SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-336 Security update for jasper moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for jasper fixes the following issues: - CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437). jasper-2.0.14-3.22.1.src.rpm libjasper-devel-2.0.14-3.22.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2687 Security update for fwupd moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for fwupd fixes the following issues: - Ignore non-PCI NVMe devices (e.g. NVMe-over-Fabrics) when probing (bsc#1193921) - package was rebuilt with new UEFI secure boot key. (bsc#1198581) fwupd-1.7.3-150400.3.3.19.src.rpm fwupd-1.7.3-150400.3.3.19.x86_64.rpm fwupd-devel-1.7.3-150400.3.3.19.x86_64.rpm fwupd-lang-1.7.3-150400.3.3.19.noarch.rpm libfwupd2-1.7.3-150400.3.3.19.x86_64.rpm libfwupdplugin5-1.7.3-150400.3.3.19.x86_64.rpm typelib-1_0-Fwupd-2_0-1.7.3-150400.3.3.19.x86_64.rpm typelib-1_0-FwupdPlugin-1_0-1.7.3-150400.3.3.19.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2088 Recommended update for firewalld moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for firewalld fixes the following issues: - Fixes setting the default zone to external during installation problem (bsc#1191837) firewall-applet-0.9.3-150400.8.3.19.noarch.rpm firewall-config-0.9.3-150400.8.3.19.noarch.rpm firewalld-0.9.3-150400.8.3.19.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1739 Optional update for SUSE Package Hub moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This optional update provides the following changes: - Provide binaries for non x86_64 architectures directly to SUSE Package Hub. - There are no visible changes for the final user. - Affected source packages: libGLw motif libMrm4-2.3.4-150000.3.5.1.x86_64.rpm libUil4-2.3.4-150000.3.5.1.x86_64.rpm libUil4-32bit-2.3.4-150000.3.5.1.x86_64.rpm libXm4-2.3.4-150000.3.5.1.x86_64.rpm motif-2.3.4-150000.3.5.1.src.rpm motif-2.3.4-150000.3.5.1.x86_64.rpm motif-devel-2.3.4-150000.3.5.1.x86_64.rpm libMrm4-32bit-2.3.4-150000.3.5.1.x86_64.rpm libXm4-32bit-2.3.4-150000.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1579 Recommended update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.9.0 ESR MFSA 2022-17 (bsc#1198970) * CVE-2022-29914: Fullscreen notification bypass using popups * CVE-2022-29909: Bypassing permission prompt in nested browsing contexts * CVE-2022-29916: Leaking browser history with CSS variables * CVE-2022-29911: iframe Sandbox bypass * CVE-2022-29912: Reader mode bypassed SameSite cookies * CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 MozillaFirefox-91.9.0-150200.152.33.1.src.rpm MozillaFirefox-91.9.0-150200.152.33.1.x86_64.rpm MozillaFirefox-devel-91.9.0-150200.152.33.1.x86_64.rpm MozillaFirefox-translations-common-91.9.0-150200.152.33.1.x86_64.rpm MozillaFirefox-translations-other-91.9.0-150200.152.33.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1767 Optional update for SUSE Package Hub moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This optional update provides the following changes: - Provide binaries for non x86_64 architectures directly to SUSE Package Hub. - There are no visible changes for the final user. - Affected source packages: rasqal redland raptor libraptor-devel-2.0.15-150200.9.9.1.x86_64.rpm libraptor2-0-2.0.15-150200.9.9.1.x86_64.rpm raptor-2.0.15-150200.9.9.1.src.rpm raptor-2.0.15-150200.9.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1864 Recommended update for leveldb low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for leveldb fixes the following issue: - fix tests (bsc#1197742) leveldb-1.18-150000.3.3.1.src.rpm leveldb-devel-1.18-150000.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1867 Recommended update for v4l-utils low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for v4l-utils fixes the following issues: - fix build (bsc#1197861) libdvbv5-0-1.14.1-150000.3.3.1.x86_64.rpm libdvbv5-devel-1.14.1-150000.3.3.1.x86_64.rpm libv4l-devel-1.14.1-150000.3.3.1.x86_64.rpm libv4l2rds0-1.14.1-150000.3.3.1.x86_64.rpm v4l-utils-1.14.1-150000.3.3.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2093 Recommended update for open-vm-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - Update to 12.0.0 (build 19345655) (bsc#1196803) - Update open-vm-tools 12.0.0. (jsc#SLE-24097) - Support for managing Salt Minion through guest variables. A new open-vm-tools-salt-minion rpm is added to handle this support. - New ComponentMgr plugin to manage (add, remove, monitor) components on the guest VM. - Patch to fix potential Fail to Build from Source. (bsc#1196804) - Build vmhgfs with either libfuse2 or libfuse3. open-vm-tools-12.0.0-150300.16.1.src.rpm open-vm-tools-desktop-12.0.0-150300.16.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2737 Recommended update for gedit moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gedit fixes the following issues: - Add necessary dependency to resolve schema "is not installed" error after install in WSL (bsc#1198312) gedit-40.1-150400.4.3.1.src.rpm gedit-40.1-150400.4.3.1.x86_64.rpm gedit-devel-40.1-150400.4.3.1.x86_64.rpm gedit-lang-40.1-150400.4.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1748 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.9.0 ESR (MFSA 2022-17)(bsc#1198970): - CVE-2022-29914: Fullscreen notification bypass using popups - CVE-2022-29909: Bypassing permission prompt in nested browsing contexts - CVE-2022-29916: Leaking browser history with CSS variables - CVE-2022-29911: iframe Sandbox bypass - CVE-2022-29912: Reader mode bypassed SameSite cookies - CVE-2022-29917: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 MozillaFirefox-91.9.0-150200.152.37.3.src.rpm MozillaFirefox-91.9.0-150200.152.37.3.x86_64.rpm MozillaFirefox-devel-91.9.0-150200.152.37.3.x86_64.rpm MozillaFirefox-translations-common-91.9.0-150200.152.37.3.x86_64.rpm MozillaFirefox-translations-other-91.9.0-150200.152.37.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1898 Security update for fribidi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for fribidi fixes the following issues: - CVE-2022-25308: Fixed stack out of bounds read (bsc#1196147). - CVE-2022-25309: Fixed heap-buffer-overflow in fribidi_cap_rtl_to_unicode (bsc#1196148). - CVE-2022-25310: Fixed NULL pointer dereference in fribidi_remove_bidi_marks (bsc#1196150). fribidi-1.0.10-150400.3.3.1.src.rpm libfribidi0-32bit-1.0.10-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2804 Recommended update for gvfs moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gvfs fixes the following issues: - Fixes inability to mount smb shares with samba 4.16 (bsc#1198718) - Fix build with meson 0.61 and newer - Package org.gtk.vfs.file-operations.rules polkit rules file as an example in docs gvfs-1.48.1-150400.4.3.1.src.rpm gvfs-1.48.1-150400.4.3.1.x86_64.rpm gvfs-backend-afc-1.48.1-150400.4.3.1.x86_64.rpm gvfs-backend-samba-1.48.1-150400.4.3.1.x86_64.rpm gvfs-backends-1.48.1-150400.4.3.1.x86_64.rpm gvfs-devel-1.48.1-150400.4.3.1.x86_64.rpm gvfs-fuse-1.48.1-150400.4.3.1.x86_64.rpm gvfs-lang-1.48.1-150400.4.