessing preferences to fail for Esperanto
* Web: Fix bug causing widgets descending from off-screen label elements to be skipped over
* Web: Fix presentation of the FluentUI react dialog (and any other dialog which has an ARIA document-role descendant)
* WebKitGtk: Fail gracefully when structural navigation commands are used in WebKitGtk 2.36.x
python-cairo:
- Add python3-cairo to SUSE Linux Enterprise Micro 5.3 as it is now required by python3-gobject-cairo
python-gobject:
- Add dependency on python-cairo to python-gobject-cairo: The introspection wrapper needs pycairo (bsc#1179584)
- Version update from 3.42.0 to 3.42.2 (jsc#PED-2235):
* Add a workaround for a PyPy 3.9+ bug when threads are used
* Do not error out for unknown scopes
* Prompt an error instead of crashing when marshaling unsupported fundamental types in some cases
* Fix a crash/refcounting error in case marshaling a hash table fails
* Fix crashes when marshaling zero terminated arrays for certain item types
* Implement DynamicImporter.find_spec() to silence deprecation warning
* Make the test suite pass again with PyPy
* Some test/CI fixes
* gtk overrides: Do not override Treeview.enable_model_drag_xx for GTK4
* gtk overrides: restore Gtk.ListStore.insert_with_valuesv with newer GTK4
* interface: Fix leak when overriding GInterfaceInfo
* setup.py: look up pycairo headers without importing the module
trackers-python:
- Allow system calls used by gstreamer (bsc#1196205)
- Version update from 3.2.2 to 3.2.1 (jsc#PED-2235):
* Backport seccomp rules for rseq and mbind syscalls
vala:
- Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Add missing TraverseVisitor.visit_data_type()
* Add support for "copy_/free_function" metadata for compact classes
* Catch and throw possible inner error of lock statements
* Clear SemanticAnalyzer.current_{symbol,source_file} when not needed anymore
* Don't count instance-parameter when checking for backwards closure reference
* Fix a few binding errors
* Free empty stack list for code contexts
* Handle duplicated and unnamed symbols.
* Improve UI parsing and handling of nested objects and properties
* Make sure to drop our "trap" jump target in case of an error
* Move dynamic property errors to semantic analyzer pass
* Require lvalue access of delegate target/destroy "fields"
* Show source location when reporting deprecations
* Transform assignment of an array element as needed
* manual: Update from wiki.gnome.org
* parser: Improve handling of nullable VarType in with-statement
* parser: Reduce the source reference of main block method to its beginning
xdg-desktop-portal-gnome:
- Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Properly bind property in Lockdown portal
atkmm1_6-2.28.3-150400.4.3.1.src.rpm
atkmm1_6-devel-2.28.3-150400.4.3.1.x86_64.rpm
eog-41.2-150400.3.3.2.src.rpm
eog-41.2-150400.3.3.2.x86_64.rpm
eog-devel-41.2-150400.3.3.2.x86_64.rpm
eog-lang-41.2-150400.3.3.2.noarch.rpm
evince-41.4-150400.3.3.3.src.rpm
evince-41.4-150400.3.3.3.x86_64.rpm
evince-devel-41.4-150400.3.3.3.x86_64.rpm
evince-lang-41.4-150400.3.3.3.noarch.rpm
evince-plugin-djvudocument-41.4-150400.3.3.3.x86_64.rpm
evince-plugin-dvidocument-41.4-150400.3.3.3.x86_64.rpm
evince-plugin-pdfdocument-41.4-150400.3.3.3.x86_64.rpm
evince-plugin-psdocument-41.4-150400.3.3.3.x86_64.rpm
evince-plugin-tiffdocument-41.4-150400.3.3.3.x86_64.rpm
evince-plugin-xpsdocument-41.4-150400.3.3.3.x86_64.rpm
gcr-3.41.1-150400.3.3.1.src.rpm
gcr-data-3.41.1-150400.3.3.1.x86_64.rpm
gcr-lang-3.41.1-150400.3.3.1.noarch.rpm
gcr-prompter-3.41.1-150400.3.3.1.x86_64.rpm
gcr-ssh-agent-3.41.1-150400.3.3.1.x86_64.rpm
gcr-ssh-askpass-3.41.1-150400.3.3.1.x86_64.rpm
gcr-viewer-3.41.1-150400.3.3.1.x86_64.rpm
geocode-glib-3.26.4-150400.3.3.2.src.rpm
geocode-glib-3.26.4-150400.3.3.2.x86_64.rpm
geocode-glib-devel-3.26.4-150400.3.3.2.x86_64.rpm
gjs-1.70.2-150400.3.3.1.src.rpm
gjs-1.70.2-150400.3.3.1.x86_64.rpm
gnome-control-center-41.7-150400.3.3.1.src.rpm
gnome-control-center-41.7-150400.3.3.1.x86_64.rpm
gnome-control-center-devel-41.7-150400.3.3.1.x86_64.rpm
gnome-control-center-lang-41.7-150400.3.3.1.noarch.rpm
gnome-desktop-41.8-150400.3.3.1.src.rpm
gnome-desktop-lang-41.8-150400.3.3.1.noarch.rpm
gnome-extensions-41.9-150400.3.3.2.x86_64.rpm
gnome-session-41.3-150400.3.3.1.src.rpm
gnome-session-41.3-150400.3.3.1.x86_64.rpm
gnome-session-core-41.3-150400.3.3.1.x86_64.rpm
gnome-session-default-session-41.3-150400.3.3.1.x86_64.rpm
gnome-session-lang-41.3-150400.3.3.1.noarch.rpm
gnome-shell-41.9-150400.3.3.2.src.rpm
gnome-shell-41.9-150400.3.3.2.x86_64.rpm
gnome-shell-devel-41.9-150400.3.3.2.x86_64.rpm
gnome-shell-lang-41.9-150400.3.3.2.noarch.rpm
gnome-shell-search-provider-gnome-terminal-3.42.3-150400.3.3.1.x86_64.rpm
gnome-shell-search-provider-nautilus-41.5-150400.3.3.1.x86_64.rpm
gnome-software-41.5-150400.3.3.2.src.rpm
gnome-software-41.5-150400.3.3.2.x86_64.rpm
gnome-software-devel-41.5-150400.3.3.2.x86_64.rpm
gnome-software-lang-41.5-150400.3.3.2.noarch.rpm
gnome-terminal-3.42.3-150400.3.3.1.src.rpm
gnome-terminal-3.42.3-150400.3.3.1.x86_64.rpm
gnome-terminal-lang-3.42.3-150400.3.3.1.noarch.rpm
gnome-user-docs-41.5-150400.3.3.1.noarch.rpm
gnome-user-docs-41.5-150400.3.3.1.src.rpm
gnome-user-docs-lang-41.5-150400.3.3.1.noarch.rpm
gnome-version-41.8-150400.3.3.1.x86_64.rpm
gspell-1.10.0-150400.3.3.1.src.rpm
gspell-devel-1.10.0-150400.3.3.1.x86_64.rpm
gspell-lang-1.10.0-150400.3.3.1.noarch.rpm
gtkmm3-3.24.6-150400.3.3.1.src.rpm
gtkmm3-devel-3.24.6-150400.3.3.1.x86_64.rpm
gvfs-1.48.2-150400.4.6.1.src.rpm
gvfs-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-backend-afc-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-backend-samba-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-backends-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-devel-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-fuse-1.48.2-150400.4.6.1.x86_64.rpm
gvfs-lang-1.48.2-150400.4.6.1.noarch.rpm
libatkmm-1_6-1-2.28.3-150400.4.3.1.x86_64.rpm
libevdocument3-4-41.4-150400.3.3.3.x86_64.rpm
libevview3-3-41.4-150400.3.3.3.x86_64.rpm
libgck-1-0-3.41.1-150400.3.3.1.x86_64.rpm
libgck-devel-3.41.1-150400.3.3.1.x86_64.rpm
libgcr-3-1-3.41.1-150400.3.3.1.x86_64.rpm
libgcr-devel-3.41.1-150400.3.3.1.x86_64.rpm
libgeocode-glib0-3.26.4-150400.3.3.2.x86_64.rpm
libgjs-devel-1.70.2-150400.3.3.1.x86_64.rpm
libgjs0-1.70.2-150400.3.3.1.x86_64.rpm
libgnome-desktop-3-19-41.8-150400.3.3.1.x86_64.rpm
libgnome-desktop-3-devel-41.8-150400.3.3.1.x86_64.rpm
libgnome-desktop-3_0-common-41.8-150400.3.3.1.x86_64.rpm
libgsf-1-114-1.14.50-150400.3.3.1.x86_64.rpm
libgsf-1.14.50-150400.3.3.1.src.rpm
libgspell-1-2-1.10.0-150400.3.3.1.x86_64.rpm
libgtkmm-3_0-1-3.24.6-150400.3.3.1.x86_64.rpm
libnautilus-extension1-41.5-150400.3.3.1.x86_64.rpm
libnma-1.8.40-150400.3.3.1.src.rpm
libnma0-1.8.40-150400.3.3.1.x86_64.rpm
libnotify-0.7.12-150400.3.3.1.src.rpm
libnotify-devel-0.7.12-150400.3.3.1.x86_64.rpm
libnotify-tools-0.7.12-150400.3.3.1.x86_64.rpm
libpeas-1.32.0-150400.4.3.2.src.rpm
libpeas-1_0-0-1.32.0-150400.4.3.2.x86_64.rpm
libpeas-devel-1.32.0-150400.4.3.2.x86_64.rpm
libpeas-gtk-1_0-0-1.32.0-150400.4.3.2.x86_64.rpm
libpeas-lang-1.32.0-150400.4.3.2.noarch.rpm
libpeas-loader-python3-1.32.0-150400.4.3.2.x86_64.rpm
librsvg-2.52.9-150400.3.3.1.src.rpm
librsvg-devel-2.52.9-150400.3.3.1.x86_64.rpm
mutter-41.9-150400.3.6.1.src.rpm
mutter-41.9-150400.3.6.1.x86_64.rpm
mutter-devel-41.9-150400.3.6.1.x86_64.rpm
mutter-lang-41.9-150400.3.6.1.noarch.rpm
nautilus-41.5-150400.3.3.1.src.rpm
nautilus-41.5-150400.3.3.1.x86_64.rpm
nautilus-devel-41.5-150400.3.3.1.x86_64.rpm
nautilus-evince-41.4-150400.3.3.3.x86_64.rpm
nautilus-extension-terminal-3.42.3-150400.3.3.1.x86_64.rpm
nautilus-lang-41.5-150400.3.3.1.noarch.rpm
orca-41.3-150400.3.3.1.noarch.rpm
orca-41.3-150400.3.3.1.src.rpm
orca-lang-41.3-150400.3.3.1.noarch.rpm
python-cairo-1.15.1-150000.3.6.1.src.rpm
python-cairo-common-devel-1.15.1-150000.3.6.1.x86_64.rpm
python3-cairo-devel-1.15.1-150000.3.6.1.x86_64.rpm
tracker-miner-files-3.2.2-150400.3.3.1.x86_64.rpm
tracker-miners-3.2.2-150400.3.3.1.src.rpm
tracker-miners-3.2.2-150400.3.3.1.x86_64.rpm
typelib-1_0-EvinceDocument-3_0-41.4-150400.3.3.3.x86_64.rpm
typelib-1_0-EvinceView-3_0-41.4-150400.3.3.3.x86_64.rpm
typelib-1_0-Gck-1-3.41.1-150400.3.3.1.x86_64.rpm
typelib-1_0-Gcr-3-3.41.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GcrUi-3-3.41.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.3.2.x86_64.rpm
typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.3.1.x86_64.rpm
typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.3.1.x86_64.rpm
typelib-1_0-Gspell-1-1.10.0-150400.3.3.1.x86_64.rpm
typelib-1_0-NMA-1_0-1.8.40-150400.3.3.1.x86_64.rpm
typelib-1_0-Nautilus-3_0-41.5-150400.3.3.1.x86_64.rpm
typelib-1_0-Notify-0_7-0.7.12-150400.3.3.1.x86_64.rpm
typelib-1_0-Peas-1_0-1.32.0-150400.4.3.2.x86_64.rpm
typelib-1_0-PeasGtk-1_0-1.32.0-150400.4.3.2.x86_64.rpm
typelib-1_0-Rsvg-2_0-2.52.9-150400.3.3.1.x86_64.rpm
xdg-desktop-portal-gnome-41.2-150400.3.3.1.src.rpm
xdg-desktop-portal-gnome-41.2-150400.3.3.1.x86_64.rpm
xdg-desktop-portal-gnome-lang-41.2-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4002
Recommended update for gegl, gimp, gnome-photos, libgexiv2
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gegl, gimp, gnome-photos, libgexiv2 has the following changes:
- The packages were rebuilt against exiv2 0.27, to allow obsoleting the old 0.26 version.
- No other changes were done.
libgexiv2-0.14.0-150400.4.2.1.src.rpm
libgexiv2-2-0.14.0-150400.4.2.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4206
Security update for pixman
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for pixman fixes the following issues:
- CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033).
pixman-0.40.0-150400.3.3.1.src.rpm
libpixman-1-0-32bit-0.40.0-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4058
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):
- CVE-2022-45403: Service Workers might have learned size of cross-origin media files
- CVE-2022-45404: Fullscreen notification bypass
- CVE-2022-45405: Use-after-free in InputStream implementation
- CVE-2022-45406: Use-after-free of a JavaScript Realm
- CVE-2022-45408: Fullscreen notification bypass via windowName
- CVE-2022-45409: Use-after-free in Garbage Collection
- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy
- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers
- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers
- CVE-2022-45416: Keystroke Side-Channel Leakage
- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI
- CVE-2022-45420: Iframe contents could be rendered outside the iframe
- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5
MozillaFirefox-102.5.0-150200.152.67.3.src.rpm
MozillaFirefox-102.5.0-150200.152.67.3.x86_64.rpm
MozillaFirefox-devel-102.5.0-150200.152.67.3.x86_64.rpm
MozillaFirefox-translations-common-102.5.0-150200.152.67.3.x86_64.rpm
MozillaFirefox-translations-other-102.5.0-150200.152.67.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4194
Security update for ffmpeg-4
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg-4 fixes the following issues:
- CVE-2022-3964: Fixed out of bounds read in update_block_in_prev_frame() (bsc#1205388).
ffmpeg-4-4.4-150400.3.5.1.src.rpm
libavcodec58_134-4.4-150400.3.5.1.x86_64.rpm
libavutil56_70-4.4-150400.3.5.1.x86_64.rpm
libswresample3_9-4.4-150400.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4207
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
Security fixes:
- CVE-2022-32888: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205121).
- CVE-2022-32923: Fixed possible information leak via maliciously crafted web content (bsc#1205122).
- CVE-2022-42799: Fixed user interface spoofing when visiting a malicious website (bsc#1205123).
- CVE-2022-42823: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205120).
- CVE-2022-42824: Fixed possible sensitive user information leak via maliciously crafted web content (bsc#1205124).
Update to version 2.38.2:
- Fix scrolling issues in some sites having fixed background.
- Fix prolonged buffering during progressive live playback.
- Fix the build with accessibility disabled.
- Fix several crashes and rendering issues.
Update to version 2.38.1:
- Make xdg-dbus-proxy work if host session bus address is an
abstract socket.
- Use a single xdg-dbus-proxy process when sandbox is enabled.
- Fix high resolution video playback due to unimplemented
changeType operation.
- Ensure GSubprocess uses posix_spawn() again and inherit file
descriptors.
- Fix player stucking in buffering (paused) state for progressive
streaming.
- Do not try to preconnect on link click when link preconnect
setting is disabled.
- Fix close status code returned when the client closes a
WebSocket in some cases.
- Fix media player duration calculation.
- Fix several crashes and rendering issues.
Update to version 2.38.0:
- New media controls UI style.
- Add new API to set WebView's Content-Security-Policy for web
extensions support.
- Make it possible to use the remote inspector from other
browsers using WEBKIT_INSPECTOR_HTTP_SERVER env var.
- MediaSession is enabled by default, allowing remote media
control using MPRIS.
- Add support for PDF documents using PDF.js.
libjavascriptcoregtk-4_1-0-2.38.2-150400.4.22.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.38.2-150400.4.22.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.38.2-150400.4.22.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.38.2-150400.4.22.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.38.2-150400.4.22.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.38.2-150400.4.22.1.x86_64.rpm
webkit2gtk3-2.38.2-150400.4.22.1.src.rpm
webkit2gtk3-devel-2.38.2-150400.4.22.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4208
Security update for exiv2-0_26
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for exiv2-0_26 fixes the following issues:
- CVE-2019-17402: Fixed improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp (bsc#1153577).
- CVE-2018-20098: Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header (bsc#1119560).
- CVE-2018-17581: Fixed an excessive stack consumption CiffDirectory:readDirectory() at crwimage_int.cpp (bsc#1110282).
- CVE-2018-20099: exiv2: infinite loop in Exiv2::Jp2Image::encodeJp2Header (bsc#1119559).
- CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562).
- CVE-2017-11591: Fixed a floating point exception in Exiv2::ValueType (bsc#1050257).
- CVE-2018-11531: Fixed a heap-based buffer overflow in getData in preview.cpp (bsc#1095070).
- CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337).
- CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231).
- CVE-2019-13109: Fixed a denial of service in PngImage:readMetadata (bsc#1142677).
- CVE-2019-13110: Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678).
exiv2-0_26-0.26-150400.9.21.1.src.rpm
libexiv2-26-0.26-150400.9.21.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4499
Recommended update for openssh
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openssh fixes the following issues:
- Make ssh connections update their dbus environment (bsc#1179465):
* Add openssh-dbus.sh, openssh-dbus.csh, openssh-dbus.fish
openssh-askpass-gnome-8.4p1-150300.3.15.2.src.rpm
openssh-askpass-gnome-8.4p1-150300.3.15.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4282
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 0814:
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2022-3234: Fixed heap-based buffer overflow (bsc#1203508).
- CVE-2022-3235: Fixed use-after-free (bsc#1203509).
- CVE-2022-3324: Fixed stack-based buffer overflow (bsc#1203820).
- CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c (bsc#1204779).
- CVE-2022-2982: Fixed use-after-free in qf_fill_buffer() (bsc#1203152).
- CVE-2022-3296: Fixed stack out of bounds read in ex_finally() in ex_eval.c (bsc#1203796).
- CVE-2022-3297: Fixed use-after-free in process_next_cpt_value() at insexpand.c (bsc#1203797).
- CVE-2022-3099: Fixed use-after-free in ex_docmd.c (bsc#1203110).
- CVE-2022-3134: Fixed use-after-free in do_tag() (bsc#1203194).
- CVE-2022-3153: Fixed NULL pointer dereference (bsc#1203272).
- CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank() in eval.c (bsc#1203799).
- CVE-2022-3352: Fixed use-after-free (bsc#1203924).
- CVE-2022-2980: Fixed NULL pointer dereference in do_mouse() (bsc#1203155).
- CVE-2022-3037: Fixed use-after-free (bsc#1202962).
gvim-9.0.0814-150000.5.28.1.x86_64.rpm
vim-9.0.0814-150000.5.28.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4339
Recommended update for hplip
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of hplip fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
hplip-3.21.10-150400.3.5.1.src.rpm
hplip-3.21.10-150400.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4311
Recommended update for open-vm-tools
critical
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- Include binaries of open-vm-tools for ARM architecture aarch64 in SUSE Linux Enterprise 15 Service Pack 4
(jsc#SLE-22385)
open-vm-tools-12.1.0-150300.21.2.src.rpm
open-vm-tools-desktop-12.1.0-150300.21.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4304
Security update for emacs
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for emacs fixes the following issues:
- CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822).
emacs-27.2-150400.3.3.1.src.rpm
emacs-x11-27.2-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4465
Recommended update for motif
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for motif fixes the following issues:
- Fix to prevent third party application crash (bsc#1205253)
libMrm4-2.3.4-150000.3.8.1.x86_64.rpm
libUil4-2.3.4-150000.3.8.1.x86_64.rpm
libUil4-32bit-2.3.4-150000.3.8.1.x86_64.rpm
libXm4-2.3.4-150000.3.8.1.x86_64.rpm
motif-2.3.4-150000.3.8.1.src.rpm
motif-2.3.4-150000.3.8.1.x86_64.rpm
motif-devel-2.3.4-150000.3.8.1.x86_64.rpm
libMrm4-32bit-2.3.4-150000.3.8.1.x86_64.rpm
libXm4-32bit-2.3.4-150000.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4478
Security update for capnproto
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for capnproto fixes the following issues:
- CVE-2022-46149: Fixed out of bounds read when handling a list of lists (bsc#1205968).
capnproto-0.9.1-150400.3.4.1.src.rpm
libcapnp-0_9-0.9.1-150400.3.4.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4453
Security update for wireshark
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Update to version 3.6.10:
- CVE-2022-3725: OPUS dissector crash (bsc#1204822).