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2087 Optional update for SUSE Package Hub moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This optional update provides the following changes: - Provide binaries for non x86_64 architectures directly to SUSE Package Hub. - There are no visible changes for the final user. - Affected source packages: rp-pppoe linux-atm ppp ppp-2.4.7-150000.5.8.1.src.rpm ppp-2.4.7-150000.5.8.1.x86_64.rpm ppp-devel-2.4.7-150000.5.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1830 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.9.1 ESR - MFSA 2022-19 (bsc#1199768): - CVE-2022-1802: Prototype pollution in Top-Level Await implementation - CVE-2022-1529: Untrusted input used in JavaScript object indexing, leading to prototype pollution MozillaFirefox-91.9.1-150200.152.40.1.src.rpm MozillaFirefox-91.9.1-150200.152.40.1.x86_64.rpm MozillaFirefox-devel-91.9.1-150200.152.40.1.x86_64.rpm MozillaFirefox-translations-common-91.9.1-150200.152.40.1.x86_64.rpm MozillaFirefox-translations-other-91.9.1-150200.152.40.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2994 Recommended update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame adds some missing 32bit libraries to some products. (bsc#1198925) No codechanges were done in this update. lame-3.100-150000.3.2.1.src.rpm libass-0.14.0-150000.3.11.1.src.rpm libass-devel-0.14.0-150000.3.11.1.x86_64.rpm libass9-0.14.0-150000.3.11.1.x86_64.rpm libcdio-0.94-150000.6.11.1.src.rpm libcdio-paranoia-10.2+0.93+1-150000.3.2.1.src.rpm libcdio-paranoia-devel-10.2+0.93+1-150000.3.2.1.x86_64.rpm libcdio16-0.94-150000.6.11.1.x86_64.rpm libcdio_cdda2-10.2+0.93+1-150000.3.2.1.x86_64.rpm libcdio_paranoia2-10.2+0.93+1-150000.3.2.1.x86_64.rpm libdc1394-2.2.5-150000.3.2.1.src.rpm libdc1394-22-2.2.5-150000.3.2.1.x86_64.rpm libdc1394-devel-2.2.5-150000.3.2.1.x86_64.rpm libdc1394-tools-2.2.5-150000.3.2.1.x86_64.rpm libgsm-1.0.14-150000.3.4.1.src.rpm libgsm-devel-1.0.14-150000.3.4.1.x86_64.rpm libgsm1-1.0.14-150000.3.4.1.x86_64.rpm libmp3lame-devel-3.100-150000.3.2.1.x86_64.rpm libopenjpeg1-1.5.2-150000.4.7.1.x86_64.rpm libraw1394-11-2.1.1-150000.3.2.1.x86_64.rpm libraw1394-2.1.1-150000.3.2.1.src.rpm libraw1394-devel-2.1.1-150000.3.2.1.x86_64.rpm libtwolame-devel-0.3.13-150000.3.2.2.x86_64.rpm libvdpau-1.1.1-150000.3.2.1.src.rpm libvdpau-devel-1.1.1-150000.3.2.1.x86_64.rpm libvdpau1-1.1.1-150000.3.2.1.x86_64.rpm libvpx-1.6.1-150000.6.8.1.src.rpm libvpx4-1.6.1-150000.6.8.1.x86_64.rpm libxcb-1.13-150000.3.9.1.src.rpm libxcb-render0-32bit-1.13-150000.3.9.1.x86_64.rpm openjpeg-1.5.2-150000.4.7.1.src.rpm openjpeg-devel-1.5.2-150000.4.7.1.x86_64.rpm twolame-0.3.13-150000.3.2.2.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1904 Recommended update for libbluray important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libbluray fixes the following issues: - Implement the new java.io.FileSystem.isInvalid method that entered all supported java versions with April 2022 CPU (bsc#1199463) libbluray-1.3.0-150300.10.7.1.src.rpm libbluray-devel-1.3.0-150300.10.7.1.x86_64.rpm libbluray2-1.3.0-150300.10.7.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1924 Recommended update for mutter moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for mutter fixes the following issues: - Fix SIGSEGV in meta_context_terminate (bsc#1199382 glgo#GNOME/mutter#2267). - Update to version 41.5: + Fix X11 wayland drops ending up in the wrong wayland client. + Allow forcing EGLStream backend. + Updated translations. mutter-41.5-150400.3.3.1.src.rpm mutter-41.5-150400.3.3.1.x86_64.rpm mutter-devel-41.5-150400.3.3.1.x86_64.rpm mutter-lang-41.5-150400.3.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-1920 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.10.0 ESR (MFSA 2022-21)(bsc#1200027) - CVE-2022-31736: Cross-Origin resource's length leaked - CVE-2022-31737: Heap buffer overflow in WebGL - CVE-2022-31738: Browser window spoof using fullscreen mode - CVE-2022-31739: Attacker-influenced path traversal when saving downloaded files - CVE-2022-31740: Register allocation problem in WASM on arm64 - CVE-2022-31741: Uninitialized variable leads to invalid memory read - CVE-2022-31742: Querying a WebAuthn token with a large number of allowCredential entries may have leaked cross-origin information - CVE-2022-31747: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 MozillaFirefox-91.10.0-150200.152.43.1.src.rpm MozillaFirefox-91.10.0-150200.152.43.1.x86_64.rpm MozillaFirefox-devel-91.10.0-150200.152.43.1.x86_64.rpm MozillaFirefox-translations-common-91.10.0-150200.152.43.1.x86_64.rpm MozillaFirefox-translations-other-91.10.0-150200.152.43.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3300 Recommended update for gnome-shell-extension-desktop-icons important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gnome-shell-extension-desktop-icons fixes the following issues: - Fix desktop icons to be Compatible with GNOME 41 (bsc#1199377, bsc#1203262) gnome-shell-extension-desktop-icons-20.10.0-150400.4.5.1.noarch.rpm gnome-shell-extension-desktop-icons-20.10.0-150400.4.5.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3089 Recommended update for gnome-packagekit moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gnome-packagekit fixes the following issues: - Fix runtime error to make it work as before. (bsc#1198801) gnome-packagekit-3.32.0-150400.12.3.1.src.rpm gnome-packagekit-3.32.0-150400.12.3.1.x86_64.rpm gnome-packagekit-lang-3.32.0-150400.12.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2071 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.36.3 (bsc#1200106) - CVE-2022-30293: Fixed heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer (bsc#1199287). - CVE-2022-26700: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106). - CVE-2022-26709: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106). - CVE-2022-26716: Fixed use after free issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106). - CVE-2022-26717: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106). - CVE-2022-26719: Fixed memory corruption issue that may lead to code execution when processing maliciously crafted web content (bsc#1200106). libjavascriptcoregtk-4_1-0-2.36.3-150400.4.3.1.x86_64.rpm libwebkit2gtk-4_1-0-2.36.3-150400.4.3.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.36.3-150400.4.3.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.36.3-150400.4.3.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.36.3-150400.4.3.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.36.3-150400.4.3.1.x86_64.rpm webkit2gtk3-2.36.3-150400.4.3.1.src.rpm webkit2gtk3-devel-2.36.3-150400.4.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2298 Security update for liblouis important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for liblouis fixes the following issues: - CVE-2022-26981: fix buffer overrun in compilePassOpcode (bsc#1197085). - CVE-2022-31783: prevent an invalid memory write in compileRule (bsc#1200120). liblouis-3.20.0-150400.3.3.1.src.rpm liblouis-data-3.20.0-150400.3.3.1.noarch.rpm liblouis-devel-3.20.0-150400.3.3.1.x86_64.rpm liblouis20-3.20.0-150400.3.3.1.x86_64.rpm python3-louis-3.20.0-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3149 Recommended update for hplip low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for hplip fixes the following issues: - Fix C compiler flags which results in better device detection. (bsc#1198794) hplip-3.21.10-150400.3.3.1.src.rpm hplip-3.21.10-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2102 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955). - CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770). - CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167). - CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902). - CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903). - CVE-2021-3974: Fixed use-after-free (bsc#1192904). - CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466). - CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905). - CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093). - CVE-2021-4192: Fixed use-after-free (bsc#1194217). - CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216). - CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388). - CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885). - CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872). - CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004). - CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203). - CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332). - CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354). - CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361). - CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596). - CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748). - CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331). - CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333). - CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334). - CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655). - CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651). - CVE-2022-1771: Fixed stack exhaustion (bsc#1199693). - CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745). - CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747). - CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936). - CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010). - CVE-2022-1898: Fixed use-after-free (bsc#1200011). - CVE-2022-1927: Fixed buffer over-read (bsc#1200012). gvim-8.2.5038-150000.5.21.1.x86_64.rpm vim-8.2.5038-150000.5.21.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2322 Security update for fwupd important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of fwupd fixes the following issue: - rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581) fwupd-1.5.8-150300.3.5.1.src.rpm fwupdtpmevlog-1.5.8-150300.3.5.1.x86_64.rpm libfwupdplugin1-1.5.8-150300.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2301 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2022-32545: Fixed an outside the range of representable values of type. (bsc#1200388) - CVE-2022-32546: Fixed an outside the range of representable values of type. (bsc#1200389) - CVE-2022-32547: Fixed a load of misaligned address at MagickCore/property.c. (bsc#1200387) ImageMagick-7.1.0.9-150400.6.3.1.src.rpm ImageMagick-7.1.0.9-150400.6.3.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.3.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.3.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.3.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.3.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.3.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.3.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2313 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 91.11.0 ESR (MFSA 2022-25) (bsc#1200793): - CVE-2022-2200: Undesired attributes could be set as part of prototype pollution (bmo#1771381) - CVE-2022-31744: CSP bypass enabling stylesheet injection (bmo#1757604) - CVE-2022-34468: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (bmo#1768537) - CVE-2022-34470: Use-after-free in nsSHistory (bmo#1765951) - CVE-2022-34472: Unavailable PAC file resulted in OCSP requests being blocked (bmo#1770123) - CVE-2022-34478: Microsoft protocols can be attacked if a user accepts a prompt (bmo#1773717) - CVE-2022-34479: A popup window could be resized in a way to overlay the address bar with web content (bmo#1745595) - CVE-2022-34481: Potential integer overflow in ReplaceElementsAt (bmo#1497246) - CVE-2022-34484: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (bmo#1763634, bmo#1772651) MozillaFirefox-91.11.0-150200.152.48.1.src.rpm MozillaFirefox-91.11.0-150200.152.48.1.x86_64.rpm MozillaFirefox-devel-91.11.0-150200.152.48.1.x86_64.rpm MozillaFirefox-translations-common-91.11.0-150200.152.48.1.x86_64.rpm MozillaFirefox-translations-other-91.11.0-150200.152.48.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2473 Recommended update for firewalld moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for firewalld fixes the following issues: - Fix regression introduced in previous patch (an api change to a function also needed backporting) (bsc#1198814) firewall-applet-0.9.3-150400.8.6.1.noarch.rpm firewall-config-0.9.3-150400.8.6.1.noarch.rpm firewalld-0.9.3-150400.8.6.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2928 Recommended update for bluez moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of bluez ships the missing bluez-deprecated package. (bsc#1201060) bluez-5.62-150400.4.2.1.src.rpm bluez-devel-5.62-150400.4.2.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3148 Recommended update for branding-SLE moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for branding-SLE fixes the following issues: - Fix bootloader menu to display correct operating system information (bsc#997317, bsc#1199818) branding-SLE-15-150400.38.3.1.src.rpm gdm-branding-SLE-15-150400.38.