- Multiple dissector infinite loops (bsc#1206189).
- Kafka dissector memory exhaustion (bsc#1206190).
wireshark-3.6.10-150000.3.78.1.src.rpm
wireshark-devel-3.6.10-150000.3.78.1.x86_64.rpm
wireshark-ui-qt-3.6.10-150000.3.78.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-87
Recommended update for python-cairo
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for python-cairo ships the missing python3-cairo to openSUSE Leap Micro 5.3.
python-cairo-1.15.1-150000.3.8.1.src.rpm
python-cairo-common-devel-1.15.1-150000.3.8.1.x86_64.rpm
python3-cairo-devel-1.15.1-150000.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4462
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 102.6.0 ESR (bsc#1206242):
- CVE-2022-46880: Use-after-free in WebGL
- CVE-2022-46872: Arbitrary file read from a compromised content process
- CVE-2022-46881: Memory corruption in WebGL
- CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions
- CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS
- CVE-2022-46882: Use-after-free in WebGL
- CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6
MozillaFirefox-102.6.0-150200.152.70.1.src.rpm
MozillaFirefox-102.6.0-150200.152.70.1.x86_64.rpm
MozillaFirefox-devel-102.6.0-150200.152.70.1.x86_64.rpm
MozillaFirefox-translations-common-102.6.0-150200.152.70.1.x86_64.rpm
MozillaFirefox-translations-other-102.6.0-150200.152.70.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4631
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
Updated to version 9.0.1040:
- CVE-2022-3491: vim: Heap-based Buffer Overflow prior to 9.0.0742 (bsc#1206028).
- CVE-2022-3520: vim: Heap-based Buffer Overflow (bsc#1206071).
- CVE-2022-3591: vim: Use After Free (bsc#1206072).
- CVE-2022-4292: vim: Use After Free in GitHub repository vim/vim prior to 9.0.0882 (bsc#1206075).
- CVE-2022-4293: vim: Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804 (bsc#1206077).
- CVE-2022-4141: vim: heap-buffer-overflow in alloc.c 246:11 (bsc#1205797).
- CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c (bsc#1204779).
gvim-9.0.1040-150000.5.31.1.x86_64.rpm
vim-9.0.1040-150000.5.31.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-6
Security update for nautilus
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for nautilus fixes the following issues:
- CVE-2022-37290: Fixed a denial of service caused by pasted ZIP archives (bsc#1205418).
gnome-shell-search-provider-nautilus-41.5-150400.3.6.1.x86_64.rpm
libnautilus-extension1-41.5-150400.3.6.1.x86_64.rpm
nautilus-41.5-150400.3.6.1.src.rpm
nautilus-41.5-150400.3.6.1.x86_64.rpm
nautilus-devel-41.5-150400.3.6.1.x86_64.rpm
nautilus-lang-41.5-150400.3.6.1.noarch.rpm
typelib-1_0-Nautilus-3_0-41.5-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4634
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.38.3:
- CVE-2022-42856: Fixed a potential arbitrary code execution when processing maliciously crafted web content (bsc#1206474).
libjavascriptcoregtk-4_1-0-2.38.3-150400.4.25.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.38.3-150400.4.25.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.38.3-150400.4.25.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.38.3-150400.4.25.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.38.3-150400.4.25.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.38.3-150400.4.25.1.x86_64.rpm
webkit2gtk3-2.38.3-150400.4.25.1.src.rpm
webkit2gtk3-devel-2.38.3-150400.4.25.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-8
Security update for ffmpeg-4
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg-4 fixes the following issues:
- CVE-2022-3109: Fixed null pointer dereference in vp3_decode_frame() (bsc#1206442).
ffmpeg-4-4.4-150400.3.8.1.src.rpm
libavcodec58_134-4.4-150400.3.8.1.x86_64.rpm
libavutil56_70-4.4-150400.3.8.1.x86_64.rpm
libswresample3_9-4.4-150400.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-7
Security update for ffmpeg
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg fixes the following issues:
- CVE-2022-3109: Fixed null pointer dereference in vp3_decode_frame() (bsc#1206442).
ffmpeg-3.4.2-150200.11.20.1.src.rpm
libavcodec57-3.4.2-150200.11.20.1.x86_64.rpm
libavutil-devel-3.4.2-150200.11.20.1.x86_64.rpm
libavutil55-3.4.2-150200.11.20.1.x86_64.rpm
libpostproc-devel-3.4.2-150200.11.20.1.x86_64.rpm
libpostproc54-3.4.2-150200.11.20.1.x86_64.rpm
libswresample-devel-3.4.2-150200.11.20.1.x86_64.rpm
libswresample2-3.4.2-150200.11.20.1.x86_64.rpm
libswscale-devel-3.4.2-150200.11.20.1.x86_64.rpm
libswscale4-3.4.2-150200.11.20.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-69
Security update for SDL2
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for SDL2 fixes the following issues:
- CVE-2022-4743: Fixed a potential memory leak when creating a texture
for an OpenGL ES image (bsc#1206727).
SDL2-2.0.8-150200.11.9.1.src.rpm
libSDL2-2_0-0-2.0.8-150200.11.9.1.x86_64.rpm
libSDL2-devel-2.0.8-150200.11.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-95
Security update for libzypp-plugin-appdata
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libzypp-plugin-appdata fixes the following issues:
- CVE-2023-22643: Fixed potential shell injection related to malicious repo names (bsc#1206836).
libzypp-plugin-appdata-1.0.1+git.20180426-150400.18.3.1.noarch.rpm
libzypp-plugin-appdata-1.0.1+git.20180426-150400.18.3.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-489
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.38.5 (boo#1208328):
- CVE-2023-23529: Fixed possible arbitrary code execution via maliciously crafted web content.
Update to version 2.38.4 (boo#1207997):
- CVE-2023-23517: Fixed web content processing that could have led to arbitrary code execution.
- CVE-2023-23518: Fixed web content processing that could have led to arbitrary code execution.
- CVE-2022-42826: Fixed a use-after-free issue that was caused by improper memory management.
New CVE and bug references where added for already released updates:
Update to version 2.38.3 (boo#1206750):
- CVE-2022-42852: Fixed disclosure of process memory by improved memory handling.
- CVE-2022-42867: Fixed a use after free issue was addressed with improved memory management.
- CVE-2022-46692: Fixed bypass of Same Origin Policy through improved state management.
- CVE-2022-46698: Fixed disclosure of sensitive user information with improved checks.
- CVE-2022-46699: Fixed an arbitrary code execution caused by memory corruption.
- CVE-2022-46700: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
Update to version 2.38.1:
- CVE-2022-46691: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
Update to version 2.38.0:
- CVE-2022-42863: Fixed a potential arbitrary code execution when processing maliciously crafted web content.
libjavascriptcoregtk-4_1-0-2.38.5-150400.4.34.2.x86_64.rpm
libwebkit2gtk-4_1-0-2.38.5-150400.4.34.2.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.38.5-150400.4.34.2.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.38.5-150400.4.34.2.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.38.5-150400.4.34.2.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.38.5-150400.4.34.2.x86_64.rpm
webkit2gtk3-2.38.5-150400.4.34.2.src.rpm
webkit2gtk3-devel-2.38.5-150400.4.34.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-113
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Updated to version 102.7.0 ESR (bsc#1207119):
- CVE-2022-46871: Updated an out of date library (libusrsctp) which
contained several vulnerabilities.
- CVE-2023-23598: Fixed an arbitrary file read from GTK drag and
drop on Linux.
- CVE-2023-23601: Fixed a potential spoofing attack when dragging a
URL from a cross-origin iframe into the same tab.
- CVE-2023-23602: Fixed a mishandled security check, which caused
the Content Security Policy header to be ignored for WebSockets
in WebWorkers.
- CVE-2022-46877: Fixed a fullscreen notification bypass which
could be leveraged in spoofing attacks.
- CVE-2023-23603: Fixed a Content Security Policy bypass via format
directives.
- CVE-2023-23605: Fixed several memory safety bugs.
MozillaFirefox-102.7.0-150200.152.73.1.src.rpm
MozillaFirefox-102.7.0-150200.152.73.1.x86_64.rpm
MozillaFirefox-devel-102.7.0-150200.152.73.1.x86_64.rpm
MozillaFirefox-translations-common-102.7.0-150200.152.73.1.x86_64.rpm
MozillaFirefox-translations-other-102.7.0-150200.152.73.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-167
Security update for bluez
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for bluez fixes the following issues:
- CVE-2022-3563: Fixed a potential crash in the mgmt-tester tool (bsc#1204426).
bluez-5.62-150400.4.8.1.src.rpm
bluez-devel-5.62-150400.4.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-206
Security update for ffmpeg
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg fixes the following issues:
- CVE-2022-3341: Fixed a potential crash when processing a crafted
NUT stream (bsc#1206778).
- CVE-2019-13390: Fixed a potential crash when processing a crafted
AVI stream (bsc#1140754).
ffmpeg-3.4.2-150200.11.25.1.src.rpm
libavcodec57-3.4.2-150200.11.25.1.x86_64.rpm
libavformat57-3.4.2-150200.11.25.1.x86_64.rpm
libavresample3-3.4.2-150200.11.25.1.x86_64.rpm
libavutil-devel-3.4.2-150200.11.25.1.x86_64.rpm
libavutil55-3.4.2-150200.11.25.1.x86_64.rpm
libpostproc-devel-3.4.2-150200.11.25.1.x86_64.rpm
libpostproc54-3.4.2-150200.11.25.1.x86_64.rpm
libswresample-devel-3.4.2-150200.11.25.1.x86_64.rpm
libswresample2-3.4.2-150200.11.25.1.x86_64.rpm
libswscale-devel-3.4.2-150200.11.25.1.x86_64.rpm
libswscale4-3.4.2-150200.11.25.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-792
Recommended update for gnome-shell
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gnome-shell fixes the following issues:
- Fix for warning messages not showing in login screen (bsc#1207323)
- Fix GNOME graphical session startup issues (bsc#1205518)
gnome-extensions-41.9-150400.3.8.1.x86_64.rpm
gnome-shell-41.9-150400.3.8.1.src.rpm
gnome-shell-41.9-150400.3.8.1.x86_64.rpm
gnome-shell-devel-41.9-150400.3.8.1.x86_64.rpm
gnome-shell-lang-41.9-150400.3.8.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-172
Security update for ffmpeg-4
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg-4 fixes the following issues:
- CVE-2022-3341: Fixed a potential crash when processing a crafted
NUT stream (bsc#1206778).
ffmpeg-4-4.4-150400.3.11.1.src.rpm
libavcodec58_134-4.4-150400.3.11.1.x86_64.rpm
libavformat58_76-4.4-150400.3.11.1.x86_64.rpm
libavutil56_70-4.4-150400.3.11.1.x86_64.rpm
libpostproc55_9-4.4-150400.3.11.1.x86_64.rpm
libswresample3_9-4.4-150400.3.11.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-343
Security update for wireshark
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
- Updated to version 3.6.11 (bsc#1207447):
- CVE-2023-0417: Fixed a memory leak in the NFS dissector (bsc#1207669).
- CVE-2023-0413: Fixed a crash in the dissection engine (bsc#1207665).
- CVE-2023-0416: Fixed a crash in the GNW dissector (bsc#1207668).
- CVE-2023-0415: Fixed a crash in the iSCSI dissector (bsc#1207667).
- CVE-2023-0411: Fixed several issues where an excessive CPU
consumption could be triggered in multiple dissectors (bsc#1207663).
- CVE-2023-0412: Fixed a crash in the TIPC dissector (bsc#1207664).
wireshark-3.6.11-150000.3.83.1.src.rpm
wireshark-devel-3.6.11-150000.3.83.1.x86_64.rpm
wireshark-ui-qt-3.6.11-150000.3.83.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-211
Security update for vim
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- Updated to version 9.0.1234:
- CVE-2023-0433: Fixed an out of bounds memory access that could
cause a crash (bsc#1207396).
- CVE-2023-0288: Fixed an out of bounds memory access that could
cause a crash (bsc#1207162).
- CVE-2023-0054: Fixed an out of bounds memory write that could
cause a crash or memory corruption (bsc#1206868).
- CVE-2023-0051: Fixed an out of bounds memory access that could
cause a crash (bsc#1206867).
- CVE-2023-0049: Fixed an out of bounds memory access that could
cause a crash (bsc#1206866).
gvim-9.0.1234-150000.5.34.1.x86_64.rpm
vim-9.0.1234-150000.5.34.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-303
Recommended update for sane-backends
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of sane-backends fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
sane-backends-1.0.32-150400.15.2.1.src.rpm
sane-backends-1.0.32-150400.15.2.1.x86_64.rpm
sane-backends-autoconfig-1.0.32-150400.15.2.1.x86_64.rpm
sane-backends-devel-1.0.32-150400.15.2.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2087
This update has recommended fixes for ffmpeg-4
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This updates fixes the following issues for ffmpeg-4:
Security fixes:
- CVE-2022-48434: Fixed use after free in libavcodec/pthread_frame.c (bsc#1209934).
Other fixes:
- Add necessary subpackages to the Packagehub. (bsc#1206067)
ffmpeg-4-4.4-150400.3.15.1.src.rpm
libavcodec58_134-4.4-150400.3.15.1.x86_64.rpm
libavformat58_76-4.4-150400.3.15.1.x86_64.rpm
libavutil56_70-4.4-150400.3.15.1.x86_64.rpm
libpostproc55_9-4.4-150400.3.15.1.x86_64.rpm
libswresample3_9-4.4-150400.3.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-428
Security update for ImageMagick
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2022-44267: Fixed a denial of service when parsing a PNG image (bsc#1207982).
- CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image (bsc#1207983).
ImageMagick-7.1.0.9-150400.6.12.1.src.rpm
ImageMagick-7.1.0.9-150400.6.12.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.12.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.12.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.12.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.12.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.12.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.12.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-461
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Updated to version 102.8.0 ESR (bsc#1208144):
- CVE-2023-25728: Fixed content security policy leak in violation reports using iframes.
- CVE-2023-25730: Fixed screen hijack via browser fullscreen mode.
- CVE-2023-25743: Fixed Fullscreen notification not being shown in Firefox Focus.
- CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS.
- CVE-2023-25735: Fixed potential use-after-free from compartment mismatch in SpiderMonkey.
- CVE-2023-25737: Fixed invalid downcast in SVGUtils::SetupStrokeGeometry.
- CVE-2023-25738: Fixed printing on Windows which could potentially crash Firefox with some device drivers.
- CVE-2023-25739: Fixed use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext.
- CVE-2023-25729: Fixed extensions opening external schemes without user knowledge.
- CVE-2023-25732: Fixed out of bounds memory write from EncodeInputStream.
- CVE-2023-25734: Fixed opening local .url files that causes unexpected network loads.
- CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey.
- CVE-2023-25744: Fixed Memory safety bugs.
- CVE-2023-25746: Fixed Memory safety bugs.
MozillaFirefox-102.8.0-150200.152.78.1.src.rpm
MozillaFirefox-102.8.0-150200.152.78.1.x86_64.rpm
MozillaFirefox-devel-102.8.0-150200.152.78.1.x86_64.rpm
MozillaFirefox-translations-common-102.8.0-150200.152.78.1.x86_64.rpm
MozillaFirefox-translations-other-102.8.0-150200.152.78.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1668
Recommended update for firewalld
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for firewalld fixes the following issues:
- Fix `firewall-offline-cmd` command failing with error (bsc#1206928)
firewall-applet-0.9.3-150400.8.9.1.noarch.rpm
firewall-config-0.9.3-150400.8.9.1.noarch.rpm
firewalld-0.9.3-150400.8.9.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-512
Security update for libraw
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libraw fixes the following issues:
- CVE-2021-32142: Fixed buffer overflow in the LibRaw_buffer_datastream:gets function (bsc#1208470).
libraw-0.20.2-150400.3.3.1.src.rpm
libraw20-0.20.2-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1742
Recommended update for gdm
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gdm fixes the following issues:
- Update gdm-fingerprint.pamd and gdm-smartcard.pamd with correct configuration to make them work (bsc#1205664)
- Enable split authentication
- Made preparations for first boot setup for a possible implementation in a future release of
SUSE Linux Enterprise Desktop (jsc#PED-1719)
gdm-41.3-150400.4.6.1.src.rpm
gdm-41.3-150400.4.6.1.x86_64.rpm
gdm-devel-41.3-150400.4.6.1.x86_64.rpm
gdm-lang-41.3-150400.4.6.1.noarch.rpm
gdm-schema-41.3-150400.4.6.1.noarch.rpm
gdm-systemd-41.3-150400.4.6.1.noarch.rpm
gdmflexiserver-41.3-150400.4.6.1.noarch.rpm
libgdm1-41.3-150400.4.6.1.x86_64.rpm
typelib-1_0-Gdm-1_0-41.3-150400.4.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-598
Security update for emacs
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for emacs fixes the following issues:
- CVE-2022-48337: Fixed etags local command injection vulnerability (bsc#1208515).
- CVE-2022-48339: Fixed htmlfontify.el command injection vulnerability (bsc#1208512).
- CVE-2022-48338: Fixed ruby-mode.el local command injection vulnerability (bsc#1208514).
emacs-27.2-150400.3.6.1.src.rpm
emacs-x11-27.2-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1686
Security update for libmicrohttpd
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libmicrohttpd fixes the following issues:
- CVE-2023-27371: Fixed a parser bug that could be used to crash servers using the MHD_PostProcessor (bsc#1208745).
libmicrohttpd-0.9.57-150000.3.3.1.src.rpm
libmicrohttpd-devel-0.9.57-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1762
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
- CVE-2023-1161: Fixed crash in ISO 15765 and ISO 10681 dissector (bsc#1208914).
Update to 3.6.12:
* https://www.wireshark.org/docs/relnotes/wireshark-3.6.12.html
wireshark-3.6.12-150000.3.86.1.src.rpm
wireshark-devel-3.6.12-150000.3.86.1.x86_64.rpm
wireshark-ui-qt-3.6.12-150000.3.86.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1744
Recommended update for patterns-gnome
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for patterns-gnome fixes the following issues:
- Add requirement for xorg-x11-fonts to fix gnome-shell starting failure (bsc#1203966)
patterns-gnome-20201210-150400.7.3.1.src.rpm
patterns-gnome-gnome_basic-20201210-150400.7.3.1.x86_64.rpm
patterns-gnome-gnome_basis-20201210-150400.7.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-781
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- CVE-2023-0512: Fixed a divide By Zero (bsc#1207780).
- CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957).
- CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).
Updated to version 9.0 with patch level 1386.