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2736 Recommended update for libqt5-qttools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libqt5-qttools fixes the following issues: - Increase the disk constraint to 4.5G (bsc#1200152) libQt5Designer5-5.15.2+kde17-150400.3.3.1.x86_64.rpm libQt5DesignerComponents5-5.15.2+kde17-150400.3.3.1.x86_64.rpm libQt5Help5-5.15.2+kde17-150400.3.3.1.x86_64.rpm libqt5-linguist-5.15.2+kde17-150400.3.3.1.x86_64.rpm libqt5-linguist-devel-5.15.2+kde17-150400.3.3.1.x86_64.rpm libqt5-qttools-5.15.2+kde17-150400.3.3.1.src.rpm libqt5-qttools-devel-5.15.2+kde17-150400.3.3.1.x86_64.rpm libqt5-qttools-private-headers-devel-5.15.2+kde17-150400.3.3.1.noarch.rpm libqt5-qttools-qhelpgenerator-5.15.2+kde17-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3113 Recommended update for PackageKit moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for PackageKit fixes the following issues: - Ensure locked packages are not listed as being able to be updated (bsc#1199895) PackageKit-1.2.4-150400.3.3.1.src.rpm True PackageKit-1.2.4-150400.3.3.1.x86_64.rpm True PackageKit-backend-zypp-1.2.4-150400.3.3.1.x86_64.rpm True PackageKit-devel-1.2.4-150400.3.3.1.x86_64.rpm True PackageKit-lang-1.2.4-150400.3.3.1.noarch.rpm True libpackagekit-glib2-18-1.2.4-150400.3.3.1.x86_64.rpm True libpackagekit-glib2-devel-1.2.4-150400.3.3.1.x86_64.rpm True typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.3.1.x86_64.rpm True SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2523 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.36.4 (bsc#1201221): - CVE-2022-22662: Processing maliciously crafted web content may disclose sensitive user information. - CVE-2022-22677: The video in a webRTC call may be interrupted if the audio capture gets interrupted. - CVE-2022-26710: Processing maliciously crafted web content may lead to arbitrary code execution. libjavascriptcoregtk-4_1-0-2.36.4-150400.4.6.2.x86_64.rpm libwebkit2gtk-4_1-0-2.36.4-150400.4.6.2.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.36.4-150400.4.6.2.x86_64.rpm typelib-1_0-WebKit2-4_1-2.36.4-150400.4.6.2.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.36.4-150400.4.6.2.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.36.4-150400.4.6.2.x86_64.rpm webkit2gtk3-2.36.4-150400.4.6.2.src.rpm webkit2gtk3-devel-2.36.4-150400.4.6.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3086 Feature update for iio-sensor-proxy moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for iio-sensor-proxy fixes the following issues: - New package iio-sensor-proxy required because otherwise libQt5Sensors5 can't be installed (bsc#1199308, jsc#SLE-24553) iio-sensor-proxy-3.3-150400.9.3.1.src.rpm iio-sensor-proxy-3.3-150400.9.3.1.x86_64.rpm iio-sensor-proxy-doc-3.3-150400.9.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3130 Recommended update for libqt5-qtbase moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libqt5-qtbase fixes the following issues: - Fix some HTTP/2 communication (bsc#1200715) - Mitigate issue with -D_FORTIFY_SOURCE=3 seen with GCC 12 libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.3.1.x86_64.rpm libQt5Sql5-mysql-5.15.2+kde294-150400.6.3.1.x86_64.rpm libQt5Sql5-postgresql-5.15.2+kde294-150400.6.3.1.x86_64.rpm libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.3.1.x86_64.rpm libqt5-qtbase-5.15.2+kde294-150400.6.3.1.src.rpm libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3011 Recommended update for tigervnc moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for tigervnc fixes the following issues: - Fix VNC client not refreshing screen correctly due to an issue on TLS stream buffers (bsc#1199477) libXvnc-devel-1.10.1-150400.7.5.2.x86_64.rpm tigervnc-1.10.1-150400.7.5.2.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3204 Recommended update for xdg-desktop-portal-gtk moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for xdg-desktop-portal-gtk fixes the following issues: - Make the process exit after one second unless it has active sessions (bsc#1179465) xdg-desktop-portal-gtk-1.10.0-150400.4.3.1.src.rpm xdg-desktop-portal-gtk-1.10.0-150400.4.3.1.x86_64.rpm xdg-desktop-portal-gtk-lang-1.10.0-150400.4.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2681 Security update for wavpack low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wavpack fixes the following issues: - CVE-2022-2476: Fixed a Null pointer dereference in wvunpack (bsc#1201716). wavpack-5.4.0-150000.4.15.1.src.rpm wavpack-5.4.0-150000.4.15.1.x86_64.rpm wavpack-devel-5.4.0-150000.4.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2969 Optional update for SUSE Package Hub moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This optional update provides the following changes: - Fix KDE Plasma 5 missing binaries in SUSE Linux Enterprise Desktop 15 Service Pack 4 via PackageHub (bsc#1201055) - Affected source packages: AppStream attica-qt5 ffmpeg-4 gucharmap karchive kauth kbookmarks kcodecs kcompletion kconfig kconfigwidgets kcoreaddons kcrash kdbusaddons kded kdoctools kglobalaccel kguiaddons ki18n kiconthemes kitemviews kjobwidgets knotifications kservice ktextwidgets kwallet kwidgetsaddons kwindowsystem kxmlgui libqt5-qtvirtualkeyboard polkit-qt5-1 solid sonnet xcb-util-cursor AppStream-0.15.1-150400.3.2.3.src.rpm AppStream-devel-0.15.1-150400.3.2.3.x86_64.rpm ffmpeg-4-4.4-150400.3.2.1.src.rpm libappstream4-0.15.1-150400.3.2.3.x86_64.rpm libavcodec58_134-4.4-150400.3.2.1.x86_64.rpm libavutil56_70-4.4-150400.3.2.1.x86_64.rpm libswresample3_9-4.4-150400.3.2.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2640 Recommended update for yaml-cpp moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for yaml-cpp fixes the following issue: - Version 0.6.3 changed ABI without changing SONAME. Re-add symbol from the old ABI to prevent ABI breakage and crash of applications compiled with 0.6.1 (bsc#1200624, bsc#1178332, bsc#1178331, bsc#1160171). yaml-cpp-0.6.3-150400.4.3.1.src.rpm yaml-cpp-devel-0.6.3-150400.4.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2611 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.12.0 ESR (bsc#1201758): - CVE-2022-36319: Mouse Position spoofing with CSS transforms - CVE-2022-36318: Directory indexes for bundled resources reflected URL parameters MozillaFirefox-91.12.0-150200.152.53.1.src.rpm MozillaFirefox-91.12.0-150200.152.53.1.x86_64.rpm MozillaFirefox-devel-91.12.0-150200.152.53.1.x86_64.rpm MozillaFirefox-translations-common-91.12.0-150200.152.53.1.x86_64.rpm MozillaFirefox-translations-other-91.12.0-150200.152.53.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3128 Recommended update for gtk3 and gtk3-branding moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gtk3 and gtk3-branding fixes the following issues: gtk3: - Ensure python3-gobject-Gdk is isntalled as dependency (bsc#1200614) - Include legacy hicolor icons (bsc#1197480) - Fix axis name handling in GtkFontChooser - Fix border color for tiled windows. - Fix cell accessible leak in Accessibility - Fix the build with gcc 12 - Wayland: Fix problem with textview scrolling - Wayland: Support new high-contrast setting - Wayland: Avoid unnecessary display scale changes gtk3-branding: - Resolve installation issues gtk3-devel-doc-3.24.34-150400.3.3.1.x86_64.rpm gtk3-doc-3.24.34-150400.3.3.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3102 Recommended update for gtk4 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gtk4 fixes the following issues: - Ensure python3-gobject-Gdk is isntalled as dependency (bsc#1200614) gtk4-4.6.0-150400.3.3.1.src.rpm gtk4-devel-4.6.0-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2848 Recommended update for gdm important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gdm fixes the following issues: - Disable Wayland on aspeed chipsets because of performance issues (bsc#1200323) gdm-41.3-150400.4.3.1.src.rpm gdm-41.3-150400.4.3.1.x86_64.rpm gdm-devel-41.3-150400.4.3.1.x86_64.rpm gdm-lang-41.3-150400.4.3.1.noarch.rpm gdm-schema-41.3-150400.4.3.1.noarch.rpm gdm-systemd-41.3-150400.4.3.1.noarch.rpm gdmflexiserver-41.3-150400.4.3.1.noarch.rpm libgdm1-41.3-150400.4.3.1.x86_64.rpm typelib-1_0-Gdm-1_0-41.3-150400.4.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2826 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - Update to version 2.36.5 (bsc#1201980): - Add support for PAC proxy in the WebDriver implementation. - Fix video playback when loaded through custom URIs, this fixes video playback in the Yelp documentation browser. - Fix WebKitWebView::context-menu when using GTK4. - Fix LTO builds with GCC. - Fix several crashes and rendering issues. - Security fixes: - CVE-2022-32792: Fixed processing maliciously crafted web content may lead to arbitrary code execution. - CVE-2022-32816: Fixed visiting a website that frames malicious content may lead to UI spoofing. libjavascriptcoregtk-4_1-0-2.36.5-150400.4.9.1.x86_64.rpm libwebkit2gtk-4_1-0-2.36.5-150400.4.9.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.36.5-150400.4.9.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.36.5-150400.4.9.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.36.5-150400.4.9.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.36.5-150400.4.9.1.x86_64.rpm webkit2gtk3-2.36.5-150400.4.9.1.src.rpm webkit2gtk3-devel-2.36.5-150400.4.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2896 Security update for raptor moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for raptor fixes the following issues: - CVE-2020-25713: Fixed an out of bounds access triggered via a malformed input file (bsc#1178903). libraptor-devel-2.0.15-150200.9.12.1.x86_64.rpm libraptor2-0-2.0.15-150200.9.12.1.x86_64.rpm raptor-2.0.15-150200.9.12.1.src.rpm raptor-2.0.15-150200.9.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2889 Recommended update for emacs-apel important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for emacs-apel fixes the following issues: - Fix build issue on SUSE Linux Enterprise 15 Service Pack 4 (bsc#1197714) emacs-apel-10.8-150000.3.3.1.noarch.rpm emacs-apel-10.8-150000.3.3.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3946 Recommended update for wireplumber moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireplumber fixes the following issues: - Fix to automatically enable wireplumber user service in new and current installations (bsc#1200485, bsc#1202008) libwireplumber-0_4-0-0.4.9-150400.3.3.2.x86_64.rpm wireplumber-0.4.9-150400.3.3.2.src.rpm wireplumber-0.4.9-150400.3.3.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3103 Security update for python-bottle important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for python-bottle fixes the following issues: - CVE-2022-31799: Fixed an error mishandling issue that could lead to remote denial of service (bsc#1200286). python-bottle-0.12.13-150000.3.6.1.src.rpm python3-bottle-0.12.13-150000.3.6.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2998 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2022-2719: Fixed a reachable assertion that could lead to denial of service via a crafted file (bsc#1202250). - CVE-2022-28463: Fixed a buffer overflow that could be triggered by a crafted input file (bsc#1199350). ImageMagick-7.1.0.9-150400.6.6.1.src.rpm ImageMagick-7.1.0.9-150400.6.6.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.6.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.6.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.6.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.6.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.6.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.6.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3252 Security update for freetype2 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for freetype2 fixes the following issues: - CVE-2022-27404 Fixed a segmentation fault via a crafted typeface (bsc#1198830). - CVE-2022-27405 Fixed a buffer overflow via a crafted typeface (bsc#1198832). - CVE-2022-27406 Fixed a segmentation fault via a crafted typeface (bsc#1198823). Non-security fixes: - Updated to version 2.10.4 ft2demos-2.10.4-150000.4.12.1.nosrc.rpm ftdump-2.10.4-150000.4.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3030 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 91.13.0 ESR (bsc#1202645): - CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling. - CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions. - CVE-2022-38478: Fixed various memory safety issues. MozillaFirefox-91.13.0-150200.152.56.2.src.rpm MozillaFirefox-91.13.0-150200.152.56.2.x86_64.rpm MozillaFirefox-branding-SLE-91-150200.9.7.1.src.rpm MozillaFirefox-branding-SLE-91-150200.9.7.1.x86_64.rpm MozillaFirefox-devel-91.13.0-150200.152.56.2.x86_64.rpm MozillaFirefox-translations-common-91.13.0-150200.152.56.2.x86_64.rpm MozillaFirefox-translations-other-91.13.0-150200.152.56.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2936 Security update for open-vm-tools important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - Updated to version 12.1.0 (build 20219665) (bsc#1202733): - CVE-2022-31676: Fixed an issue that could allow unprivileged users inside a virtual machine to escalate privileges (bsc#1202657). open-vm-tools-12.1.0-150300.19.1.src.rpm open-vm-tools-desktop-12.1.0-150300.19.