- https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386
gvim-9.0.1386-150000.5.37.1.x86_64.rpm
vim-9.0.1386-150000.5.37.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-835
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Update to version 102.9.0 ESR (bsc#1209173):
- CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android
- CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android
- CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt
- CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode
- CVE-2023-25751: Incorrect code generation during JIT compilation
- CVE-2023-28160: Redirect to Web Extension files may have leaked local path
- CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation
- CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab
- CVE-2023-28162: Invalid downcast in Worklets
- CVE-2023-25752: Potential out-of-bounds when accessing throttled streams
- CVE-2023-28163: Windows Save As dialog resolved environment variables
- CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9
- CVE-2023-28177: Memory safety bugs fixed in Firefox 111
MozillaFirefox-102.9.0-150200.152.81.1.src.rpm
MozillaFirefox-102.9.0-150200.152.81.1.x86_64.rpm
MozillaFirefox-devel-102.9.0-150200.152.81.1.x86_64.rpm
MozillaFirefox-translations-common-102.9.0-150200.152.81.1.x86_64.rpm
MozillaFirefox-translations-other-102.9.0-150200.152.81.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1813
Recommended update for open-vm-tools
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issue:
- Ship missing open-vm-tools-salt-minion package. (bsc#1208880)
open-vm-tools-12.1.0-150300.23.5.src.rpm
open-vm-tools-desktop-12.1.0-150300.23.5.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1733
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2023-1289: Fixed segmentation fault and possible DoS via specially crafted SVG. (bsc#1209141)
ImageMagick-7.1.0.9-150400.6.15.1.src.rpm
ImageMagick-7.1.0.9-150400.6.15.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.15.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.15.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.15.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.15.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.15.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.15.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1938
Recommended update for NetworkManager
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for NetworkManager fixes the following issue:
- Adds missing NetworkManager and dependencies to Micro 5.3 (bsc#1204549, bsc#1205529)
- rp-pppoe: replace deprecated ifconfig dependency with iproute2. (bsc#1194715, jsc#SLE-24004)
bluez-5.62-150400.4.10.3.src.rpm
bluez-devel-5.62-150400.4.10.3.x86_64.rpm
libatm1-2.5.2-150400.14.2.3.x86_64.rpm
linux-atm-2.5.2-150400.14.2.3.src.rpm
linux-atm-devel-2.5.2-150400.14.2.3.x86_64.rpm
newt-0.52.20-150000.7.2.3.src.rpm
newt-devel-0.52.20-150000.7.2.3.x86_64.rpm
ppp-2.4.7-150000.5.10.3.src.rpm
ppp-2.4.7-150000.5.10.3.x86_64.rpm
ppp-devel-2.4.7-150000.5.10.3.x86_64.rpm
slang-2.3.1a-150000.5.2.3.src.rpm
slang-devel-2.3.1a-150000.5.2.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1715
Security update for flatpak
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for flatpak fixes the following issues:
- CVE-2023-28101: Fixed misleading terminal output with metadata with ANSI control codes (bsc#1209410).
- CVE-2023-28100: Fixed unsandboxed TIOCLINUX commands (bsc#1209411).
Update to version 1.12.8:
- Update the SELinux module to explicitly permit the system
helper have read access to /etc/passwd and systemd-userdbd,
read and lock access to /var/lib/flatpak, and watch files
inside $libexecdir
- If an app update is blocked by parental controls policies,
clean up the temporary deploy directory
- Fix Autotools build with versions of gpgme that no longer
provide gpgme-config(1)
- Remove some unreachable code
- Add missing handling for some D-Bus errors
Update to version 1.12.7:
- We now allow networked access to X11 and PulseAudio services
if that is configured, and the application has network access.
- Absolute paths in WAYLAND_DISPLAY now work
- Allow apps that were built with Flatpak 1.13.x to export
AppStream metadata in share/metainfo
- Most commands now work if /var/lib/flatpak exists but
flatpak-1.12.8-150400.3.3.1.src.rpm
flatpak-1.12.8-150400.3.3.1.x86_64.rpm
flatpak-devel-1.12.8-150400.3.3.1.x86_64.rpm
flatpak-zsh-completion-1.12.8-150400.3.3.1.x86_64.rpm
libflatpak0-1.12.8-150400.3.3.1.x86_64.rpm
system-user-flatpak-1.12.8-150400.3.3.1.x86_64.rpm
typelib-1_0-Flatpak-1_0-1.12.8-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1771
Security update for liblouis
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for liblouis fixes the following issues:
- CVE-2023-26767: Fixed buffer overflow vulnerability in lou_logFile function (bsc#1209429).
- CVE-2023-26769: Fixed buffer Overflow vulnerability in resolveSubtable function (bsc#1209432).
liblouis-3.20.0-150400.3.8.1.src.rpm
liblouis-data-3.20.0-150400.3.8.1.noarch.rpm
liblouis-devel-3.20.0-150400.3.8.1.x86_64.rpm
liblouis20-3.20.0-150400.3.8.1.x86_64.rpm
python3-louis-3.20.0-150400.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1854
Security update for liblouis
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for liblouis fixes the following issues:
- CVE-2023-26768: Fixed buffer overflow in lou_logFile() (bsc#1209431).
liblouis-3.20.0-150400.3.13.1.src.rpm
liblouis-data-3.20.0-150400.3.13.1.noarch.rpm
liblouis-devel-3.20.0-150400.3.13.1.x86_64.rpm
liblouis20-3.20.0-150400.3.13.1.x86_64.rpm
python3-louis-3.20.0-150400.3.13.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1855
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Firefox Extended Support Release 102.10.0 ESR (bsc#1210212)
- CVE-2023-29531: Out-of-bound memory access in WebGL on macOS
- CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass
- CVE-2023-29533: Fullscreen notification obscured
- MFSA-TMP-2023-0001: Double-free in libwebp
- CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction
- CVE-2023-29536: Invalid free from JavaScript code
- CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download
- CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux
- CVE-2023-29542: Bypass of file download extension restrictions
- CVE-2023-29545: Windows Save As dialog resolved environment variables
- CVE-2023-1945: Memory Corruption in Safe Browsing Code
- CVE-2023-29548: Incorrect optimization result on ARM64
- CVE-2023-29550: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10
MozillaFirefox-102.10.0-150200.152.84.1.src.rpm
MozillaFirefox-102.10.0-150200.152.84.1.x86_64.rpm
MozillaFirefox-devel-102.10.0-150200.152.84.1.x86_64.rpm
MozillaFirefox-translations-common-102.10.0-150200.152.84.1.x86_64.rpm
MozillaFirefox-translations-other-102.10.0-150200.152.84.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1994
Security update for avahi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for avahi fixes the following issues:
- CVE-2023-1981: Fixed crash in avahi-daemon (bsc#1210328).
avahi-0.8-150400.7.3.1.src.rpm
avahi-autoipd-0.8-150400.7.3.1.x86_64.rpm
avahi-glib2-0.8-150400.7.3.1.src.rpm
avahi-utils-gtk-0.8-150400.7.3.1.x86_64.rpm
libavahi-gobject-devel-0.8-150400.7.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1931
Security update for wireshark
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
- CVE-2023-1992: Fixed RPCoRDMA dissector crash (bsc#1210405).
- CVE-2023-1993: Fixed LISP dissector large loop (bsc#1210404).
- CVE-2023-1994: Fixed GQUIC dissector crash (bsc#1210403).
Update to 3.6.13:
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.13.html
wireshark-3.6.13-150000.3.89.1.src.rpm
wireshark-devel-3.6.13-150000.3.89.1.x86_64.rpm
wireshark-ui-qt-3.6.13-150000.3.89.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1927
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2023-1906: Fixed a heap-based buffer overflow in ImportMultiSpectralQuantum. (bsc#1210308)
ImageMagick-7.1.0.9-150400.6.18.1.src.rpm
ImageMagick-7.1.0.9-150400.6.18.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.18.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.18.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.18.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.18.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.18.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.18.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.18.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1999
Security update for fwupd
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of fwupd fixes the following issues:
- rebuild the package with the new secure boot key (bsc#1209188).
fwupd-1.5.8-150300.3.7.1.src.rpm
fwupdtpmevlog-1.5.8-150300.3.7.1.x86_64.rpm
libfwupdplugin1-1.5.8-150300.3.7.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2050
Security update for fwupd
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update of fwupd fixes the following issues:
- rebuild the package with the new secure boot key (bsc#1209188).
fwupd-1.7.3-150400.3.5.1.src.rpm
fwupd-1.7.3-150400.3.5.1.x86_64.rpm
fwupd-devel-1.7.3-150400.3.5.1.x86_64.rpm
fwupd-lang-1.7.3-150400.3.5.1.noarch.rpm
libfwupd2-1.7.3-150400.3.5.1.x86_64.rpm
libfwupdplugin5-1.7.3-150400.3.5.1.x86_64.rpm
typelib-1_0-Fwupd-2_0-1.7.3-150400.3.5.1.x86_64.rpm
typelib-1_0-FwupdPlugin-1_0-1.7.3-150400.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2065
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.38.6 (bsc#1210731):
- CVE-2022-0108: Fixed information leak.
- CVE-2022-32885: Fixed arbitrary code execution.
- CVE-2023-25358: Fixed use-after-free vulnerability in WebCore::RenderLayer.
- CVE-2023-27932: Fixed Same Origin Policy bypass.
- CVE-2023-27954: Fixed sensitive user information tracking.
- CVE-2023-28205: Fixed arbitrary code execution (bsc#1210295).
Already fixed in version 2.38.5:
- CVE-2022-32886, CVE-2022-32912, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363.
libjavascriptcoregtk-4_1-0-2.38.6-150400.4.39.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.38.6-150400.4.39.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.38.6-150400.4.39.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.38.6-150400.4.39.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.38.6-150400.4.39.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.38.6-150400.4.39.1.x86_64.rpm
webkit2gtk3-2.38.6-150400.4.39.1.src.rpm
webkit2gtk3-devel-2.38.6-150400.4.39.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2437
Recommended update for hplip
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for hplip fixes the following issues:
- Fix printer attribute handling which could provoke a buffer overflow if CUPS returned a printer with too large
`name/location/uri/etc` (bsc#1209866)
hplip-3.21.10-150400.3.8.1.src.rpm
hplip-3.21.10-150400.3.8.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2103
Security update for vim
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 1443, fixes the following security problems
- CVE-2023-1264: Fixed NULL Pointer Dereference (bsc#1209042).
- CVE-2023-1355: Fixed NULL Pointer Dereference (bsc#1209187).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).
gvim-9.0.1443-150000.5.40.1.x86_64.rpm
vim-9.0.1443-150000.5.40.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2108
Security update for ffmpeg
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg fixes the following issues:
- CVE-2022-48434: Fixed use after free in libavcodec/pthread_frame.c (bsc#1209934).
ffmpeg-3.4.2-150200.11.28.1.src.rpm
libavcodec57-3.4.2-150200.11.28.1.x86_64.rpm
libavformat57-3.4.2-150200.11.28.1.x86_64.rpm
libavresample3-3.4.2-150200.11.28.1.x86_64.rpm
libavutil-devel-3.4.2-150200.11.28.1.x86_64.rpm
libavutil55-3.4.2-150200.11.28.1.x86_64.rpm
libpostproc-devel-3.4.2-150200.11.28.1.x86_64.rpm
libpostproc54-3.4.2-150200.11.28.1.x86_64.rpm
libswresample-devel-3.4.2-150200.11.28.1.x86_64.rpm
libswresample2-3.4.2-150200.11.28.1.x86_64.rpm
libswscale-devel-3.4.2-150200.11.28.1.x86_64.rpm
libswscale4-3.4.2-150200.11.28.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2131
Recommended update for openssh
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openssh fixes the following issues:
- Remove some patches that cause invalid environment assignments (bsc#1207014).
openssh-askpass-gnome-8.4p1-150300.3.18.2.src.rpm
openssh-askpass-gnome-8.4p1-150300.3.18.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2194
Security update for libraw
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libraw fixes the following issues:
- CVE-2023-1729: Fixed a heap buffer overflow when converting an
image (bsc#1210720).
libraw-0.20.2-150400.3.6.1.src.rpm
libraw20-0.20.2-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2159
Recommended update for open-vm-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- Update to 12.2.0 (bsc#1209128)
- Build the containerinfo plugin for TW/SLES15-SP5 and newer.(jsc#PED-1344)
open-vm-tools-12.2.0-150300.26.1.src.rpm
open-vm-tools-desktop-12.2.0-150300.26.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2149
Recommended update for tigervnc
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for tigervnc fixes the following issues:
- Drop chown vnc:vnc calls in with-vnc-key.sh (bsc#1209283)
- Add TLSNone to -securitytypes to increase security in xvnc@.service (bsc#1209283)
libXvnc-devel-1.10.1-150400.7.8.1.x86_64.rpm
tigervnc-1.10.1-150400.7.8.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2341
Recommended update for libsigc++2
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libsigc++2 fixes the following issues:
- Remove executable permission for file (bsc#1209094, bsc#1209140)
atkmm1_6-2.28.3-150400.4.6.1.src.rpm
atkmm1_6-devel-2.28.3-150400.4.6.1.x86_64.rpm
libatkmm-1_6-1-2.28.3-150400.4.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2173
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Extended Support Release 102.11.0 ESR (bsc#1211175):
- CVE-2023-32205: Browser prompts could have been obscured by popups
- CVE-2023-32206: Crash in RLBox Expat driver
- CVE-2023-32207: Potential permissions request bypass via clickjacking
- CVE-2023-32211: Content process crash due to invalid wasm code
- CVE-2023-32212: Potential spoof due to obscured address bar
- CVE-2023-32213: Potential memory corruption in FileReader::DoReadData()
- CVE-2023-32214: Potential DoS via exposed protocol handlers
- CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
MozillaFirefox-102.11.0-150200.152.87.1.src.rpm
MozillaFirefox-102.11.0-150200.152.87.1.x86_64.rpm
MozillaFirefox-devel-102.11.0-150200.152.87.1.x86_64.rpm
MozillaFirefox-translations-common-102.11.0-150200.152.87.1.x86_64.rpm
MozillaFirefox-translations-other-102.11.0-150200.152.87.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2223
Security update for libheif
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libheif fixes the following issues:
- CVE-2023-29659: Fixed segfault caused by divide-by-zero (bsc#1211174).
libheif-1.12.0-150400.3.11.1.src.rpm
libheif1-1.12.0-150400.3.11.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2237
Recommended update for vim
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
* Make xxd conflict with the previous vim packages to avoid a file conflict during migration (bsc#1211144)
gvim-9.0.1443-150000.5.43.1.x86_64.rpm
vim-9.0.1443-150000.5.43.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2284
Security update for texlive
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for texlive fixes the following issues:
- CVE-2023-32700: Fixed arbitrary code execution in LuaTeX (bsc#1211389).
libkpathsea6-6.3.3-150400.31.3.1.x86_64.rpm
libptexenc1-1.3.9-150400.31.3.1.x86_64.rpm
libsynctex2-1.21-150400.31.3.1.x86_64.rpm
libtexlua53-5-5.3.6-150400.31.3.1.x86_64.rpm
libtexluajit2-2.1.0beta3-150400.31.3.1.x86_64.rpm
texlive-2021.20210325-150400.31.3.1.src.rpm
texlive-2021.20210325-150400.31.3.1.x86_64.rpm
texlive-a2ping-bin-2021.20210325.svn27321-150400.31.3.1.x86_64.rpm
texlive-accfonts-bin-2021.20210325.svn12688-150400.31.3.1.x86_64.rpm
texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.3.1.x86_64.rpm
texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-albatross-bin-2021.20210325.svn57089-150400.31.3.1.x86_64.rpm
texlive-aleph-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-amstex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-arara-bin-2021.20210325.svn29036-150400.31.3.1.x86_64.rpm
texlive-asymptote-bin-2021.20210325.svn57890-150400.31.3.1.x86_64.rpm
texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.3.1.x86_64.rpm
texlive-authorindex-bin-2021.20210325.svn18790-150400.31.3.1.x86_64.rpm
texlive-autosp-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.3.1.x86_64.rpm
texlive-biber-bin-2021.20210325.svn57273-150400.31.3.1.noarch.rpm
texlive-bibexport-bin-2021.20210325.svn16219-150400.31.3.1.x86_64.rpm
texlive-bibtex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-bin-devel-2021.20210325-150400.31.3.1.x86_64.rpm
texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.3.1.x86_64.rpm
texlive-cachepic-bin-2021.20210325.svn15543-150400.31.3.1.x86_64.rpm
texlive-checkcites-bin-2021.20210325.svn25623-150400.31.3.1.x86_64.rpm
texlive-checklistings-bin-2021.20210325.svn38300-150400.31.3.1.x86_64.rpm
texlive-chklref-bin-2021.20210325.svn52631-150400.31.3.1.x86_64.rpm
texlive-chktex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.3.1.x86_64.rpm
texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.3.1.x86_64.rpm
texlive-cluttex-bin-2021.20210325.svn48871-150400.31.3.1.x86_64.rpm
texlive-context-bin-2021.20210325.svn34112-150400.31.3.1.x86_64.rpm
texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.3.1.x86_64.rpm
texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.3.1.x86_64.rpm
texlive-cslatex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-csplain-bin-2021.20210325.svn50528-150400.31.3.1.x86_64.rpm
texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.3.1.x86_64.rpm
texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.3.1.x86_64.rpm
texlive-ctanify-bin-2021.20210325.svn24061-150400.31.3.1.x86_64.rpm
texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.3.1.x86_64.rpm
texlive-ctie-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-cweb-bin-2021.20210325.svn58136-150400.31.3.1.x86_64.rpm
texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.3.1.x86_64.rpm
texlive-de-macro-bin-2021.20210325.svn17399-150400.31.3.1.x86_64.rpm
texlive-detex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-diadia-bin-2021.20210325.svn37645-150400.31.3.1.noarch.rpm
texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.3.1.x86_64.rpm
texlive-dtl-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.3.1.x86_64.rpm
texlive-dviasm-bin-2021.20210325.svn8329-150400.31.3.1.x86_64.rpm
texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.3.1.x86_64.rpm
texlive-dviljk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-dvipng-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dvipos-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dvips-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-eplain-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-epspdf-bin-2021.20210325.svn29050-150400.31.3.1.x86_64.rpm
texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.3.1.x86_64.rpm
texlive-exceltex-bin-2021.20210325.svn25860-150400.31.3.1.x86_64.rpm
texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.3.1.x86_64.rpm
texlive-findhyph-bin-2021.20210325.svn14758-150400.31.3.1.x86_64.rpm
texlive-fontinst-bin-2021.20210325.svn53554-150400.31.3.1.x86_64.rpm
texlive-fontools-bin-2021.20210325.svn25997-150400.31.3.1.x86_64.rpm
texlive-fontware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-getmap-bin-2021.20210325.svn34971-150400.31.3.1.x86_64.rpm
texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.3.1.x86_64.rpm
texlive-glossaries-bin-2021.20210325.svn37813-150400.31.3.1.x86_64.rpm
texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.3.1.x86_64.rpm
texlive-jadetex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.3.1.x86_64.rpm
texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.3.1.x86_64.rpm
texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.3.1.x86_64.rpm
texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-kpathsea-devel-6.3.3-150400.31.3.1.x86_64.rpm
texlive-l3build-bin-2021.20210325.svn46894-150400.31.3.1.x86_64.rpm
texlive-lacheck-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm
texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.3.1.x86_64.rpm
texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm
texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.3.1.x86_64.rpm
texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.3.1.x86_64.rpm
texlive-latex2man-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.3.1.x86_64.rpm
texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.3.1.x86_64.rpm
texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.3.1.x86_64.rpm
texlive-latexindent-bin-2021.20210325.svn32150-150400.31.3.1.x86_64.rpm
texlive-latexmk-bin-2021.20210325.svn10937-150400.31.3.1.x86_64.rpm
texlive-latexpand-bin-2021.20210325.svn27025-150400.31.3.1.x86_64.rpm
texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.3.1.x86_64.rpm
texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.3.1.x86_64.rpm
texlive-listbib-bin-2021.20210325.svn26126-150400.31.3.1.x86_64.rpm
texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.3.1.x86_64.rpm
texlive-lollipop-bin-2021.20210325.svn41465-150400.31.3.1.x86_64.rpm
texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.3.1.x86_64.rpm
texlive-ltximg-bin-2021.20210325.svn32346-150400.31.3.1.x86_64.rpm
texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-luajittex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.3.1.x86_64.rpm
texlive-luatex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-lwarp-bin-2021.20210325.svn43292-150400.31.3.1.x86_64.rpm
texlive-m-tx-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-make4ht-bin-2021.20210325.svn37750-150400.31.3.1.x86_64.rpm
texlive-makedtx-bin-2021.20210325.svn38769-150400.31.3.1.x86_64.rpm
texlive-makeindex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-match_parens-bin-2021.20210325.svn23500-150400.31.3.1.x86_64.rpm
texlive-mathspic-bin-2021.20210325.svn23661-150400.31.3.1.x86_64.rpm
texlive-metafont-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-metapost-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-mex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.3.1.x86_64.rpm
texlive-mflua-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-mfware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.3.1.x86_64.rpm
texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.3.1.x86_64.rpm
texlive-mkpic-bin-2021.20210325.svn33688-150400.31.3.1.x86_64.rpm
texlive-mltex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.3.1.x86_64.rpm
texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.3.1.x86_64.rpm
texlive-musixtex-bin-2021.20210325.svn37026-150400.31.3.1.x86_64.rpm
texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-omegaware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-optex-bin-2021.20210325.svn53804-150400.31.3.1.x86_64.rpm
texlive-patgen-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-pax-bin-2021.20210325.svn10843-150400.31.3.1.x86_64.rpm
texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.3.1.x86_64.rpm
texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.3.1.x86_64.rpm
texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.3.1.x86_64.rpm
texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.3.1.x86_64.rpm
texlive-pdftex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm
texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.3.1.x86_64.rpm
texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.3.1.x86_64.rpm
texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.3.1.x86_64.rpm
texlive-perltex-bin-2021.20210325.svn16181-150400.31.3.1.x86_64.rpm
texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.3.1.x86_64.rpm
texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.3.1.x86_64.rpm
texlive-pkfix-bin-2021.20210325.svn13364-150400.31.3.1.x86_64.rpm
texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-platex-bin-2021.20210325.svn52800-150400.31.3.1.x86_64.rpm
texlive-pmx-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.3.1.x86_64.rpm
texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.3.1.x86_64.rpm
texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.3.1.x86_64.rpm
texlive-ptex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.3.1.x86_64.rpm
texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.3.1.x86_64.rpm
texlive-ptexenc-devel-1.3.9-150400.31.3.1.x86_64.rpm
texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.3.1.x86_64.rpm
texlive-pythontex-bin-2021.20210325.svn31638-150400.31.3.1.x86_64.rpm
texlive-rubik-bin-2021.20210325.svn32919-150400.31.3.1.x86_64.rpm
texlive-scripts-bin-2021.20210325.svn55172-150400.31.3.1.x86_64.rpm
texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.3.1.x86_64.rpm
texlive-seetexk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-spix-bin-2021.20210325.svn55933-150400.31.3.1.x86_64.rpm
texlive-splitindex-bin-2021.20210325.svn29688-150400.31.3.1.x86_64.rpm
texlive-srcredact-bin-2021.20210325.svn38710-150400.31.3.1.x86_64.rpm
texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.3.1.x86_64.rpm
texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-synctex-bin-2021.20210325.svn58136-150400.31.3.1.x86_64.rpm
texlive-synctex-devel-1.21-150400.31.3.1.x86_64.rpm
texlive-tex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.3.1.x86_64.rpm
texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-texcount-bin-2021.20210325.svn13013-150400.31.3.1.x86_64.rpm
texlive-texdef-bin-2021.20210325.svn45011-150400.31.3.1.x86_64.rpm
texlive-texdiff-bin-2021.20210325.svn15506-150400.31.3.1.x86_64.rpm
texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.3.1.x86_64.rpm
texlive-texdoc-bin-2021.20210325.svn47948-150400.31.3.1.x86_64.rpm
texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.3.1.x86_64.rpm
texlive-texfot-bin-2021.20210325.svn33155-150400.31.3.1.x86_64.rpm
texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.3.1.x86_64.rpm
texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-texlua-devel-5.3.6-150400.31.3.1.x86_64.rpm
texlive-texluajit-devel-2.1.0beta3-150400.31.3.1.x86_64.rpm
texlive-texosquery-bin-2021.20210325.svn43596-150400.31.3.1.x86_64.rpm
texlive-texplate-bin-2021.20210325.svn53444-150400.31.3.1.x86_64.rpm
texlive-texsis-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-texware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.3.1.x86_64.rpm
texlive-tie-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.3.1.x86_64.rpm
texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.3.1.x86_64.rpm
texlive-ulqda-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm
texlive-uplatex-bin-2021.20210325.svn52800-150400.31.3.1.x86_64.rpm
texlive-uptex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-urlbst-bin-2021.20210325.svn23262-150400.31.3.1.x86_64.rpm
texlive-velthuis-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-vlna-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm
texlive-vpe-bin-2021.20210325.svn6897-150400.31.3.1.x86_64.rpm
texlive-web-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-webquiz-bin-2021.20210325.svn50419-150400.31.3.1.x86_64.rpm
texlive-wordcount-bin-2021.20210325.svn46165-150400.31.3.1.x86_64.rpm
texlive-xdvi-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm
texlive-xetex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm
texlive-xindex-bin-2021.20210325.svn49312-150400.31.3.1.x86_64.rpm
texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm
texlive-xmltex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm
texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.3.1.x86_64.rpm
texlive-yplan-bin-2021.20210325.svn34398-150400.31.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2320
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Updated to version 3.6.14:
- CVE-2023-2855: Fixed a crash in the Candump log file parser
(boo#1211703).