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3137 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - Updated to version 2.36.7 (bsc#1202807): - CVE-2022-32893: Fixed an issue that would be triggered when processing malicious web content and that could lead to arbitrary code execution. - Fixed several crashes and rendering issues. - Updated to version 2.36.6: - Fixed handling of touchpad scrolling on GTK4 builds - Fixed WebKitGTK not allowing to be used from non-main threads (bsc#1202169). - Fixed several crashes and rendering issues libjavascriptcoregtk-4_1-0-2.36.7-150400.4.12.1.x86_64.rpm libwebkit2gtk-4_1-0-2.36.7-150400.4.12.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.36.7-150400.4.12.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.36.7-150400.4.12.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.36.7-150400.4.12.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.36.7-150400.4.12.1.x86_64.rpm webkit2gtk3-2.36.7-150400.4.12.1.src.rpm webkit2gtk3-devel-2.36.7-150400.4.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3094 Security update for libostree important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libostree fixes the following issues: - CVE-2014-9862: Fixed a memory corruption issue that could be triggered when diffing binary files (bsc#1201770). libostree-2021.6-150400.3.3.1.src.rpm libostree-2021.6-150400.3.3.1.x86_64.rpm libostree-devel-2021.6-150400.3.3.1.x86_64.rpm typelib-1_0-OSTree-1_0-2021.6-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3229 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: Updated to version 9.0 with patch level 0313: - CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902). - CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903). - CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904). - CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249). - CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356). - CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359). - CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363). - CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414). - CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552). - CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270). - CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697). - CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698). - CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700). - CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701). - CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732). - CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132). - CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133). - CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134). - CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135). - CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136). - CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150). - CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151). - CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152). - CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153). - CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154). - CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155). - CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863). - CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046). - CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049). - CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050). - CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051). - CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420). - CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421). - CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511). - CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512). - CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515). - CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599). - CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687). - CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689). - CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862). Bugfixes: - Fixing vim error on startup (bsc#1200884). - Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620). gvim-9.0.0313-150000.5.25.1.x86_64.rpm vim-9.0.0313-150000.5.25.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3396 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Mozilla Firefox was updated to 102.3.0esr ESR (bsc#1200793, bsc#1201758, bsc#1202645, bsc#1203477): - CVE-2022-40959: Fixed bypassing FeaturePolicy restrictions on transient pages. - CVE-2022-40960: Fixed data-race when parsing non-UTF-8 URLs in threads. - CVE-2022-40958: Fixed bypassing secure context restriction for cookies with __Host and __Secure prefix. - CVE-2022-40956: Fixed content-security-policy base-uri bypass. - CVE-2022-40957: Fixed incoherent instruction cache when building WASM on ARM64. - CVE-2022-40962: Fixed memory safety bugs. - CVE-2022-38472: Fixed a potential address bar spoofing via XSLT error handling. - CVE-2022-38473: Fixed an issue where cross-origin XSLT documents could inherit the parent's permissions. - CVE-2022-38478: Fixed various memory safety issues. - CVE-2022-38476: Fixed data race and potential use-after-free in PK11_ChangePW. - CVE-2022-38477: Fixed memory safety bugs. - CVE-2022-36319: Fixed mouse position spoofing with CSS transforms. - CVE-2022-36318: Fixed directory indexes for bundled resources reflected URL parameters. - CVE-2022-36314: Fixed unexpected network loads when opening local .lnk files. - CVE-2022-2505: Fixed memory safety bugs. - CVE-2022-34479: Fixed vulnerabilty where a popup window could be resized in a way to overlay the address bar with web content. - CVE-2022-34470: Fixed use-after-free in nsSHistory. - CVE-2022-34468: Fixed bypass of CSP sandbox header without `allow-scripts` via retargeted javascript: URI. - CVE-2022-34482: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution. - CVE-2022-34483: Fixed drag and drop of malicious image that could have led to malicious executable and potential code execution. - CVE-2022-34476: Fixed vulnerability where ASN.1 parser could have been tricked into accepting malformed ASN.1. - CVE-2022-34481: Fixed potential integer overflow in ReplaceElementsAt - CVE-2022-34474: Fixed vulnerability where sandboxed iframes could redirect to external schemes. - CVE-2022-34469: Fixed TLS certificate errors on HSTS-protected domains which could be bypassed by the user on Firefox for Android. - CVE-2022-34471: Fixed vulnerability where a compromised server could trick a browser into an addon downgrade. - CVE-2022-34472: Fixed vulnerability where an unavailable PAC file resulted in OCSP requests being blocked. - CVE-2022-34478: Fixed vulnerability where Microsoft protocols can be attacked if a user accepts a prompt. - CVE-2022-2200: Fixed vulnerability where undesired attributes could be set as part of prototype pollution. - CVE-2022-34480: Fixed free of uninitialized pointer in lg_init. - CVE-2022-34477: Fixed vulnerability in MediaError message property leaking information on cross-origin same-site pages. - CVE-2022-34475: Fixed vulnerability where the HTML Sanitizer could have been bypassed via same-origin script via use tags. - CVE-2022-34473: Fixed vulnerability where the HTML Sanitizer could have been bypassed via use tags. - CVE-2022-34484: Fixed memory safety bugs. - CVE-2022-34485: Fixed memory safety bugs. MozillaFirefox-102.3.0-150200.152.61.1.src.rpm MozillaFirefox-102.3.0-150200.152.61.1.x86_64.rpm MozillaFirefox-branding-SLE-102-150200.9.10.1.src.rpm MozillaFirefox-branding-SLE-102-150200.9.10.1.x86_64.rpm MozillaFirefox-devel-102.3.0-150200.152.61.1.x86_64.rpm MozillaFirefox-translations-common-102.3.0-150200.152.61.1.x86_64.rpm MozillaFirefox-translations-other-102.3.0-150200.152.61.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3247 Security update for bluez important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for bluez fixes the following issues: - CVE-2022-0204: Fixed check if the prepare writes would append more than the allowed maximum attribute length (bsc#1194704). bluez-5.62-150400.4.5.1.src.rpm bluez-devel-5.62-150400.4.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3684 Recommended update for celt, jack, libogg, libtheora low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for celt, jack, libogg, libtheora fixes the following issue: - celt, jack, libogg, libtheora 32bit base libraries are shipped to meet dependencies of the ffmpeg 32bit libraries (bsc#1198925). Also two bugs in jack were fixed (bsc#1132458 bsc#1108981). celt-0.11.3-150000.3.3.1.src.rpm celt-0.11.3-150000.3.3.1.x86_64.rpm jack-1.9.12-150000.3.3.1.src.rpm libcelt-devel-0.11.3-150000.3.3.1.x86_64.rpm libcelt0-2-0.11.3-150000.3.3.1.x86_64.rpm libjack-devel-1.9.12-150000.3.3.1.x86_64.rpm libjack0-1.9.12-150000.3.3.1.x86_64.rpm libjacknet0-1.9.12-150000.3.3.1.x86_64.rpm libjackserver0-1.9.12-150000.3.3.1.x86_64.rpm libtheora-1.1.1-150000.3.3.1.src.rpm libtheora-devel-1.1.1-150000.3.3.1.x86_64.rpm libtheora0-1.1.1-150000.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3309 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Updated to Wireshark 3.6.8: - CVE-2022-3190: Fixed F5 Ethernet Trailer dissector infinite loop (bsc#1203388). - CVE-2021-4186: Fixed Gryphon dissector crash (bsc#1194165). wireshark-3.6.8-150000.3.74.1.src.rpm wireshark-devel-3.6.8-150000.3.74.1.x86_64.rpm wireshark-ui-qt-3.6.8-150000.3.74.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3673 Security update for jasper moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for jasper fixes the following issues: - CVE-2022-2963: Fixed memory leaks in function cmdopts_parse (bsc#1202642). jasper-2.0.14-150000.3.28.1.src.rpm libjasper-devel-2.0.14-150000.3.28.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3487 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2022-3213: Fixed heap buffer overflow when processing a malformed TIFF file (bsc#1203450). ImageMagick-7.1.0.9-150400.6.9.1.src.rpm ImageMagick-7.1.0.9-150400.6.9.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.9.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.9.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.9.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.9.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.9.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.9.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4299 Recommended update for dconf moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for dconf fixes the following issues: - Re-enable fix for `dconf update` to restore correct permissions on db files (bsc#971074, bsc#1203344) dconf-0.40.0-150400.3.3.2.src.rpm dconf-devel-0.40.0-150400.3.3.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3904 Recommended update for openssh moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openssh fixes the following issue: - Prevent empty messages from being sent. (bsc#1192439) openssh-askpass-gnome-8.4p1-150300.3.12.1.src.rpm openssh-askpass-gnome-8.4p1-150300.3.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3733 Recommended update for libheif moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libheif fixes the following issues: - Add missing gdk-pixbuf loader scriptlets (bsc#1199987) libheif-1.12.0-150400.3.3.1.src.rpm libheif1-1.12.0-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3496 Security update for colord moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for colord fixes the following issues: - CVE-2021-42523: Fixed a small memory leak in sqlite3_exec (bsc#1202802). colord-1.4.5-150400.4.3.1.src.rpm colord-color-profiles-1.4.5-150400.4.3.1.x86_64.rpm libcolord-devel-1.4.5-150400.4.3.1.x86_64.rpm libcolorhug2-1.4.5-150400.4.3.1.x86_64.rpm typelib-1_0-Colord-1_0-1.4.5-150400.4.3.1.x86_64.rpm typelib-1_0-Colorhug-1_0-1.4.5-150400.4.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3488 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Updated to version 2.36.8 (bsc#1203530): - CVE-2022-32886: Fixed a buffer overflow issue that could potentially lead to code execution. - CVE-2022-32912: Fixed an out-of-bounds read that could potentially lead to code execution. libjavascriptcoregtk-4_1-0-2.36.8-150400.4.15.1.x86_64.rpm libwebkit2gtk-4_1-0-2.36.8-150400.4.15.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.36.8-150400.4.15.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.36.8-150400.4.15.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.36.8-150400.4.15.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.36.8-150400.4.15.1.x86_64.rpm webkit2gtk3-2.36.8-150400.4.15.1.src.rpm webkit2gtk3-devel-2.36.8-150400.4.