- CVE-2023-2856: Fixed a crash in the VMS TCPIPtrace file parser
(boo#1211707).
- CVE-2023-2857: Fixed a crash in the BLF file parser (boo#1211705).
- CVE-2023-2858: Fixed a crash in the NetScaler file parser
(boo#1211706).
- CVE-2023-0668: Fixed a crash in the IEEE C37.118 Synchrophasor
dissector (boo#1211710).
- CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793).
Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.14.html
wireshark-3.6.14-150000.3.92.1.src.rpm
wireshark-devel-3.6.14-150000.3.92.1.x86_64.rpm
wireshark-ui-qt-3.6.14-150000.3.92.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2344
Security update for ImageMagick
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2023-34151: Fixed an undefined behavior issue due to floating
point truncation (bsc#1211791).
- CVE-2023-34153: Fixed a command injection issue when encoding or
decoding VIDEO files (bsc#1211792).
ImageMagick-7.1.0.9-150400.6.21.1.src.rpm
ImageMagick-7.1.0.9-150400.6.21.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.21.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.21.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2489
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Extended Support Release 102.12.0 ESR (bsc#1211922):
- CVE-2023-34414: Click-jacking certificate exceptions through rendering lag
- CVE-2023-34416: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
MozillaFirefox-102.12.0-150200.152.90.1.src.rpm
MozillaFirefox-102.12.0-150200.152.90.1.x86_64.rpm
MozillaFirefox-devel-102.12.0-150200.152.90.1.x86_64.rpm
MozillaFirefox-translations-common-102.12.0-150200.152.90.1.x86_64.rpm
MozillaFirefox-translations-other-102.12.0-150200.152.90.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2811
Recommended update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt fixes the following issues:
This update provides a feature update to the FIDO2 stack.
Changes in libfido2:
- Version 1.13.0 (2023-02-20)
* New API calls:
+ fido_assert_empty_allow_list;
+ fido_cred_empty_exclude_list.
* fido2-token: fix issue when listing large blobs.
- Version 1.12.0 (2022-09-22)
* Support for COSE_ES384.
* Improved support for FIDO 2.1 authenticators.
* New API calls:
+ es384_pk_free;
+ es384_pk_from_EC_KEY;
+ es384_pk_from_EVP_PKEY;
+ es384_pk_from_ptr;
+ es384_pk_new;
+ es384_pk_to_EVP_PKEY;
+ fido_cbor_info_certs_len;
+ fido_cbor_info_certs_name_ptr;
+ fido_cbor_info_certs_value_ptr;
+ fido_cbor_info_maxrpid_minpinlen;
+ fido_cbor_info_minpinlen;
+ fido_cbor_info_new_pin_required;
+ fido_cbor_info_rk_remaining;
+ fido_cbor_info_uv_attempts;
+ fido_cbor_info_uv_modality.
* Documentation and reliability fixes.
- Version 1.11.0 (2022-05-03)
* Experimental PCSC support; enable with -DUSE_PCSC.
* Improved OpenSSL 3.0 compatibility.
* Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs.
* winhello: advertise "uv" instead of "clientPin".
* winhello: support hmac-secret in fido_dev_get_assert().
* New API calls:
+ fido_cbor_info_maxlargeblob.
* Documentation and reliability fixes.
* Separate build and regress targets.
- Version 1.10.0 (2022-01-17)
* bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480.
* New API calls:
- fido_dev_info_set;
- fido_dev_io_handle;
- fido_dev_new_with_info;
- fido_dev_open_with_info.
* Cygwin and NetBSD build fixes.
* Documentation and reliability fixes.
* Support for TPM 2.0 attestation of COSE_ES256 credentials.
- Version 1.9.0 (2021-10-27)
* Enabled NFC support on Linux.
* Support for FIDO 2.1 "minPinLength" extension.
* Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation.
* Support for TPM 2.0 attestation.
* Support for device timeouts; see fido_dev_set_timeout().
* New API calls:
- es256_pk_from_EVP_PKEY;
- fido_cred_attstmt_len;
- fido_cred_attstmt_ptr;
- fido_cred_pin_minlen;
- fido_cred_set_attstmt;
- fido_cred_set_pin_minlen;
- fido_dev_set_pin_minlen_rpid;
- fido_dev_set_timeout;
- rs256_pk_from_EVP_PKEY.
* Reliability and portability fixes.
* Better handling of HID devices without identification strings; gh#381.
- Update to version 1.8.0:
* Better support for FIDO 2.1 authenticators.
* Support for attestation format 'none'.
* New API calls:
- fido_assert_set_clientdata;
- fido_cbor_info_algorithm_cose;
- fido_cbor_info_algorithm_count;
- fido_cbor_info_algorithm_type;
- fido_cbor_info_transports_len;
- fido_cbor_info_transports_ptr;
- fido_cred_set_clientdata;
- fido_cred_set_id;
- fido_credman_set_dev_rk;
- fido_dev_is_winhello.
* fido2-token: new -Sc option to update a resident credential.
* Documentation and reliability fixes.
* HID access serialisation on Linux.
- Update to version 1.7.0:
* hid_win: detect devices with vendor or product IDs > 0x7fff
* Support for FIDO 2.1 authenticator configuration.
* Support for FIDO 2.1 UV token permissions.
* Support for FIDO 2.1 "credBlobs" and "largeBlobs" extensions.
* New API calls
* New fido_init flag to disable fido_dev_open’s U2F fallback
* Experimental NFC support on Linux.
- Enabled hidapi again, issues related to hidapi are fixed upstream
- Update to version 1.6.0:
* Documentation and reliability fixes.
* New API calls:
+ fido_cred_authdata_raw_len;
+ fido_cred_authdata_raw_ptr;
+ fido_cred_sigcount;
+ fido_dev_get_uv_retry_count;
+ fido_dev_supports_credman.
* Hardened Windows build.
* Native FreeBSD and NetBSD support.
* Use CTAP2 canonical CBOR when combining hmac-secret and credProtect.
- Create a udev subpackage and ship the udev rule.
Changes in python-fido2:
- update to 0.9.3:
* Don't fail device discovery when hidraw doesn't support HIDIOCGRAWUNIQ
* Support the latest Windows webauthn.h API (included in Windows 11).
* Add product name and serial number to HidDescriptors.
* Remove the need for the uhid-freebsd dependency on FreeBSD.
- Update to version 0.9.1
* Add new CTAP error codes and improve handling of unknown codes.
* Client: API changes to better support extensions.
* Client.make_credential now returns a AuthenticatorAttestationResponse,
which holds the AttestationObject and ClientData, as well as any
client extension results for the credential.
* Client.get_assertion now returns an AssertionSelection object,
which is used to select between multiple assertions
* Renames: The CTAP1 and CTAP2 classes have been renamed to
Ctap1 and Ctap2, respectively.
* ClientPin: The ClientPin API has been restructured to support
multiple PIN protocols, UV tokens, and token permissions.
* CTAP 2.1 PRE: Several new features have been added for CTAP 2.1
* HID: The platform specific HID code has been revamped
- Version 0.8.1 (released 2019-11-25)
* Bugfix: WindowsClient.make_credential error when resident key requirement is unspecified.
- Version 0.8.0 (released 2019-11-25)
* New fido2.webauthn classes modeled after the W3C WebAuthn spec introduced.
* CTAP2 send_cbor/make_credential/get_assertion and U2fClient request/authenticate timeout arguments replaced with event used to cancel a request.
* Fido2Client:
- make_credential/get_assertion now take WebAuthn options objects.
- timeout is now provided in ms in WebAuthn options objects. Event based cancelation also available by passing an Event.
* Fido2Server:
- ATTESTATION, USER_VERIFICATION, and AUTHENTICATOR_ATTACHMENT enums have been replaced with fido2.webauthn classes.
- RelyingParty has been replaced with PublicKeyCredentialRpEntity, and name is no longer optional.
- Options returned by register_begin/authenticate_begin now omit unspecified values if they are optional, instead of filling in default values.
- Fido2Server.allowed_algorithms now contains a list of PublicKeyCredentialParameters instead of algorithm identifiers.
- Fido2Server.timeout is now in ms and of type int.
* Support native WebAuthn API on Windows through WindowsClient.
- Version 0.7.2 (released 2019-10-24)
* Support for the TPM attestation format.
* Allow passing custom challenges to register/authenticate in Fido2Server.
* Bugfix: CTAP2 CANCEL command response handling fixed.
* Bugfix: Fido2Client fix handling of empty allow_list.
* Bugfix: Fix typo in CTAP2.get_assertions() causing it to fail.
- Version 0.7.1 (released 2019-09-20)
* Enforce canonical CBOR on Authenticator responses by default.
* PCSC: Support extended APDUs.
* Server: Verify that UP flag is set.
* U2FFido2Server: Implement AppID exclusion extension.
* U2FFido2Server: Allow custom U2F facet verification.
* Bugfix: U2FFido2Server.authenticate_complete now returns the result.
- Version 0.7.0 (released 2019-06-17)
* Add support for NFC devices using PCSC.
* Add support for the hmac-secret Authenticator extension.
* Honor max credential ID length and number of credentials to Authenticator.
* Add close() method to CTAP devices to explicitly release their resources.
- Version 0.6.0 (released 2019-05-10)
* Don't fail if CTAP2 Info contains unknown fields.
* Replace cbor loads/dumps functions with encode/decode/decode_from.
* Server: Add support for AuthenticatorAttachment.
* Server: Add support for more key algorithms.
* Client: Expose CTAP2 Info object as Fido2Client.info.
Changes in yubikey-manager:
- Update to version 4.0.9 (released 2022-06-17)
* Dependency: Add support for python-fido2 1.x
* Fix: Drop stated support for Click 6 as features from 7 are being used.
- Update to version 4.0.8 (released 2022-01-31)
* Bugfix: Fix error message for invalid modhex when programing a YubiOTP credential.
* Bugfix: Fix issue with displaying a Steam credential when it is the only account.
* Bugfix: Prevent installation of files in site-packages root.
* Bugfix: Fix cleanup logic in PIV for protected management key.
* Add support for token identifier when programming slot-based HOTP.
* Add support for programming NDEF in text mode.
* Dependency: Add support for Cryptography ⇐ 38.
- version update to 4.0.7
** Bugfix release: Fix broken naming for "YubiKey 4", and a small OATH issue with
touch Steam credentials.
- version 4.0.6 (released 2021-09-08)
** Improve handling of YubiKey device reboots.
** More consistently mask PIN/password input in prompts.
** Support switching mode over CCID for YubiKey Edge.
** Run pkill from PATH instead of fixed location.
- version 4.0.5 (released 2021-07-16)
** Bugfix: Fix PIV feature detection for some YubiKey NEO versions.
** Bugfix: Fix argument short form for --period when adding TOTP credentials.
** Bugfix: More strict validation for some arguments, resulting in better error messages.
** Bugfix: Correctly handle TOTP credentials using period != 30 AND touch_required.
** Bugfix: Fix prompting for access code in the otp settings command (now uses "-A -").
- Update to version 4.0.3
* Add support for fido reset over NFC.
* Bugfix: The --touch argument to piv change-management-key was
ignored.
* Bugfix: Don’t prompt for password when importing PIV key/cert
if file is invalid.
* Bugfix: Fix setting touch-eject/auto-eject for YubiKey 4 and NEO.
* Bugfix: Detect PKCS#12 format when outer sequence uses
indefinite length.
* Dependency: Add support for Click 8.
- Update to version 4.0.2
* Update device names
* Add read_info output to the --diagnose command, and show
exception types.
* Bugfix: Fix read_info for YubiKey Plus.
* Add support for YK5-based FIPS YubiKeys.
* Bugfix: Fix OTP device enumeration on Win32.
* Drop reliance on libusb and libykpersonalize.
* Support the "fido" and "otp" subcommands over NFC
* New "ykman --diagnose" command to aid in troubleshooting.
* New "ykman apdu" command for sending raw APDUs over the smart
card interface.
* New "yubikit" package added for custom development and advanced
scripting.
* OpenPGP: Add support for KDF enabled YubiKeys.
* Static password: Add support for FR, IT, UK and BEPO keyboard
layouts.
- Update to 3.1.1
* Add support for YubiKey 5C NFC
* OpenPGP: set-touch now performs compatibility checks before prompting for PIN
* OpenPGP: Improve error messages and documentation for set-touch
* PIV: read-object command no longer adds a trailing newline
* CLI: Hint at missing permissions when opening a device fails
* Linux: Improve error handling when pcscd is not running
* Windows: Improve how .DLL files are loaded, thanks to Marius Gabriel Mihai for reporting this!
* Bugfix: set-touch now accepts the cached-fixed option
* Bugfix: Fix crash in OtpController.prepare_upload_key() error parsing
* Bugfix: Fix crash in piv info command when a certificate slot contains an invalid certificate
* Library: PivController.read_certificate(slot) now wraps certificate parsing exceptions in new exception type InvalidCertificate
* Library: PivController.list_certificates() now returns None for slots containing invalid certificate, instead of raising an exception
- Version 3.1.0 (released 2019-08-20)
* Add support for YubiKey 5Ci
* OpenPGP: the info command now prints OpenPGP specification version as well
* OpenPGP: Update support for attestation to match OpenPGP v3.4
* PIV: Use UTC time for self-signed certificates
* OTP: Static password now supports the Norman keyboard layout
- Version 3.0.0 (released 2019-06-24)
* Add support for new YubiKey Preview and lightning form factor
* FIDO: Support for credential management
* OpenPGP: Support for OpenPGP attestation, cardholder certificates and
cached touch policies
* OTP: Add flag for using numeric keypad when sending digits
- Version 2.1.1 (released 2019-05-28)
* OTP: Add initial support for uploading Yubico OTP credentials to YubiCloud
* Don’t automatically select the U2F applet on YubiKey NEO, it might be
blocked by the OS
* ChalResp: Always pad challenge correctly
* Bugfix: Don’t crash with older versions of cryptography
* Bugfix: Password was always prompted in OATH command, even if sent as
argument
Changes in yubikey-manager-qt:
- update to 1.2.5:
* Compatibility update for ykman 5.0.1.
* Update to Python 3.11.
* Update product images.
- Update to version 1.2.4 (released 2021-10-26)
* Update device names and images.
* PIV: Fix import of certificate.
- Update to version 1.2.3
* Improved error handling when using Security Key Series devices.
* PIV: Fix generation of certificate in slot 9c.
- Update to version 1.2.2
* Fix detection of YubiKey Plus
* Compatibility update for yubikey-manager 4.0
* Bugfix: Device caching with multiple devices
* Drop dependencies on libusb and libykpers.
* Add additional product names and images
- update to 1.1.5
* Add support for YubiKey 5C NFC
- Update to version 1.1.4
* OTP: Add option to upload YubiOTP credential to YubiCloud
* Linux: Show hint about pcscd service if opening device fails
* Bugfix: Signal handling now compatible with Python 3.8
- Version 1.1.3 (released 2019-08-20)
* Add suppport for YubiKey 5Ci
* PIV: Use UTC time for self-signed certificates
- Version 1.1.2 (released 2019-06-24)
* Add support for new YubiKey Preview
* PIV: The popup for the management key now have a "Use default" option
* Windows: Fix issue with importing PIV certificates
* Bugfix: generate static password now works correctly
yubikey-manager-qt-1.2.5-150400.9.3.1.src.rpm
yubikey-manager-qt-1.2.5-150400.9.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2640
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- CVE-2023-2426: Fixed out-of-range pointer offset (bsc#1210996).
- CVE-2023-2609: Fixed NULL pointer dereference (bsc#1211256).
- CVE-2023-2610: Fixed integer overflow or wraparound (bsc#1211257).
gvim-9.0.1572-150000.5.46.1.x86_64.rpm
vim-9.0.1572-150000.5.46.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2647
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Add security patches (bsc#1211846):
- CVE-2023-28204: Fixed processing of web content that may disclose sensitive information (bsc#1211659).
- CVE-2023-32373: Fixed processing of maliciously crafted web content that may lead to arbitrary code execution (bsc#1211658).
libjavascriptcoregtk-4_1-0-2.38.6-150400.4.42.4.x86_64.rpm
libwebkit2gtk-4_1-0-2.38.6-150400.4.42.4.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.38.6-150400.4.42.4.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.38.6-150400.4.42.4.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.38.6-150400.4.42.4.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.38.6-150400.4.42.4.x86_64.rpm
webkit2gtk3-2.38.6-150400.4.42.4.src.rpm
webkit2gtk3-devel-2.38.6-150400.4.42.4.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2942
Recommended update for gtk3
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gtk3 fixes the following issues:
- Fix nautilus crash after entering wrong SMB password (bsc#1211952)
gtk3-devel-doc-3.24.34-150400.3.6.1.x86_64.rpm
gtk3-doc-3.24.34-150400.3.6.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2604
Security update for open-vm-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143).
Bug fixes:
- Fixed build problem with grpc 1.54 (bsc#1210695).
open-vm-tools-12.2.0-150300.29.1.src.rpm
open-vm-tools-desktop-12.2.0-150300.29.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2976
Recommended update for gdm
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gdm fixes the following issues:
- Update /var/log/btmp after failed login (bsc#1211825)
gdm-41.3-150400.4.9.1.src.rpm
gdm-41.3-150400.4.9.1.x86_64.rpm
gdm-devel-41.3-150400.4.9.1.x86_64.rpm
gdm-lang-41.3-150400.4.9.1.noarch.rpm
gdm-schema-41.3-150400.4.9.1.noarch.rpm
gdm-systemd-41.3-150400.4.9.1.noarch.rpm
gdmflexiserver-41.3-150400.4.9.1.noarch.rpm
libgdm1-41.3-150400.4.9.1.x86_64.rpm
typelib-1_0-Gdm-1_0-41.3-150400.4.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2605
Security update for bluez
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for bluez fixes the following issues:
- CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398).
bluez-5.62-150400.4.13.1.src.rpm
bluez-devel-5.62-150400.4.13.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2550
Recommended update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings ships the update stack to
the INSTALLER self-update channel.
yast2-pkg-bindings:
- Added a new option for rebuilding the RPM database (--rebuilddb) (bsc#1209565)
autoyast2:
- Selected products are not installed after resetting the package manager internally (bsc#1202234)
libyui:
- Prevent buffer overflow when drawing very wide labels in ncurses (bsc#1211354)
- Fixed loading icons from an absolute path (bsc#1210591)
- Fix for main window stacking order to avoid unintentional transparency (bsc#1199020, bsc#1191112)
- Force messages from .ui file through our translation mechanism (bsc#1198097)
libyui-qt-pkg-4.3.7-150400.3.3.1.src.rpm
True
libyui-qt-pkg-devel-4.3.7-150400.3.3.1.x86_64.rpm
True
libyui-qt-pkg16-4.3.7-150400.3.3.1.x86_64.rpm
True
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3252
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Update to Wireshark 3.6.15:
- Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.15.html
Security fixes:
- CVE-2023-0667: Fixed failure to validate MS-MMS packet length (bsc#1212084).
- CVE-2023-0668: Fixed IEEE C37.118 Synchrophasor dissector crash (bsc#1211710).
- CVE-2023-2855: Fixed Candump log file parser crash (bsc#1211703).
- CVE-2023-2856: Fixed VMS TCPIPtrace file parser crash (bsc#1211707).
- CVE-2023-2857: Fixed BLF file parser crash (bsc#1211705).
- CVE-2023-2858: Fixed NetScaler file parser crash (bsc#1211706).
- CVE-2023-2879: Fixed GDSDB dissector infinite loop (bsc#1211793).
- CVE-2023-2952: Fixed XRA dissector infinite loop (bsc#1211844).
- CVE-2023-3648: Fixed Kafka dissector crash (bsc#1213319).
wireshark-3.6.15-150000.3.97.1.src.rpm
wireshark-devel-3.6.15-150000.3.97.1.x86_64.rpm
wireshark-ui-qt-3.6.15-150000.3.97.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2878
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2023-34474: Fixed heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c (bsc#1212237).
ImageMagick-7.1.0.9-150400.6.24.1.src.rpm
ImageMagick-7.1.0.9-150400.6.24.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.24.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.24.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.24.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.24.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.24.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.24.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.24.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3468
Recommended update for python3
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for python3 fixes the following issue:
- Rename sources in preparation of python3.11 (jsc#PED-68)
python3-pysmbc-1.0.23-150400.6.69.src.rpm
python3-pysmbc-1.0.23-150400.6.69.x86_64.rpm
python3-qt5-5.15.6-150400.5.54.src.rpm
python3-qt5-5.15.6-150400.5.54.x86_64.rpm
python3-qt5-5.15.6-150400.5.67.src.rpm
python3-qt5-devel-5.15.6-150400.5.54.x86_64.rpm
python3-qt5-sip-12.9.0-150400.5.69.src.rpm
python3-qt5-sip-12.9.0-150400.5.69.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2903
Recommended update for xdg-desktop-portal
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for xdg-desktop-portal fixes the following issues:
- Add patch from upstream to avoid making a synchronous call which
can cause a deadlock in a non-GNOME, non-XFCE environment. This
fixes a delay of ~20 seconds when starting gnome-terminal on a
non-gnome desktop (bsc#1212037)
- Add (rebased) patch from upstream to avoid creating portals with
non-functional backends
xdg-desktop-portal-1.10.1-150400.3.3.1.src.rpm
xdg-desktop-portal-1.10.1-150400.3.3.1.x86_64.rpm
xdg-desktop-portal-devel-1.10.1-150400.3.3.1.x86_64.rpm
xdg-desktop-portal-lang-1.10.1-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2886
Security update for MozillaFirefox, MozillaFirefox-branding-SLE
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox, MozillaFirefox-branding-SLE fixes the following issues:
Changes in MozillaFirefox and MozillaFirefox-branding-SLE:
This update provides Firefox Extended Support Release 115.0 ESR
* New:
- Required fields are now highlighted in PDF forms.
- Improved performance on high-refresh rate monitors (120Hz+).
- Buttons in the Tabs toolbar can now be reached with Tab,
Shift+Tab, and Arrow keys. View this article for additional
details.
- Windows' "Make text bigger" accessibility setting now
affects all the UI and content pages, rather than only
applying to system font sizes.
- Non-breaking spaces are now preserved—preventing automatic
line breaks—when copying text from a form control.
- Fixed WebGL performance issues on NVIDIA binary drivers via
DMA-Buf on Linux.
- Fixed an issue in which Firefox startup could be
significantly slowed down by the processing of Web content
local storage. This had the greatest impact on users with
platter hard drives and significant local storage.
- Removed a configuration option to allow SHA-1 signatures in
certificates: SHA-1 signatures in certificates—long since
determined to no longer be secure enough—are now not
supported.
- Highlight color is preserved correctly after typing `Enter`
in the mail composer of Yahoo Mail and Outlook.
After bypassing the https only error page navigating back
would take you to the error page that was previously
dismissed. Back now takes you to the previous site that was
visited.
- Paste unformatted shortcut (shift+ctrl/cmd+v) now works in
plain text contexts, such as input and text area.
- Added an option to print only the current page from the
print preview dialog.
- Swipe to navigate (two fingers on a touchpad swiped left or
right to perform history back or forward) on Windows is now
enabled.
- Stability on Windows is significantly improved as Firefox
handles low-memory situations much better.
- Touchpad scrolling on macOS was made more accessible by
reducing unintended diagonal scrolling opposite of the
intended scroll axis.
- Firefox is less likely to run out of memory on Linux and
performs more efficiently for the rest of the system when
memory runs low.
- It is now possible to edit PDFs: including writing text,
drawing, and adding signatures.
- Setting Firefox as your default browser now also makes it
the default PDF application on Windows systems.
- Swipe-to-navigate (two fingers on a touchpad swiped left or
right to perform history back or forward) now works for Linux
users on Wayland.
- Text Recognition in images allows users on macOS 10.15 and
higher to extract text from the selected image (such as a
meme or screenshot).
- Firefox View helps you get back to content you previously
discovered. A pinned tab allows you to find and open recently
closed tabs on your current device and access tabs from other
devices (via our “Tab Pickup” feature).
- Import maps, which allow web pages to control the behavior
of JavaScript imports, are now enabled by default.
- Processes used for background tabs now use efficiency mode
on Windows 11 to limit resource use.
- The shift+esc keyboard shortcut now opens the Process
Manager, offering a way to quickly identify processes that
are using too many resources.
- Firefox now supports properly color correcting images
tagged with ICCv4 profiles.
- Support for non-English characters when saving and printing
PDF forms.
- The bookmarks toolbar's default "Only show on New Tab"
state works correctly for blank new tabs. As before, you can
change the bookmark toolbar's behavior using the toolbar
context menu.
- Manifest Version 3 (MV3) extension support is now enabled
by default (MV2 remains enabled/supported). This major update
also ushers an exciting user interface change in the form of
the new extensions button.
- The Arbitrary Code Guard exploit protection has been
enabled in the media playback utility processes, improving
security for Windows users.
- The native HTML date picker for date and datetime inputs
can now be used with a keyboard alone, improving its
accessibility for screen reader users. Users with limited
mobility can also now use common keyboard shortcuts to
navigate the calendar grid and month selection spinners.
- Firefox builds in the Spanish from Spain (es-ES) and
Spanish from Argentina (es-AR) locales now come with a built-
in dictionary for the Firefox spellchecker.
- On macOS, Ctrl or Cmd + trackpad or mouse wheel now scrolls
the page instead of zooming. This avoids accidental zooming
and matches the behavior of other web browsers on macOS.
- It's now possible to import bookmarks, history and
passwords not only from Edge, Chrome or Safari but also from
Opera, Opera GX, and Vivaldi.
- GPU sandboxing has been enabled on Windows.
- On Windows, third-party modules can now be blocked from
injecting themselves into Firefox, which can be helpful if
they are causing crashes or other undesirable behavior.
- Date, time, and datetime-local input fields can now be
cleared with `Cmd+Backspace` and `Cmd+Delete` shortcut on
macOS and `Ctrl+Backspace` and `Ctrl+Delete` on Windows and
Linux.
- GPU-accelerated Canvas2D is enabled by default on macOS and
Linux.
- WebGL performance improvement on Windows, MacOS and Linux.
- Enables overlay of hardware-decoded video with non-Intel
GPUs on Windows 10/11, improving video playback performance
and video scaling quality.
- Windows native notifications are now enabled.
- Firefox Relay users can now opt-in to create Relay email
masks directly from the Firefox credential manager. You must
be signed in with your Firefox Account.
- We’ve added two new locales: Silhe Friulian (fur) and
Sardinian (sc).
- Right-clicking on password fields now shows an option to
reveal the password.
- Private windows and ETP set to strict will now include
email tracking protection. This will make it harder for email
trackers to learn the browsing habits of Firefox users. You
can check the Tracking Content in the sub-panel on the shield
icon panel.
- The deprecated U2F Javascript API is now disabled by
default. The U2F protocol remains usable through the WebAuthn
API. The U2F API can be re-enabled using the
`security.webauth.u2f` preference.
- Say hello to enhanced Picture-in-Picture! Rewind, check
video duration, and effortlessly switch to full-screen mode
on the web's most popular video websites.
- Firefox's address bar is already a great place to search
for what you're looking for. Now you'll always be able to see
your web search terms and refine them while viewing your
search's results - no additional scrolling needed! Also, a
new result menu has been added making it easier to remove
history results and dismiss sponsored Firefox Suggest
entries.
- Private windows now protect users even better by blocking
third-party cookies and storage of content trackers.
- Passwords automatically generated by Firefox now include
special characters, giving users more secure passwords by
default.
- Firefox 115 introduces a redesigned accessibility engine
which significantly improves the speed, responsiveness, and
stability of Firefox when used with:
- Screen readers, as well as certain other accessibility
software;
- East Asian input methods;
- Enterprise single sign-on software; and
- Other applications which use accessibility frameworks to
access information.
- Firefox 115 now supports AV1 Image Format files containing
animations (AVIS), improving support for AVIF images across
the web.
- The Windows GPU sandbox first shipped in the Firefox 110
release has been tightened to enhance the security benefits
it provides.
- A 13-year-old feature request was fulfilled and Firefox now
supports files being drag-and-dropped directly from Microsoft
Outlook. A special thanks to volunteer contributor Marco
Spiess for helping to get this across the finish line!
- Users on macOS can now access the Services sub-menu
directly from Firefox context menus.
- On Windows, the elastic overscroll effect has been enabled
by default. When two-finger scrolling on the touchpad or
scrolling on the touchscreen, you will now see a bouncing
animation when scrolling past the edge of a scroll container.
- Firefox is now available in the Tajik (tg) language.
- Added UI to manage the DNS over HTTPS exception list.
- Bookmarks can now be searched from the Bookmarks menu. The
Bookmarks menu is accessible by adding the Bookmarks menu
button to the toolbar.
- Restrict searches to your local browsing history by
selecting Search history from the History, Library or
Application menu buttons.
- Mac users can now capture video from their cameras in all
supported native resolutions. This enables resolutions higher
than 1280x720.
- It is now possible to reorder the extensions listed in the
extensions panel.
- Users on macOS, Linux, and Windows 7 can now use FIDO2 /
WebAuthn authenticators over USB. Some advanced features,
such as fully passwordless logins, require a PIN to be set on
the authenticator.
- Pocket Recommended content can now be seen in France,
Italy, and Spain.
- DNS over HTTPS settings are now part of the Privacy &
Security section of the Settings page and allow the user to
choose from all the supported modes.
- Migrating from another browser? Now you can bring over
payment methods you've saved in Chrome-based browsers to
Firefox.
- Hardware video decoding enabled for Intel GPUs on Linux.
- The Tab Manager dropdown now features close buttons, so you
can close tabs more quickly.
- Windows Magnifier now follows the text cursor correctly
when the Firefox title bar is visible.
- Undo and redo are now available in Password fields.
[1]:https://support.mozilla.org/kb/access-toolbar-functions-
using-keyboard?_gl=1*16it7nj*_ga*MTEzNjg4MjY5NC4xNjQ1MjAxMDU3
*_ga_MQ7767QQQW*MTY1Njk2MzExMS43LjEuMTY1Njk2MzIzMy4w
[2]:https://support.mozilla.org/kb/how-set-tab-pickup-firefox-view
[3]:https://support.mozilla.org/kb/task-manager-tabs-or-extensions-are-slowing-firefox
[4]:https://blog.mozilla.org/addons/2022/11/17/manifest-v3-signing-available-november-21-on-firefox-nightly/
[5]:https://blog.mozilla.org/addons/2022/05/18/manifest-v3-in-firefox-recap-next-steps/
[6]:https://support.mozilla.org/kb/unified-extensions
[7]:https://support.mozilla.org/kb/import-data-another-browser
[8]:https://support.mozilla.org/kb/identify-problems-third-party-modules-firefox-windows
[9]:https://support.mozilla.org/kb/how-generate-secure-password-firefox
[10]:https://blog.mozilla.org/accessibility/firefox-113-accessibility-performance/
* Fixed: Various security fixes. MFSA 2023-22 (bsc#1212438)
* CVE-2023-3482 (bmo#1839464)
Block all cookies bypass for localstorage
* CVE-2023-37201 (bmo#1826002)
Use-after-free in WebRTC certificate generation
* CVE-2023-37202 (bmo#1834711)
Potential use-after-free from compartment mismatch in
SpiderMonkey
* CVE-2023-37203 (bmo#291640)
Drag and Drop API may provide access to local system files
* CVE-2023-37204 (bmo#1832195)
Fullscreen notification obscured via option element
* CVE-2023-37205 (bmo#1704420)
URL spoofing in address bar using RTL characters
* CVE-2023-37206 (bmo#1813299)
Insufficient validation of symlinks in the FileSystem API
* CVE-2023-37207 (bmo#1816287)
Fullscreen notification obscured
* CVE-2023-37208 (bmo#1837675)
Lack of warning when opening Diagcab files
* CVE-2023-37209 (bmo#1837993)
Use-after-free in `NotifyOnHistoryReload`
* CVE-2023-37210 (bmo#1821886)
Full-screen mode exit prevention
* CVE-2023-37211 (bmo#1832306, bmo#1834862, bmo#1835886,
bmo#1836550, bmo#1837450)
Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13,
and Thunderbird 102.13
* CVE-2023-37212 (bmo#1750870, bmo#1825552, bmo#1826206,
bmo#1827076, bmo#1828690, bmo#1833503, bmo#1835710,
bmo#1838587)
Memory safety bugs fixed in Firefox 115
- Fixed potential SIGILL on older CPUs (bsc#1212101)
* Fixed: Various security fixes and other quality
MozillaFirefox-115.0-150200.152.93.1.src.rpm
MozillaFirefox-115.0-150200.152.93.1.x86_64.rpm
MozillaFirefox-branding-SLE-115-150200.9.13.1.src.rpm
MozillaFirefox-branding-SLE-115-150200.9.13.1.x86_64.rpm
MozillaFirefox-devel-115.0-150200.152.93.1.noarch.rpm
MozillaFirefox-translations-common-115.0-150200.152.93.1.x86_64.rpm
MozillaFirefox-translations-other-115.0-150200.152.93.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3148
Recommended update for firewalld
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for firewalld fixes the following issues:
- Firewalld does not accept IPv4 network mask in full form (bsc#1212974)
firewall-applet-0.9.3-150400.8.12.1.noarch.rpm
firewall-config-0.9.3-150400.8.12.1.noarch.rpm
firewalld-0.9.3-150400.8.12.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2958
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox was updated to version 115.0.2 ESR (bsc#1213230):
- CVE-2023-3600: Fixed Use-after-free in workers (bmo#1839703).
Bugfixes:
- Fixed a startup crash experienced by some Windows users by blocking instances of a malicious injected DLL (bmo#1841751).
- Fixed a bug with displaying a caret in the text editor on some websites (bmo#1840804).
- Fixed a bug with broken audio rendering on some websites (bmo#1841982).
- Fixed a bug with patternTransform translate using the wrong units (bmo#1840746).
- Fixed a crash affecting Windows 7 users related to the DLL blocklist.
- Fixed a startup crash for Windows users with Kingsoft Antivirus software installed (bmo#1837242).
MozillaFirefox-115.0.2-150200.152.96.1.src.rpm
MozillaFirefox-115.0.2-150200.152.96.1.x86_64.rpm
MozillaFirefox-devel-115.0.2-150200.152.96.1.noarch.rpm
MozillaFirefox-translations-common-115.0.2-150200.152.96.1.x86_64.rpm
MozillaFirefox-translations-other-115.0.2-150200.152.96.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2945
Security update for openssh
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openssh fixes the following issues:
- CVE-2023-38408: Fixed a condition where specific libaries loaded via
ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code
execution via a forwarded agent socket if those libraries were present on the
victim's system and if the agent was forwarded to an attacker-controlled
system. [bsc#1213504, CVE-2023-38408]
- Close the right filedescriptor and also close fdh in read_hmac to avoid file
descriptor leaks. [bsc#1209536]
- Attempts to mitigate instances of secrets lingering in memory after a session
exits. [bsc#1186673, bsc#1213004, bsc#1213008]
openssh-askpass-gnome-8.4p1-150300.3.22.1.src.rpm
openssh-askpass-gnome-8.4p1-150300.3.22.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2981
Security update for libqt5-qtsvg
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libqt5-qtsvg fixes the following issues:
- CVE-2021-45930: Fixed an out-of-bounds write that may have lead to a denial-of-service (bsc#1196654).
- CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm variable (bsc#1211298).
libqt5-qtsvg-5.15.2+kde16-150400.3.3.1.src.rpm
libqt5-qtsvg-private-headers-devel-5.15.2+kde16-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2982
Security update for libqt5-qtbase
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libqt5-qtbase fixes the following issues:
- CVE-2023-24607: Fixed Qt SQL ODBC driver plugin DOS (bsc#1209616).
- CVE-2023-32762: Fixed Qt Network incorrectly parses the strict-transport-security (HSTS) header (bsc#1211797).
- CVE-2023-32763: Fixed buffer overflow when rendering an SVG file with an image inside it (bsc#1211798).
- CVE-2023-33285: Fixed buffer overflow in QDnsLookup (bsc#1211642).
- CVE-2023-34410: Fixed certificate validation does not always consider whether the root of a chain is a configured CA certificate (bsc#1211994).
- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader(bsc#1213326).
libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.6.1.x86_64.rpm
libQt5Sql5-mysql-5.15.2+kde294-150400.6.6.1.x86_64.rpm
libQt5Sql5-postgresql-5.15.2+kde294-150400.6.6.1.x86_64.rpm
libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.6.1.x86_64.rpm
libqt5-qtbase-5.15.2+kde294-150400.6.6.1.src.rpm
libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3021
Security update for librsvg
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for librsvg fixes the following issues:
librsvg was updated to version 2.52.10:
- CVE-2023-38633: Fixed directory traversal in URI decoder (bsc#1213502).
librsvg-2.52.10-150400.3.6.1.src.rpm
librsvg-devel-2.52.10-150400.3.6.1.x86_64.rpm
typelib-1_0-Rsvg-2_0-2.52.10-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3162
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following security issues:
Firefox was updated to Extended Support Release 115.1.0 ESR (bsc#1213746):
- CVE-2023-4045: Fixed cross-origin restrictions bypass with Offscreen Canvas (bmo#1833876).
- CVE-2023-4046: Fixed incorrect value used during WASM compilation (bmo#1837686).
- CVE-2023-4047: Fixed potential permissions request bypass via clickjacking (bmo#1839073).
- CVE-2023-4048: Fixed crash in DOMParser due to out-of-memory conditions (bmo#1841368).
- CVE-2023-4049: Fixed potential race conditions when releasing platform objects (bmo#1842658).
- CVE-2023-4050: Fixed stack buffer overflow in StorageManager (bmo#1843038).
- CVE-2023-4052: Fixed file deletion and privilege escalation through Firefox uninstaller (bmo#1824420).
- CVE-2023-4054: Fixed lack of warning when opening appref-ms files (bmo#1840777).
- CVE-2023-4055: Fixed cookie jar overflow caused unexpected cookie jar state (bmo#1782561).
- CVE-2023-4056: Fixed memory safety bugs (bmo#1820587, bmo#1824634, bmo#1839235, bmo#1842325, bmo#1843847).
- CVE-2023-4057: Fixed memory safety bugs (bmo#1841682).
Bugfixes:
- Remove bashisms from startup-script (bsc#1213657)
MozillaFirefox-115.1.0-150200.152.99.1.src.rpm
MozillaFirefox-115.1.0-150200.152.99.1.x86_64.rpm
MozillaFirefox-devel-115.1.0-150200.152.99.1.noarch.rpm
MozillaFirefox-translations-common-115.1.0-150200.152.99.1.x86_64.rpm
MozillaFirefox-translations-other-115.1.0-150200.152.99.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3256
Security update for pipewire
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for pipewire fixes the following security issues:
- Fixed issue where an app which only has permission to access one stream can also access other streams (bsc#1213682).
Bugfixes:
- Fixed division by 0 and other issues with invalid values (glfo#pipewire/pipewire#2953)
- Fixed an overflow resulting in choppy sound in some cases (glfo#pipewire/pipewire#2680)
gstreamer-plugin-pipewire-0.3.49-150400.3.3.1.x86_64.rpm
libpipewire-0_3-0-0.3.49-150400.3.3.1.x86_64.rpm
pipewire-0.3.49-150400.3.3.1.src.rpm
pipewire-0.3.49-150400.3.3.1.x86_64.rpm
pipewire-lang-0.3.49-150400.3.3.1.noarch.rpm
pipewire-modules-0_3-0.3.49-150400.3.3.1.x86_64.rpm
pipewire-spa-plugins-0_2-0.3.49-150400.3.3.1.x86_64.rpm
pipewire-spa-tools-0.3.49-150400.3.3.1.x86_64.rpm
pipewire-tools-0.3.49-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3611
Recommended update for sysuser-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for sysuser-tools fixes the following issues:
- Update to version 3.2
- Always create a system group of the same name as the system user (bsc#1205161, bsc#1207778, bsc#1213240)
- Add "quilt setup" friendly hint to %sysusers_requires usage
- Use append so if a pre file already exists it isn't overridden
- Invoke bash for bash scripts (bsc#1195391)
- Remove all systemd requires not supported on SLE15 (bsc#1214140)
brltty-6.4-150400.4.3.3.src.rpm
brltty-6.4-150400.4.3.3.x86_64.rpm
brltty-driver-at-spi2-6.4-150400.4.3.3.x86_64.rpm
brltty-driver-brlapi-6.4-150400.4.3.3.x86_64.rpm
brltty-driver-speech-dispatcher-6.4-150400.4.3.3.x86_64.rpm
brltty-lang-6.4-150400.4.3.3.noarch.rpm
pulseaudio-15.0-150400.4.2.2.src.rpm
pulseaudio-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-bash-completion-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-gdm-hooks-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-lang-15.0-150400.4.2.2.noarch.rpm
pulseaudio-module-gsettings-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-module-x11-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-module-zeroconf-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-setup-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-utils-15.0-150400.4.2.2.x86_64.rpm
pulseaudio-zsh-completion-15.0-150400.4.2.2.x86_64.rpm
system-user-brltty-6.4-150400.4.3.3.noarch.rpm
system-user-pulse-15.0-150400.4.2.2.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3270
Recommended update for vim
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- Calling vim on xterm leads to missing first character of the command prompt (bsc#1211461)
gvim-9.0.1572-150000.5.49.1.x86_64.rpm
vim-9.0.1572-150000.5.49.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3550
Optional update for ibus
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ibus fixes the following issues:
- Fix ibus not started automatically by KDE Plasma in openSUSE Leap (bsc#1211977)
ibus-1.5.25-150400.3.3.1.src.rpm
ibus-1.5.25-150400.3.3.1.x86_64.rpm
ibus-devel-1.5.25-150400.3.3.1.x86_64.rpm
ibus-dict-emoji-1.5.25-150400.3.3.1.noarch.rpm
ibus-gtk-1.5.25-150400.3.3.1.x86_64.rpm
ibus-gtk3-1.5.25-150400.3.3.1.x86_64.rpm
ibus-lang-1.5.25-150400.3.3.1.noarch.rpm
libibus-1_0-5-1.5.25-150400.3.3.1.x86_64.rpm
typelib-1_0-IBus-1_0-1.5.25-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3220
Security update for gstreamer-plugins-bad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2023-37329: Fixed GStreamer SRT File Parsing Heap-based Buffer Overflow (bsc#1213126).
gstreamer-plugins-bad-1.20.1-150400.3.3.1.src.rpm
gstreamer-plugins-bad-1.20.1-150400.3.3.1.x86_64.rpm
gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.3.1.x86_64.rpm
gstreamer-plugins-bad-devel-1.20.1-150400.3.3.1.x86_64.rpm
gstreamer-plugins-bad-lang-1.20.1-150400.3.3.1.noarch.rpm
libgstadaptivedemux-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstbadaudio-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstcodecparsers-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstcodecs-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstinsertbin-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstisoff-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstmpegts-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstsctp-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgsturidownloader-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstva-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstvulkan-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstwayland-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
libgstwebrtc-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstPlay-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3238
Security update for bluez
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for bluez fixes the following issues:
- CVE-2021-41229: Fix leaking buffers stored in cstates cache. (bsc#1192760)
bluez-5.62-150400.4.16.1.src.rpm
bluez-devel-5.62-150400.4.16.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3551
Recommended update for rtkit
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for rtkit fixes the following issues:
- Change rtkit-daemon to no longer log debug messages by default (bsc#1206745)
rtkit-0.11+git.20130926-150000.3.3.1.src.rpm
rtkit-0.11+git.20130926-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3482
Feature update for gtk4
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gtk4 fixes the following issues:
Version update from 4.6.0 to 4.6.9 (jsc#PED-2645, jsc#PED-2423):
- Changes in 4.6.9:
* GtkText: Prevent unexpected notify::direction emissions
* Wayland: Fix button masks
* X11: Fix some ordering problems with surface destruction
* Translation updates
- Changes in 4.6.8:
* Input: Fix problems with input method interactions that caused dead keys not to work
* GtkText: Respect the no-emoji input hint fully
* GtkNotebook:
+ Fix an infinite loop in accessibility code
+ Event handling fixes
* GtkFileChooser: Restore ~ and .functionality
* GtkTreeView: Event handling fixes
* GtkTreeListModel: Prevent possible crashes with collapsed nodes
* GtkGridView: Fix issues with rubberband selection
* GtkEmojiChooser: Fix navigation with arrow keys when filtered
* GtkPopover:
+ Fix problems with focus when dismissing popovers
+ Fix problems with focusing editable labels in popovers
* GtkStackSidebar: Improve accessible presentation
* Wayland:
+ Make gtk_launch_uri more robust
+ Make monitor bounds handling more robust
+ Prevent shrinking clients due to wrong toplevel bounds
* Flatpak: Fix file DND with the FileTransfer portal
- Changes in 4.6.7:
* Miscellaneous memory leak fixes
* GtkTreeView:
+ Fix a problem with DND
+ Fix a problem with row selection
* GtkTreePopover: Support scrolling
* GtkGridView: Fix issues with rubberband selection
* GtkSnapshot: Make GtkSnapshot work from bindings
* X11: Fix preferred action for DND
* Windows: Fix DND
- Changes in 4.6.6:
* Fix translations in GTKs own ui files
* Wayland:
+ Fix a problem with the activation protocol
+ Don't force the HighContrast icontheme
* Windows: Fix a problem with builtin icons if the hicolor
icontheme is not installed
- Changes in 4.6.5:
* GtkFileChooser: Fix pasting text into the name field.
* GtkText: Remove an assertion that is sometimes hit.
* Wayland: Ensure that our cursor surfaces don't violate protocol
constraints.
* Accssibility: Fix a problem in the accessibility tree.
- Changes in 4.6.4:
* GtkFileChooser:
+ Fix select button sensitivity in select_folder mode.
+ Fix some fallout from list model porting.
* GtkListView, GtkColumnView: Optimize scrolling.
* print-to-file: Handle nonexisting files better in the dialog.
* Avoid infinite loops in size allocation.
* CSS: Optimize a case of reparenting that is important in
GtkListView.
* GSK: Check for half-float support before using it.
* Wayland:
+ Ignore empty preedit updates This fixes a problem with
textview scrolling.
+ Freeze popups when hidden. This addresses a frame rate drop-
- Changes in 4.6.3:
* GtkOverlay: Bring back positional style classes.
* GtkFileChooser:
+ Prevent unwanted completion popups.
+ Fix small problems in save mode.
+ Fix buildable suport of GtkFileFilter.
* GtkPopover: Fix button positions in right-to-left locales.
* GtkLabel: Fix small issues with link handling.
* Tooltips: Don't restrict the minimum tooltip length.
* Theme:
+ Don't use opacity for overlay scrollbars.
+ Fix selection text color in vertical spin buttons.
* GSK:
+ Accept textures that are generated by webkit.
+ Align offscreen rendering to the pixel grid.
* Accessibility: Fix a crash in startup when orca is running.
* Input:
+ Fix display changes in GtkIMMultiContext.
+ Fix activating on-screen keyboards.
+ Always propagate hold events in GtkEventControllerScroll.
* Windows:
+ Fix a critical warning in clipboard handling.
+ Report serial numbers for events.
- Changes in 4.6.2:
* GtkScrolledWindow:
+ Set scroll-to-focus on viewports
+ Avoid doubly triggering deceleration
* GtkEntry: Stop cursor blinking on focus-out
* Emoji:
+ Update Emoji data to CLDR 40 and Unicode 14
+ Add more locales for Emoji data
* GDK:
+ Optimize texture conversions on x86 and ARM
+ Use EGK_KHR_swap_buffers_with_damage if available
* GSK:
+ Avoid clearing opaque regions
+ Support using a non-default framebuffer
+ Handle large viewports by tiling
* Wayland:
+ Prefer xdg-activation over gtk-shell
+ text protocol: Fix text caret location
+ text protocol: Use serials to control outbound messages
* Inspector: Show app ID and resource path
* Demos: widget-factory: Handle F11 to toggle fullscreen
* Tools: gtk-builder-tool: Allow use without display
- Changes in 4.6.1:
* GtkFontChooser:
+ Stop using PangoFc api
+ Fix a crash
+ Use new HarfBuzz api
* GtkMenuButton: Update accessible description
* GtkTextView: Fix intra-widget dnd
* Printing: Fix an fd leak
* Input:
+ Make sure input methods get focus-in events
+ Always flush events to avoid scroll event pileup
+ Support hold events
+ Update keysyms from libxkbcommon
* Theme: Improve text selection legibility
* Introspection: Add missing nullable annotations everywhere
* Build:
+ Make stack noexec again
+ Avoid symbol leaks
+ Drop unneeded script data
* Wayland:
+ Fix support for the new high-contrast setting
+ Avoid redundant scale changes
+ Fix DND hotspot handling
+ Don't always restore the saved size when floating
gtk4-4.6.9-150400.3.6.2.src.rpm
gtk4-devel-4.6.9-150400.3.6.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3419
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.40.5 (bsc#1213905):
- CVE-2023-38133: Fixed information disclosure.
- CVE-2023-38572: Fixed Same-Origin-Policy bypass.
- CVE-2023-38592: Fixed arbitrary code execution.
- CVE-2023-38594: Fixed arbitrary code execution.
- CVE-2023-38595: Fixed arbitrary code execution.
- CVE-2023-38597: Fixed arbitrary code execution.
- CVE-2023-38599: Fixed sensitive user information tracking.
- CVE-2023-38600: Fixed arbitrary code execution.
- CVE-2023-38611: Fixed arbitrary code execution.
Update to version 2.40.3 (bsc#1212863):
- CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863)
- CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
- CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
libjavascriptcoregtk-4_1-0-2.40.5-150400.4.45.3.x86_64.rpm
libwebkit2gtk-4_1-0-2.40.5-150400.4.45.3.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.45.3.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.40.5-150400.4.45.3.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.45.3.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.45.3.x86_64.rpm
webkit2gtk3-2.40.5-150400.4.45.3.src.rpm
webkit2gtk3-devel-2.40.5-150400.4.45.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3850
Recommended update for evolution
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for evolution and its dependencies fixes the following issues:
evolution:
- Handle frame flattening change in WebKitGTK 2.40 (bsc#1213858)
bogofilter, evolution-data-server, gcr, geocode-glib, gjs, glade, gnome-autoar,
gnome-desktop, gnome-online-accounts, gsl, gspell, gtkspell3, libcanberra, libgdata,
libgweather, libical, liboauth, libphonenumber, librest, libxkbcommon, mozjs78:
- Deliver missing direct and indirect dependencies of evolution
to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le and s390x
- There are NO code changes
canberra-gtk-play-0.30-150400.15.2.2.x86_64.rpm
gcr-3.41.1-150400.3.5.2.src.rpm
gcr-data-3.41.1-150400.3.5.2.x86_64.rpm
gcr-lang-3.41.1-150400.3.5.2.noarch.rpm
gcr-prompter-3.41.1-150400.3.5.2.x86_64.rpm
gcr-ssh-agent-3.41.1-150400.3.5.2.x86_64.rpm
gcr-ssh-askpass-3.41.1-150400.3.5.2.x86_64.rpm
gcr-viewer-3.41.1-150400.3.5.2.x86_64.rpm
geocode-glib-3.26.4-150400.3.5.2.src.rpm
geocode-glib-3.26.4-150400.3.5.2.x86_64.rpm
geocode-glib-devel-3.26.4-150400.3.5.2.x86_64.rpm
gjs-1.70.2-150400.3.5.4.src.rpm
gjs-1.70.2-150400.3.5.4.x86_64.rpm
gnome-autoar-0.4.1-150400.3.2.2.src.rpm
gnome-autoar-devel-0.4.1-150400.3.2.2.x86_64.rpm
gnome-desktop-41.8-150400.3.5.2.src.rpm
gnome-desktop-lang-41.8-150400.3.5.2.noarch.rpm
gnome-online-accounts-3.40.1-150400.3.2.2.src.rpm
gnome-online-accounts-devel-3.40.1-150400.3.2.2.x86_64.rpm
gnome-version-41.8-150400.3.5.2.x86_64.rpm
gspell-1.10.0-150400.3.5.3.src.rpm
gspell-devel-1.10.0-150400.3.5.3.x86_64.rpm
gspell-lang-1.10.0-150400.3.5.3.noarch.rpm
gtkspell3-3.0.10-150400.11.2.2.src.rpm
gtkspell3-devel-3.0.10-150400.11.2.2.x86_64.rpm
gtkspell3-lang-3.0.10-150400.11.2.2.noarch.rpm
gweather-data-40.0-150400.3.2.2.x86_64.rpm
libcanberra-0.30-150400.15.2.2.src.rpm
libcanberra-devel-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk-devel-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk-module-common-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk0-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk2-module-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk3-0-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk3-devel-0.30-150400.15.2.2.x86_64.rpm
libcanberra-gtk3-module-0.30-150400.15.2.2.x86_64.rpm
libgck-1-0-3.41.1-150400.3.5.2.x86_64.rpm
libgck-devel-3.41.1-150400.3.5.2.x86_64.rpm
libgcr-3-1-3.41.1-150400.3.5.2.x86_64.rpm
libgcr-devel-3.41.1-150400.3.5.2.x86_64.rpm
libgdata-0.18.1-150400.4.2.2.src.rpm
libgdata-devel-0.18.1-150400.4.2.2.x86_64.rpm
libgdata22-0.18.1-150400.4.2.2.x86_64.rpm
libgeocode-glib0-3.26.4-150400.3.5.2.x86_64.rpm
libgjs-devel-1.70.2-150400.3.5.4.x86_64.rpm
libgjs0-1.70.2-150400.3.5.4.x86_64.rpm
libgnome-autoar-0-0-0.4.1-150400.3.2.2.x86_64.rpm
libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2.x86_64.rpm
libgnome-desktop-3-19-41.8-150400.3.5.2.x86_64.rpm
libgnome-desktop-3-devel-41.8-150400.3.5.2.x86_64.rpm
libgnome-desktop-3_0-common-41.8-150400.3.5.2.x86_64.rpm
libgoa-1_0-0-3.40.1-150400.3.2.2.x86_64.rpm
libgoa-backend-1_0-1-3.40.1-150400.3.2.2.x86_64.rpm
libgspell-1-2-1.10.0-150400.3.5.3.x86_64.rpm
libgtkspell3-3-0-3.0.10-150400.11.2.2.x86_64.rpm
libgweather-3-16-40.0-150400.3.2.2.x86_64.rpm
libgweather-40.0-150400.3.2.2.src.rpm
libgweather-devel-40.0-150400.3.2.2.x86_64.rpm
libical-3.0.10-150400.3.2.4.src.rpm
libical-devel-3.0.10-150400.3.2.4.x86_64.rpm
libmozjs-78-0-78.15.0-150400.3.2.4.x86_64.rpm
liboauth-1.0.3-150000.5.2.3.src.rpm
liboauth-devel-1.0.3-150000.5.2.3.x86_64.rpm
liboauth0-1.0.3-150000.5.2.3.x86_64.rpm
librest-0.8.1-150000.3.4.3.src.rpm
librest-0_7-0-0.8.1-150000.3.4.3.x86_64.rpm
librest-devel-0.8.1-150000.3.4.3.x86_64.rpm
libxkbcommon-1.3.0-150400.3.2.2.src.rpm
libxkbregistry-devel-1.3.0-150400.3.2.2.x86_64.rpm
libxkbregistry0-1.3.0-150400.3.2.2.x86_64.rpm
mozjs78-78.15.0-150400.3.2.4.src.rpm
mozjs78-devel-78.15.0-150400.3.2.4.x86_64.rpm
typelib-1_0-GData-0_0-0.18.1-150400.4.2.2.x86_64.rpm
typelib-1_0-GWeather-3_0-40.0-150400.3.2.2.x86_64.rpm
typelib-1_0-Gck-1-3.41.1-150400.3.5.2.x86_64.rpm
typelib-1_0-Gcr-3-3.41.1-150400.3.5.2.x86_64.rpm
typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2.x86_64.rpm
typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2.x86_64.rpm
typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4.x86_64.rpm
typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2.x86_64.rpm
typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2.x86_64.rpm
typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2.x86_64.rpm
typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2.x86_64.rpm
typelib-1_0-Gspell-1-1.10.0-150400.3.5.3.x86_64.rpm
typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2.x86_64.rpm
typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3955
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
Security fixes:
- CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004).
- CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925).
- CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924).
- CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922).
- CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006).
- CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033).
Other fixes:
- Update to version 9.0 with patch level 1894,
for the complete list of changes see https://github.com/vim/vim/compare/v9.0.1443...v9.0.1894
- Use app icons generated from vimlogo.eps in the source tarball;
add higher resolution icons of sizes 128x128, 256x256, and 512x512 as png sources
gvim-9.0.1894-150000.5.54.1.x86_64.rpm
vim-9.0.1894-150000.5.54.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3461
Security update for freetype2
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for freetype2 fixes the following issues:
- CVE-2023-2004: Fixed integer overflow in tt_hvadvance_adjust (bsc#1210419).
ft2demos-2.10.4-150000.4.15.1.nosrc.rpm
ftdump-2.10.4-150000.4.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3518
Security update for exempi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for exempi fixes the following issues:
- CVE-2020-18652: Fixed buffer overflow vulnerability in WEBP_Support.cpp (bsc#1214488).
exempi-2.4.5-150000.3.6.1.src.rpm
libexempi-devel-2.4.5-150000.3.6.1.x86_64.rpm
libexempi3-2.4.5-150000.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3778
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
- Wireshark update to v3.6.16.
- CVE-2023-4512: Fixed a bug in CBOR dissector which could lead to crash. (bsc#1214561)
- CVE-2023-4511: Fixed a bug in BT SDP dissector which could lead to an infinite loop. (bsc#1214560)
- CVE-2023-4513: Fixed a bug in BT SDP dissector which could lead to a memory leak. (bsc#1214562)
- CVE-2023-2906: Fixed a bug in CP2179 dissector which could lead to crash. (bsc#1214652)
wireshark-3.6.16-150000.3.100.1.src.rpm
wireshark-devel-3.6.16-150000.3.100.1.x86_64.rpm
wireshark-ui-qt-3.6.16-150000.3.100.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3858
Security update for gsl
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gsl fixes the following issues:
- CVE-2020-35357: Fixed a stack out of bounds read in gsl_stats_quantile_from_sorted_data(). (bsc#1214681)
gsl-2.6-150200.3.4.3.src.rpm
gsl-devel-2.6-150200.3.4.3.x86_64.rpm
libgsl25-2.6-150200.3.4.3.x86_64.rpm
libgslcblas0-2.6-150200.3.4.3.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3507
Security update for open-vm-tools
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- CVE-2023-20900: Fixed SAML token signature bypass vulnerability (bsc#1214566).
This update also ships a open-vm-tools-containerinfo plugin. (jsc#PED-3421)
open-vm-tools-12.2.0-150300.33.1.src.rpm
open-vm-tools-desktop-12.2.0-150300.33.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3852
Recommended update for libostree
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libostree fixes the following issues:
- Cherry-pick an upstream patch to fix corrupted files when using a large fs
with 64-bit inodes (bsc#1214708)
libostree-2021.6-150400.3.6.1.src.rpm
libostree-2021.6-150400.3.6.1.x86_64.rpm
libostree-devel-2021.6-150400.3.6.1.x86_64.rpm
typelib-1_0-OSTree-1_0-2021.6-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3520
Security update for djvulibre
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for djvulibre fixes the following issues:
- CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670).
- CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672).
djvulibre-3.5.27-150200.11.14.1.src.rpm
libdjvulibre-devel-3.5.27-150200.11.14.1.x86_64.rpm
libdjvulibre21-3.5.27-150200.11.14.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3556
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- Provide/obsolete WebKit2GTK-%{_apiver}-lang (bsc#1214093)
- Have the lang package provide libwebkit2gtk3-lang (bsc#1214093)
- Adjustments of update version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581):
+ Added missing CVE references: CVE-2023-32393, CVE-2023-37450
libjavascriptcoregtk-4_1-0-2.40.5-150400.4.48.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.40.5-150400.4.48.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.48.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.40.5-150400.4.48.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.48.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.48.1.x86_64.rpm
webkit2gtk3-2.40.5-150400.4.48.1.src.rpm
webkit2gtk3-devel-2.40.5-150400.4.48.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3519
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox was updated to Extended Support Release 115.2.0 ESR (MFSA 2023-36) (bsc#1214606).
- CVE-2023-4574: Fixed memory corruption in IPC ColorPickerShownCallback (bmo#1846688)
- CVE-2023-4575: Fixed memory corruption in IPC FilePickerShownCallback (bmo#1846689)
- CVE-2023-4576: Fixed integer Overflow in RecordedSourceSurfaceCreation (bmo#1846694)
- CVE-2023-4577: Fixed memory corruption in JIT UpdateRegExpStatics (bmo#1847397)
- CVE-2023-4051: Fixed full screen notification obscured by file open dialog (bmo#1821884)
- CVE-2023-4578: Fixed Out of Memory Exception in SpiderMonkey could have triggered an (bmo#1839007)
- CVE-2023-4053: Fixed full screen notification obscured by external program (bmo#1839079)
- CVE-2023-4580: Fixed push notifications saved to disk unencrypted (bmo#1843046)
- CVE-2023-4581: Fixed XLL file extensions downloadable without warnings (bmo#1843758)
- CVE-2023-4582: Fixed buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
- CVE-2023-4583: Fixed browsing Context potentially not cleared when closing Private Window (bmo#1842030)
- CVE-2023-4584: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529)
- CVE-2023-4585: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2(bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999).
MozillaFirefox-115.2.0-150200.152.102.1.src.rpm
MozillaFirefox-115.2.0-150200.152.102.1.x86_64.rpm
MozillaFirefox-devel-115.2.0-150200.152.102.1.noarch.rpm
MozillaFirefox-translations-common-115.2.0-150200.152.102.1.x86_64.rpm
MozillaFirefox-translations-other-115.2.0-150200.152.102.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3818
Security update for ffmpeg
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ffmpeg fixes the following issues:
- CVE-2021-28429: Fixed Integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c (bsc#1214246).
ffmpeg-3.4.2-150200.11.31.1.src.rpm
libavcodec57-3.4.2-150200.11.31.1.x86_64.rpm
libavformat57-3.4.2-150200.11.31.1.x86_64.rpm
libavresample3-3.4.2-150200.11.31.1.x86_64.rpm
libavutil-devel-3.4.2-150200.11.31.1.x86_64.rpm
libavutil55-3.4.2-150200.11.31.1.x86_64.rpm
libpostproc-devel-3.4.2-150200.11.31.1.x86_64.rpm
libpostproc54-3.4.2-150200.11.31.1.x86_64.rpm
libswresample-devel-3.4.2-150200.11.31.1.x86_64.rpm
libswresample2-3.4.2-150200.11.31.1.x86_64.rpm
libswscale-devel-3.4.2-150200.11.31.1.x86_64.rpm
libswscale4-3.4.2-150200.11.31.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3610
Security update for MozillaFirefox
critical
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Firefox Extended Support Release 115.2.1 ESR (bsc#1215245).
- CVE-2023-4863: Fixed heap buffer overflow in libwebp (MFSA 2023-40) (bsc#1215231).
The following non-security bug was fixed:
- Fix i586 build by reducing debug info to -g1 (bsc#1210168).
MozillaFirefox-115.2.1-150200.152.105.1.src.rpm
MozillaFirefox-115.2.1-150200.152.105.1.x86_64.rpm
MozillaFirefox-devel-115.2.1-150200.152.105.1.noarch.rpm
MozillaFirefox-translations-common-115.2.1-150200.152.105.1.x86_64.rpm
MozillaFirefox-translations-other-115.2.1-150200.152.105.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3753
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- Expand lang sub-package in spec file unconditionally to handle
previous name change from WebKit2GTK-lang to WebKitGTK-lang. This
change affected the automatic generated Requires tag on
WebKit2GTK-%{_apiver}, then getting out of sync of what's being
required and what's being provided. Now, any sub-package that was
providing WebKit2GTK-%{_apiver} will provide WebKitGTK-%{_apiver}
instead (bsc#1214835, bsc#1214640, bsc#1214093).
- Require libwaylandclient0 >= 1.20. 15.4 originally had 1.19.0,
but webkitgtk uses a function added in 1.20.0, so we need to
ensure that the wayland update is pulled in (bsc#1215072).
- Update to version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581
bsc#1215230):
CVE-2023-38594, CVE-2023-38595, CVE-2023-38597,
CVE-2023-38599, CVE-2023-38600, CVE-2023-38611,
CVE-2023-40397, CVE-2023-37450, CVE-2023-28198,
CVE-2023-32370
libjavascriptcoregtk-4_1-0-2.40.5-150400.4.51.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.40.5-150400.4.51.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.51.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.40.5-150400.4.51.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.51.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.51.1.x86_64.rpm
webkit2gtk3-2.40.5-150400.4.51.1.src.rpm
webkit2gtk3-devel-2.40.5-150400.4.51.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3968
Security update for libraw
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libraw fixes the following issues:
- CVE-2020-22628: Fixed buffer overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. (bsc#1215308)
libraw-0.20.2-150400.3.9.1.src.rpm
libraw20-0.20.2-150400.3.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3833
Security update for exempi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for exempi fixes the following issues:
- CVE-2020-18651: Fixed a buffer overflow in ID3 support (bsc#1214486).
exempi-2.4.5-150000.3.9.1.src.rpm
libexempi-devel-2.4.5-150000.3.9.1.x86_64.rpm
libexempi3-2.4.5-150000.3.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4111
Recommended update for lame
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for lame fixes the following issues:
- Add a pkg-config file for libmp3lame
lame-3.100-150000.3.5.1.src.rpm
libmp3lame-devel-3.100-150000.3.5.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3835
Securitys update for open-vm-tools
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
Update to 12.3.0 (build 22234872) (bsc#1214850)
- There are no new features in the open-vm-tools 12.3.0 release. This is
primarily a maintenance release that addresses a few critical problems,
including:
- This release integrates CVE-2023-20900 without the need for a patch.
For more information on this vulnerability and its impact on VMware
products, see
https://www.vmware.com/security/advisories/VMSA-2023-0019.html.
- A tools.conf configuration setting is available to temporaily direct
Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior
of ignoring file systems already frozen.
- Building of the VMware Guest Authentication Service (VGAuth) using
"xml-security-c" and "xerces-c" is being deprecated.
- A number of Coverity reported issues have been addressed.
- A number of GitHub issues and pull requests have been handled.
Please see the Resolves Issues section of the Release Notes.
- For issues resolved in this release, see the Resolved Issues section
of the Release Notes.
- For complete details, see:
https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0
- Release Notes are available at
https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/ReleaseNotes.md
- The granular changes that have gone into the 12.3.0 release are in the
ChangeLog at
https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/open-vm-tools/ChangeLog
- Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests
- jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4.
open-vm-tools-12.3.0-150300.37.1.src.rpm
open-vm-tools-desktop-12.3.0-150300.37.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3898
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575):
Security fixes:
- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683).
- CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685).
- CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599).
- CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454).
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195).
Other fixes:
- Fix broken build with newer binutils (bsc#1215309)
MozillaFirefox-115.3.0-150200.152.108.1.src.rpm
MozillaFirefox-115.3.0-150200.152.108.1.x86_64.rpm
MozillaFirefox-devel-115.3.0-150200.152.108.1.noarch.rpm
MozillaFirefox-translations-common-115.3.0-150200.152.108.1.x86_64.rpm
MozillaFirefox-translations-other-115.3.0-150200.152.108.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4197
Recommended update for tracker
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for tracker fixes the following issues:
- use pkgconfig(icu-i18n) to use the current libicu (jsc#PED-6193)
tracker-3.2.1-150400.3.3.1.src.rpm
tracker-data-files-3.2.1-150400.3.3.1.x86_64.rpm
tracker-devel-3.2.1-150400.3.3.1.x86_64.rpm
typelib-1_0-Tracker-3_0-3.2.1-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4143
Recommended update for brltty, harfbuzz, libcdr, libmspub, libreoffice, libzmf, tepl, vte
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update provides rebuilds of various packages against the newer icu73 to support GB18030-2023.
This set contains libreoffice, various libraries used by libreoffice and GNOME, and brltty.
brltty-6.4-150400.4.5.1.src.rpm
brltty-6.4-150400.4.5.1.x86_64.rpm
brltty-driver-at-spi2-6.4-150400.4.5.1.x86_64.rpm
brltty-driver-brlapi-6.4-150400.4.5.1.x86_64.rpm
brltty-driver-speech-dispatcher-6.4-150400.4.5.1.x86_64.rpm
brltty-lang-6.4-150400.4.5.1.noarch.rpm
libtepl-6-0-6.00.0-150400.3.2.1.x86_64.rpm
system-user-brltty-6.4-150400.4.5.1.noarch.rpm
tepl-6.00.0-150400.3.2.1.src.rpm
tepl-devel-6.00.0-150400.3.2.1.x86_64.rpm
typelib-1_0-Tepl-6-6.00.0-150400.3.2.1.x86_64.rpm
vte-0.66.2-150400.3.2.1.src.rpm
vte-devel-0.66.2-150400.3.2.1.x86_64.rpm
vte-lang-0.66.2-150400.3.2.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3948
Security update for libvpx
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libvpx fixes the following issues:
- CVE-2023-5217: Fixed a heap buffer overflow (bsc#1215778).
libvpx-1.6.1-150000.6.11.1.src.rpm
libvpx4-1.6.1-150000.6.11.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3949
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
Mozilla Firefox was updated to 115.3.1 ESR, fixing a security issue:
MFSA 2023-44 (bsc#1215814)
* CVE-2023-5217: Fixed a heap buffer overflow in libvpx
MozillaFirefox-115.3.1-150200.152.111.1.src.rpm
MozillaFirefox-115.3.1-150200.152.111.1.x86_64.rpm
MozillaFirefox-devel-115.3.1-150200.152.111.1.noarch.rpm
MozillaFirefox-translations-common-115.3.1-150200.152.111.1.x86_64.rpm
MozillaFirefox-translations-other-115.3.1-150200.152.111.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4112
Recommended update for open-vm-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issue:
- Ship correct open-vm-tools version to 15-SP4 (bsc#1205927)
open-vm-tools-12.3.0-150300.40.1.src.rpm
open-vm-tools-desktop-12.3.0-150300.40.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4090
Security update for libcue
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libcue fixes the following issues:
- CVE-2023-43641: Fixed a buffer overflow while parsing a malicious
file (bsc#1215728).
libcue-2.1.0-150000.3.3.1.src.rpm
libcue2-2.1.0-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4050
Security update for ImageMagick
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for ImageMagick fixes the following issues:
- CVE-2023-5341: Fixed a heap use-after-free in coders/bmp.c. (bsc#1215939)
ImageMagick-7.1.0.9-150400.6.27.1.src.rpm
ImageMagick-7.1.0.9-150400.6.27.1.x86_64.rpm
ImageMagick-config-7-SUSE-7.1.0.9-150400.6.27.1.x86_64.rpm
ImageMagick-config-7-upstream-7.1.0.9-150400.6.27.1.x86_64.rpm
ImageMagick-devel-7.1.0.9-150400.6.27.1.x86_64.rpm
libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.27.1.x86_64.rpm
libMagick++-devel-7.1.0.9-150400.6.27.1.x86_64.rpm
libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.27.1.x86_64.rpm
libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.27.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4083
Security update for wireshark
low
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Updated to version 3.6.17:
- CVE-2023-5371: Fixed a memory leak issue in the RTPS dissector
(bsc#1215959).
wireshark-3.6.17-150000.3.103.1.src.rpm
wireshark-devel-3.6.17-150000.3.103.1.x86_64.rpm
wireshark-ui-qt-3.6.17-150000.3.103.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-98
Recommended update for gegl
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gegl and its dependencies fixes the following issues:
gegl:
- Allow building against a newer libraw (0.21) (jsc#PED-6351)
celt, fdk-aac-free, ffmpeg-4, ilmbase, ldacBT, lensfun, libass, libbluray, libbs2b,
libcdio-paranoia, libcdio, libdc1394, libgsm, libmfx, libopenmpt, libraw1394, libraw,
libspiro, libva, libvdpau, lilv, metis, openexr, pipewire, pulseaudio, rtkit, SDL2,
serd, sord, sratom, suitesparse, webrtc-audio-processing, wireplumber:
- Deliver missing direct and indirect dependencies of gegl
to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le, s390x and x86_64
- There are NO code changes
SDL2-2.0.8-150200.11.11.1.src.rpm
celt-0.11.3-150000.3.5.1.src.rpm
celt-0.11.3-150000.3.5.1.x86_64.rpm
fdk-aac-free-2.0.0-150400.3.2.1.src.rpm
ffmpeg-4-4.4-150400.3.19.1.src.rpm
gstreamer-plugin-pipewire-0.3.49-150400.3.5.2.x86_64.rpm
ilmbase-2.2.1-150000.3.3.1.src.rpm
ilmbase-devel-2.2.1-150000.3.3.1.x86_64.rpm
ldacBT-2.0.2.3-150300.3.2.1.src.rpm
libHalf23-2.2.1-150000.3.3.1.x86_64.rpm
libIex-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm
libIexMath-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm
libIlmImf-2_2-23-2.2.1-150000.3.43.1.x86_64.rpm
libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1.x86_64.rpm
libIlmThread-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm
libImath-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm
libSDL2-2_0-0-2.0.8-150200.11.11.1.x86_64.rpm
libSDL2-devel-2.0.8-150200.11.11.1.x86_64.rpm
libamd2-2.4.6-150100.9.2.3.x86_64.rpm
libass-0.14.0-150000.3.13.1.src.rpm
libass-devel-0.14.0-150000.3.13.1.x86_64.rpm
libass9-0.14.0-150000.3.13.1.x86_64.rpm
libavcodec58_134-4.4-150400.3.19.1.x86_64.rpm
libavformat58_76-4.4-150400.3.19.1.x86_64.rpm
libavutil56_70-4.4-150400.3.19.1.x86_64.rpm
libbluray-1.3.0-150300.10.9.1.src.rpm
libbluray-devel-1.3.0-150300.10.9.1.x86_64.rpm
libbluray2-1.3.0-150300.10.9.1.x86_64.rpm
libbs2b-3.1.0-150400.3.2.1.src.rpm
libbs2b0-3.1.0-150400.3.2.1.x86_64.rpm
libcamd2-2.4.6-150100.9.2.3.x86_64.rpm
libccolamd2-2.9.6-150100.9.2.3.x86_64.rpm
libcdio-0.94-150000.6.13.1.src.rpm
libcdio-paranoia-10.2+0.93+1-150000.3.4.1.src.rpm
libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1.x86_64.rpm
libcdio16-0.94-150000.6.13.1.x86_64.rpm
libcdio_cdda2-10.2+0.93+1-150000.3.4.1.x86_64.rpm
libcdio_paranoia2-10.2+0.93+1-150000.3.4.1.x86_64.rpm
libcelt-devel-0.11.3-150000.3.5.1.x86_64.rpm
libcelt0-2-0.11.3-150000.3.5.1.x86_64.rpm
libcholmod3-3.0.12-150100.9.2.3.x86_64.rpm
libcolamd2-2.9.6-150100.9.2.3.x86_64.rpm
libdc1394-2.2.5-150000.3.4.1.src.rpm
libdc1394-22-2.2.5-150000.3.4.1.x86_64.rpm
libdc1394-devel-2.2.5-150000.3.4.1.x86_64.rpm
libdc1394-tools-2.2.5-150000.3.4.1.x86_64.rpm
libfdk-aac2-2.0.0-150400.3.2.1.x86_64.rpm
libgsm-1.0.14-150000.3.6.1.src.rpm
libgsm-devel-1.0.14-150000.3.6.1.x86_64.rpm
libgsm1-1.0.14-150000.3.6.1.x86_64.rpm
libldac2-2.0.2.3-150300.3.2.1.x86_64.rpm
liblilv-0-0-0.24.10-150300.3.2.1.x86_64.rpm
liblilv-0-devel-0.24.10-150300.3.2.1.x86_64.rpm
libmetis5-5.1.0-150100.9.5.2.x86_64.rpm
libmfx-21.3.4-150400.3.2.2.src.rpm
libmfx1-21.3.4-150400.3.2.2.x86_64.rpm
libmodplug-devel-0.3.28-150000.2.15.1.x86_64.rpm
libmodplug1-0.3.28-150000.2.15.1.x86_64.rpm
libopenmpt-0.3.28-150000.2.15.1.src.rpm
libopenmpt-devel-0.3.28-150000.2.15.1.x86_64.rpm
libopenmpt0-0.3.28-150000.2.15.1.x86_64.rpm
libopenmpt_modplug1-0.3.28-150000.2.15.1.x86_64.rpm
libpipewire-0_3-0-0.3.49-150400.3.5.2.x86_64.rpm
libpostproc55_9-4.4-150400.3.19.1.x86_64.rpm
libraw-0.20.2-150400.3.11.3.src.rpm
libraw1394-11-2.1.1-150000.3.4.1.x86_64.rpm
libraw1394-2.1.1-150000.3.4.1.src.rpm
libraw1394-devel-2.1.1-150000.3.4.1.x86_64.rpm
libraw20-0.20.2-150400.3.11.3.x86_64.rpm
libserd-0-0-0.30.6-150300.3.2.1.x86_64.rpm
libsord-0-0-0.16.0-150000.3.2.1.x86_64.rpm
libspiro-0.5.20150702-150000.3.2.1.src.rpm
libspiro0-0.5.20150702-150000.3.2.1.x86_64.rpm
libsratom-0-0-0.6.0-150000.3.2.1.x86_64.rpm
libsuitesparseconfig5-5.2.0-150100.9.2.3.x86_64.rpm
libswresample3_9-4.4-150400.3.19.1.x86_64.rpm
libumfpack5-5.7.6-150100.9.2.3.x86_64.rpm
libva-2.13.0-150400.3.2.1.src.rpm
libva-devel-2.13.0-150400.3.2.1.x86_64.rpm
libva-drm2-2.13.0-150400.3.2.1.x86_64.rpm
libva-x11-2-2.13.0-150400.3.2.1.x86_64.rpm
libva2-2.13.0-150400.3.2.1.x86_64.rpm
libvdpau-1.1.1-150000.3.4.1.src.rpm
libvdpau-devel-1.1.1-150000.3.4.1.x86_64.rpm
libvdpau1-1.1.1-150000.3.4.1.x86_64.rpm
libwebrtc_audio_processing-devel-0.3-150000.3.2.1.x86_64.rpm
libwebrtc_audio_processing1-0.3-150000.3.2.1.x86_64.rpm
libwireplumber-0_4-0-0.4.9-150400.3.5.2.x86_64.rpm
lilv-0.24.10-150300.3.2.1.src.rpm
metis-5.1.0-150100.9.5.2.src.rpm
openexr-2.2.1-150000.3.43.1.src.rpm
openexr-devel-2.2.1-150000.3.43.1.x86_64.rpm
pipewire-0.3.49-150400.3.5.2.src.rpm
pipewire-0.3.49-150400.3.5.2.x86_64.rpm
pipewire-lang-0.3.49-150400.3.5.2.noarch.rpm
pipewire-modules-0_3-0.3.49-150400.3.5.2.x86_64.rpm
pipewire-spa-plugins-0_2-0.3.49-150400.3.5.2.x86_64.rpm
pipewire-spa-tools-0.3.49-150400.3.5.2.x86_64.rpm
pipewire-tools-0.3.49-150400.3.5.2.x86_64.rpm
pulseaudio-15.0-150400.4.4.1.src.rpm
pulseaudio-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-bash-completion-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-gdm-hooks-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-lang-15.0-150400.4.4.1.noarch.rpm
pulseaudio-module-gsettings-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-module-x11-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-module-zeroconf-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-setup-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-utils-15.0-150400.4.4.1.x86_64.rpm
pulseaudio-zsh-completion-15.0-150400.4.4.1.x86_64.rpm
rtkit-0.11+git.20130926-150000.3.5.1.src.rpm
rtkit-0.11+git.20130926-150000.3.5.1.x86_64.rpm
serd-0.30.6-150300.3.2.1.src.rpm
serd-devel-0.30.6-150300.3.2.1.x86_64.rpm
sord-0.16.0-150000.3.2.1.src.rpm
sord-devel-0.16.0-150000.3.2.1.x86_64.rpm
sratom-0.6.0-150000.3.2.1.src.rpm
sratom-devel-0.6.0-150000.3.2.1.x86_64.rpm
suitesparse-5.2.0-150100.9.2.3.src.rpm
system-user-pulse-15.0-150400.4.4.1.noarch.rpm
webrtc-audio-processing-0.3-150000.3.2.1.src.rpm
wireplumber-0.4.9-150400.3.5.2.src.rpm
wireplumber-0.4.9-150400.3.5.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4294
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 ships missing Lang packages to SUSE Linux Enterprise 15 SP4 and SP5.
Security fixes:
- CVE-2023-41993: Fixed an issue where processing malicious web
content could have lead to arbitrary code execution (bsc#1215661).
- CVE-2023-39928: Fixed a use-after-free that could be exploited to
execute arbitrary code when visiting a malicious webpage
(bsc#1215868).
- CVE-2023-41074: Fixed an issue where processing malicious web
content could have lead to arbitrary code execution (bsc#1215870).
Other fixes:
- Fixed missing package dependencies (bsc#1215072).
WebKitGTK-4.1-lang-2.42.1-150400.4.57.2.noarch.rpm
libjavascriptcoregtk-4_1-0-2.42.1-150400.4.57.2.x86_64.rpm
libwebkit2gtk-4_1-0-2.42.1-150400.4.57.2.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.42.1-150400.4.57.2.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.42.1-150400.4.57.2.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.42.1-150400.4.57.2.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.42.1-150400.4.57.2.x86_64.rpm
webkit2gtk3-2.42.1-150400.4.57.2.src.rpm
webkit2gtk3-devel-2.42.1-150400.4.57.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4214
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Updated to version 115.4.0 ESR (bsc#1216338):
- CVE-2023-5721: Fixed a potential clickjack via queued up
rendering.
- CVE-2023-5722: Fixed a cross-Origin size and header leakage.
- CVE-2023-5723: Fixed unexpected errors when handling invalid
cookie characters.
- CVE-2023-5724: Fixed a crash due to a large WebGL draw.
- CVE-2023-5725: Fixed an issue where WebExtensions could open
arbitrary URLs.
- CVE-2023-5726: Fixed an issue where fullscreen notifications would
be obscured by file the open dialog on macOS.
- CVE-2023-5727: Fixed a download protection bypass on on Windows.
- CVE-2023-5728: Fixed a crash caused by improper object tracking
during GC in the JavaScript engine.
- CVE-2023-5729: Fixed an issue where fullscreen notifications would
be obscured by WebAuthn prompts.
- CVE-2023-5730: Fixed multiple memory safety issues.
- CVE-2023-5731: Fixed multiple memory safety issues.
MozillaFirefox-115.4.0-150200.152.114.1.src.rpm
MozillaFirefox-115.4.0-150200.152.114.1.x86_64.rpm
MozillaFirefox-devel-115.4.0-150200.152.114.1.noarch.rpm
MozillaFirefox-translations-common-115.4.0-150200.152.114.1.x86_64.rpm
MozillaFirefox-translations-other-115.4.0-150200.152.114.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4227
Security update for open-vm-tools
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- CVE-2023-34058: Fixed a SAML token signature bypass issue
(bsc#1216432).
- CVE-2023-34059: Fixed a privilege escalation issue through
vmware-user-suid-wrapper (bsc#1216433).
open-vm-tools-12.3.0-150300.43.1.src.rpm
open-vm-tools-desktop-12.3.0-150300.43.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4251
Security update for vorbis-tools
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vorbis-tools fixes the following issues:
- CVE-2023-43361: Fixed a buffer overflow vulnerability during the conversion of wav files to ogg files. (bsc#1215942)
vorbis-tools-1.4.0-150000.3.3.1.src.rpm
vorbis-tools-1.4.0-150000.3.3.1.x86_64.rpm
vorbis-tools-lang-1.4.0-150000.3.3.1.noarch.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4503
Security update for avahi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for avahi fixes the following issues:
- CVE-2023-38470: Ensure each label is at least one byte long (bsc#1215947).
- CVE-2023-38473: Fixed a reachable assertion when parsing a host name (bsc#1216419).
avahi-0.8-150400.7.10.1.src.rpm
avahi-autoipd-0.8-150400.7.10.1.x86_64.rpm
avahi-glib2-0.8-150400.7.10.1.src.rpm
avahi-utils-gtk-0.8-150400.7.10.1.x86_64.rpm
libavahi-gobject-devel-0.8-150400.7.10.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4446
Recommended update for open-vm-tools
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for open-vm-tools fixes the following issues:
- Update to 12.3.5 (bsc#1216670)
open-vm-tools-12.3.5-150300.46.1.src.rpm
open-vm-tools-desktop-12.3.5-150300.46.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4360
Security update for gstreamer-plugins-bad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2023-40474: Fixed a remote code execution issue due to improper
parsing of H265 encoded video files (bsc#1215793).
gstreamer-plugins-bad-1.20.1-150400.3.6.1.src.rpm
gstreamer-plugins-bad-1.20.1-150400.3.6.1.x86_64.rpm
gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.6.1.x86_64.rpm
gstreamer-plugins-bad-devel-1.20.1-150400.3.6.1.x86_64.rpm
gstreamer-plugins-bad-lang-1.20.1-150400.3.6.1.noarch.rpm
libgstadaptivedemux-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstbadaudio-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstcodecparsers-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstcodecs-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstinsertbin-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstisoff-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstmpegts-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstsctp-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgsturidownloader-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstva-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstvulkan-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstwayland-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
libgstwebrtc-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstPlay-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.6.1.x86_64.rpm
typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4474
Recommended update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- Rendering of e-mails in Evolution is blank when using the proprietary NVIDIA driver (bsc#1216778)
WebKitGTK-4.1-lang-2.42.1-150400.4.60.1.noarch.rpm
libjavascriptcoregtk-4_1-0-2.42.1-150400.4.60.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.42.1-150400.4.60.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.42.1-150400.4.60.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.42.1-150400.4.60.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.42.1-150400.4.60.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.42.1-150400.4.60.1.x86_64.rpm
webkit2gtk3-2.42.1-150400.4.60.1.src.rpm
webkit2gtk3-devel-2.42.1-150400.4.60.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4551
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Firefox Extended Support Release 115.5.0 ESR Placeholder changelog-entry (bsc#1217230)
* Fixed: Various security fixes and other quality improvements. MFSA 2023-46 (bsc#1216338)
* CVE-2023-5721: Queued up rendering could have allowed websites to clickjack
* CVE-2023-5732: Address bar spoofing via bidirectional characters
* CVE-2023-5724: Large WebGL draw could have led to a crash
* CVE-2023-5725: WebExtensions could open arbitrary URLs
* CVE-2023-5726: Full screen notification obscured by file open dialog on macOS
* CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows
* CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash.
* CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4.1
MozillaFirefox-115.5.0-150200.152.117.1.src.rpm
MozillaFirefox-115.5.0-150200.152.117.1.x86_64.rpm
MozillaFirefox-devel-115.5.0-150200.152.117.1.noarch.rpm
MozillaFirefox-translations-common-115.5.0-150200.152.117.1.x86_64.rpm
MozillaFirefox-translations-other-115.5.0-150200.152.117.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4710
Security update for hplip
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for hplip fixes the following issues:
- Fixed insecure /tmp file paths inside hppsfilter booklet printing (bsc#1214399)
hplip-3.21.10-150400.3.11.1.src.rpm
hplip-3.21.10-150400.3.11.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4575
Security update for gstreamer-plugins-bad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2023-40474: Fixed integer overflow causing out of bounds writes when handling invalid uncompressed video (bsc#1215796).
- CVE-2023-40476: Fixed possible overflow using max_sub_layers_minus1 (bsc#1215793).
gstreamer-plugins-bad-1.20.1-150400.3.9.1.src.rpm
gstreamer-plugins-bad-1.20.1-150400.3.9.1.x86_64.rpm
gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.9.1.x86_64.rpm
gstreamer-plugins-bad-devel-1.20.1-150400.3.9.1.x86_64.rpm
gstreamer-plugins-bad-lang-1.20.1-150400.3.9.1.noarch.rpm
libgstadaptivedemux-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstbadaudio-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstcodecparsers-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstcodecs-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstinsertbin-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstisoff-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstmpegts-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstsctp-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgsturidownloader-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstva-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstvulkan-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstwayland-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
libgstwebrtc-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstPlay-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.9.1.x86_64.rpm
typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.9.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4561
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.42.2 (bsc#1217210):
- CVE-2023-41983: Processing web content may lead to a denial-of-service.
- CVE-2023-42852: Processing web content may lead to arbitrary code execution.
Already previously fixed:
- CVE-2022-32919: Visiting a website that frames malicious content may lead to UI spoofing (fixed already in 2.38.4).
- CVE-2022-32933: A website may be able to track the websites a user visited in private browsing mode (fixed already in 2.38.0).
- CVE-2022-46705: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2022-46725: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2023-32359: A user’s password may be read aloud by a text-to-speech accessibility feature (fixed already in 2.42.0).
WebKitGTK-4.1-lang-2.42.2-150400.4.64.2.noarch.rpm
libjavascriptcoregtk-4_1-0-2.42.2-150400.4.64.2.x86_64.rpm
libwebkit2gtk-4_1-0-2.42.2-150400.4.64.2.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.42.2-150400.4.64.2.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.42.2-150400.4.64.2.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.42.2-150400.4.64.2.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.42.2-150400.4.64.2.x86_64.rpm
webkit2gtk3-2.42.2-150400.4.64.2.src.rpm
webkit2gtk3-devel-2.42.2-150400.4.64.2.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4587
Security update for vim
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for vim fixes the following issues:
- CVE-2023-5344: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940)
- CVE-2023-5441: segfault in exmode when redrawing (bsc#1216001)
- CVE-2023-5535: use-after-free from buf_contents_changed() (bsc#1216167)
- CVE-2023-46246: Integer Overflow in :history command (bsc#1216696)
gvim-9.0.2103-150000.5.57.1.x86_64.rpm
vim-9.0.2103-150000.5.57.1.src.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4938
Security update for wireshark
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for wireshark fixes the following issues:
Update to 3.6.19:
- CVE-2023-6175: NetScreen file parser crash (bsc#1217272).
wireshark-3.6.19-150000.3.106.1.src.rpm
wireshark-devel-3.6.19-150000.3.106.1.x86_64.rpm
wireshark-ui-qt-3.6.19-150000.3.106.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4950
Security update for libqt5-qtbase
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for libqt5-qtbase fixes the following issues:
- CVE-2023-37369: Fixed buffer overflow in QXmlStreamReader (bsc#1214327).
- libq5-qtbase was rebuild against icu 73. jsc#PED-6193
libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.10.1.x86_64.rpm
libQt5Sql5-mysql-5.15.2+kde294-150400.6.10.1.x86_64.rpm
libQt5Sql5-postgresql-5.15.2+kde294-150400.6.10.1.x86_64.rpm
libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.10.1.x86_64.rpm
libqt5-qtbase-5.15.2+kde294-150400.6.10.1.src.rpm
libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.10.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4902
Security update for openssh
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for openssh fixes the following issues:
- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950).
the following non-security bug was fixed:
- Fix the 'no route to host' error when connecting via ProxyJump
openssh-askpass-gnome-8.4p1-150300.3.27.1.src.rpm
openssh-askpass-gnome-8.4p1-150300.3.27.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4901
Security update for avahi
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for avahi fixes the following issues:
- CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853).
avahi-0.8-150400.7.13.1.src.rpm
avahi-autoipd-0.8-150400.7.13.1.x86_64.rpm
avahi-glib2-0.8-150400.7.13.1.src.rpm
avahi-utils-gtk-0.8-150400.7.13.1.x86_64.rpm
libavahi-gobject-devel-0.8-150400.7.13.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4868
Security update for tracker-miners
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for tracker-miners fixes the following issues:
- CVE-2023-5557: Fixed a sandbox escape by adding seccomp rules and applying it to the whole process (bsc#1216199)
- rebuild against current ICU 73.
tracker-miner-files-3.2.2-150400.3.7.1.x86_64.rpm
tracker-miners-3.2.2-150400.3.7.1.src.rpm
tracker-miners-3.2.2-150400.3.7.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-36
Recommended update for raptor
moderate
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for raptor fixes the following issues:
- rebuild to use ICU 73 (jsc#PED-6193)
libraptor-devel-2.0.15-150200.9.15.1.x86_64.rpm
libraptor2-0-2.0.15-150200.9.15.1.x86_64.rpm
raptor-2.0.15-150200.9.15.1.src.rpm
raptor-2.0.15-150200.9.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4828
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
Update to version 2.42.3 (bsc#1217844):
- Fix flickering while playing videos with DMA-BUF sink.
- Fix color picker being triggered in the inspector when typing "tan".
- Do not special case the "sans" font family name.
- Fix build failure with libxml2 version 2.12.0 due to an API change.
- Fix several crashes and rendering issues.
- Security fixes: CVE-2023-42916, CVE-2023-42917.
WebKitGTK-4.1-lang-2.42.3-150400.4.67.1.noarch.rpm
libjavascriptcoregtk-4_1-0-2.42.3-150400.4.67.1.x86_64.rpm
libwebkit2gtk-4_1-0-2.42.3-150400.4.67.1.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.42.3-150400.4.67.1.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.42.3-150400.4.67.1.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.42.3-150400.4.67.1.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.42.3-150400.4.67.1.x86_64.rpm
webkit2gtk3-2.42.3-150400.4.67.1.src.rpm
webkit2gtk3-devel-2.42.3-150400.4.67.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4875
Security update for gstreamer-plugins-bad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2023-44429: Fixed GStreamer AV1 Codec Parsing Heap-based Buffer Overflow (bsc#1217211).
gstreamer-plugins-bad-1.20.1-150400.3.12.1.src.rpm
gstreamer-plugins-bad-1.20.1-150400.3.12.1.x86_64.rpm
gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.12.1.x86_64.rpm
gstreamer-plugins-bad-devel-1.20.1-150400.3.12.1.x86_64.rpm
gstreamer-plugins-bad-lang-1.20.1-150400.3.12.1.noarch.rpm
libgstadaptivedemux-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstbadaudio-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstcodecparsers-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstcodecs-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstinsertbin-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstisoff-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstmpegts-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstsctp-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgsturidownloader-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstva-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstvulkan-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstwayland-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
libgstwebrtc-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstPlay-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.12.1.x86_64.rpm
typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.12.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4928
Security update for MozillaFirefox
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for MozillaFirefox fixes the following issues:
- Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974).
* CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782).
* CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).
* CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).
* CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).
* CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).
* CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).
* CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).
* CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).
* CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.
* CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123).
* CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).
- Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230)
* CVE-2023-6204 (bmo#1841050)
Out-of-bound memory access in WebGL2 blitFramebuffer
* CVE-2023-6205 (bmo#1854076)
Use-after-free in MessagePort::Entangled
* CVE-2023-6206 (bmo#1857430)
Clickjacking permission prompts using the fullscreen
transition
* CVE-2023-6207 (bmo#1861344)
Use-after-free in ReadableByteStreamQueueEntry::Buffer
* CVE-2023-6208 (bmo#1855345)
Using Selection API would copy contents into X11 primary
selection.
* CVE-2023-6209 (bmo#1858570)
Incorrect parsing of relative URLs starting with "///"
* CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252,
bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943,
bmo#1862782)
Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5,
and Thunderbird 115.5
MozillaFirefox-115.6.0-150200.152.120.1.src.rpm
MozillaFirefox-115.6.0-150200.152.120.1.x86_64.rpm
MozillaFirefox-devel-115.6.0-150200.152.120.1.noarch.rpm
MozillaFirefox-translations-common-115.6.0-150200.152.120.1.x86_64.rpm
MozillaFirefox-translations-other-115.6.0-150200.152.120.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-5
Security update for gstreamer-plugins-bad
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for gstreamer-plugins-bad fixes the following issues:
- CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free (bsc#1217213).
- CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792).
gstreamer-plugins-bad-1.20.1-150400.3.15.1.src.rpm
gstreamer-plugins-bad-1.20.1-150400.3.15.1.x86_64.rpm
gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1.x86_64.rpm
gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1.x86_64.rpm
gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1.noarch.rpm
libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstbadaudio-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstcodecs-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstinsertbin-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstisoff-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstmpegts-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstsctp-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgsturidownloader-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstva-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstvulkan-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstwayland-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
libgstwebrtc-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1.x86_64.rpm
typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1.x86_64.rpm
SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-4
Security update for webkit2gtk3
important
SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64
This update for webkit2gtk3 fixes the following issues:
- CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033).
- CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of-service (bsc#1218032).
- CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870).
- CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1218032, bsc#1215868).
WebKitGTK-4.1-lang-2.42.4-150400.4.70.3.noarch.rpm
libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3.x86_64.rpm
libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3.x86_64.rpm
typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3.x86_64.rpm
typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3.x86_64.rpm
typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3.x86_64.rpm
webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3.x86_64.rpm
webkit2gtk3-2.42.4-150400.4.70.3.src.rpm
webkit2gtk3-devel-2.42.4-150400.4.70.3.x86_64.rpm