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3598 Security update for exiv2 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for exiv2 fixes the following issues: - CVE-2021-37621: Fixed denial of service due to infinite loop in Image:printIFDStructure (bsc#1189333). - CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332). - CVE-2021-37619: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1189331). - CVE-2021-37618: Fixed out-of-bounds read in Exiv2:Jp2Image:printStructure (bsc#1189330). - CVE-2021-32617: Fixed denial of service inside inefficient algorithm (quadratic complexity) (bsc#1186192). - CVE-2021-31292: Fixed integer overflow in CrwMap:encode0x1810 (bsc#1188756). - CVE-2021-31291: Fixed heap-based buffer overflow vulnerability in jp2image.cpp may lead to a denial of service (bsc#1188733). - CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447). - CVE-2020-18899: Fixed uncontrolled memory allocation (bsc#1189636). - CVE-2020-18898: Fixed remote denial of service in printIFDStructure function (bsc#1189780). - CVE-2018-8977: Fixed remote denial of service in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (bsc#1086798). - CVE-2018-8976: Fixed remote denial of service in image.cpp Exiv2::Internal::stringFormat via out-of-bounds read (bsc#1086810). - CVE-2018-5772: Fixed segmentation fault caused by uncontrolled recursion inthe Exiv2::Image::printIFDStructure (bsc#1076579). - CVE-2018-18915: Fixed an infinite loop in the Exiv2:Image:printIFDStructure function (bsc#1114690). - CVE-2018-10772: Fixed segmentation fault when the function Exiv2::tEXtToDataBuf() is finished (bsc#1092096). exiv2-0.26-150000.6.16.1.src.rpm libexiv2-26-0.26-150000.6.16.1.x86_64.rpm libexiv2-devel-0.26-150000.6.16.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3889 Security update for exiv2 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for exiv2 fixes the following issues: Updated to version 0.27.5 (jsc#PED-1393): - CVE-2017-1000128: Fixed stack out of bounds read in JPEG2000 parser (bsc#1068871). - CVE-2019-13108: Fixed integer overflow PngImage:readMetadata (bsc#1142675). - CVE-2020-19716: Fixed buffer overflow vulnerability in the Databuf function in types.cpp (bsc#1188645). - CVE-2021-29457: Fixed heap buffer overflow when write metadata into a crafted image file (bsc#1185002). - CVE-2021-29470: Fixed out-of-bounds read in Exiv2:Jp2Image:encodeJp2Header (bsc#1185447). - CVE-2021-29623: Fixed read of uninitialized memory (bsc#1186053). - CVE-2021-31291: Fixed heap-based buffer overflow in jp2image.cpp (bsc#1188733). - CVE-2021-32617: Fixed denial of service due to inefficient algorithm (bsc#1186192). - CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read() (bsc#1189332). - CVE-2021-37621: Fixed DoS due to infinite loop in Image:printIFDStructure (bsc#1189333). - CVE-2021-37622: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189334) - CVE-2021-34334: Fixed DoS due to integer overflow in loop counter(bsc#1189338) - CVE-2021-37623: Fixed DoS due to infinite loop in JpegBase:printStructure (bsc#1189335) - CVE-2021-29463: Fixed out-of-bounds read in webpimage.cpp (bsc#1185913). - CVE-2021-34334: Fixed DoS due to integer overflow in loop counter (bsc#1189338) - CVE-2019-13111: Fixed integer overflow in WebPImage:decodeChunks that lead to denial of service (bsc#1142679) - CVE-2021-29463: Fixed an out-of-bounds read was found in webpimage.cpp (bsc#1185913) Bugfixes: - Fixed build using GCC 11 (bsc#1185218). A new libexiv2-2_27 shared library is shipped, the libexiv2-2_26 is provided only for compatibility now. Please recompile your applications using the exiv2 library. exiv2-0.27.5-150400.15.4.1.src.rpm exiv2-0_26-0.26-150400.9.16.1.src.rpm libexiv2-26-0.26-150400.9.16.1.x86_64.rpm libexiv2-27-0.27.5-150400.15.4.1.x86_64.rpm libexiv2-devel-0.27.5-150400.15.4.1.x86_64.rpm libexiv2-xmp-static-0.27.5-150400.15.4.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3726 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Updated to version 102.4.0 ESR (bsc#1204421) - CVE-2022-42927: Fixed same-origin policy violation that could have leaked cross-origin URLs. - CVE-2022-42928: Fixed memory Corruption in JS Engine. - CVE-2022-42929: Fixed denial of Service via window.print. - CVE-2022-42932: Fixed memory safety bugs. MozillaFirefox-102.4.0-150200.152.64.1.src.rpm MozillaFirefox-102.4.0-150200.152.64.1.x86_64.rpm MozillaFirefox-devel-102.4.0-150200.152.64.1.x86_64.rpm MozillaFirefox-translations-common-102.4.0-150200.152.64.1.x86_64.rpm MozillaFirefox-translations-other-102.4.0-150200.152.64.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3782 Security update for libmad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libmad fixes the following issues: - CVE-2017-8373: Fixed heap-based buffer overflow in mad_layer_III (bsc#1036968). - CVE-2017-8372: Fixed assertion failure in layer3.c (bsc#1036969). libmad-0.15.1b-150000.5.3.1.src.rpm libmad-devel-0.15.1b-150000.5.3.1.x86_64.rpm libmad0-0.15.1b-150000.5.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4164 Recommended update for PackageKit moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for PackageKit fixes the following issues: - Ensure that package locks are honored (bsc#1199895): * Avoid clearing status information on locked packages * Check if packages are locked before attempting to remove them * Don't refresh repos before searching * Updatelibzypp dependency version to 17.31.0 * Restore pool status after simulating an update - Add repository data in the package id (bsc#1202585) - Implement upgrade-system method in openSUSE Leap (not supported in SUSE Linux Enterprise) PackageKit-1.2.4-150400.3.6.1.src.rpm True PackageKit-1.2.4-150400.3.6.1.x86_64.rpm True PackageKit-backend-zypp-1.2.4-150400.3.6.1.x86_64.rpm True PackageKit-devel-1.2.4-150400.3.6.1.x86_64.rpm True PackageKit-lang-1.2.4-150400.3.6.1.noarch.rpm True libpackagekit-glib2-18-1.2.4-150400.3.6.1.x86_64.rpm True libpackagekit-glib2-devel-1.2.4-150400.3.6.1.x86_64.rpm True typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.6.1.x86_64.rpm True SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1766 Security update for libheif moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libheif fixes the following issues: - CVE-2023-0996: Fixed a buffer overflow in heif_js_decode_image (bsc#1208640). libheif-1.12.0-150400.3.8.1.src.rpm libheif1-1.12.0-150400.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4082 Security update for openjpeg important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openjpeg fixes the following issues: - CVE-2018-20846: Fixed an Out-of-bounds accesses in pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi. (bsc#1140205) - CVE-2018-21010: Fixed a heap buffer overflow in color_apply_icc_profile in bin/common/color.c (bsc#1149789) - CVE-2020-27824: Fixed an OOB read in opj_dwt_calc_explicit_stepsizes() (bsc#1179821) - CVE-2020-27842: Fixed null pointer dereference in opj_tgt_reset function in lib/openjp2/tgt.c (bsc#1180043) - CVE-2020-27843: Fixed an out-of-bounds read in opj_t2_encode_packet function in openjp2/t2.c (bsc#1180044) - CVE-2020-27845: Fixed a heap-based buffer over-read in functions opj_pi_next_rlcp, opj_pi_next_rpcl and opj_pi_next_lrcp in openjp2/pi.c (bsc#1180046) libopenjpeg1-1.5.2-150000.4.10.1.x86_64.rpm openjpeg-1.5.2-150000.4.10.1.src.rpm openjpeg-devel-1.5.2-150000.4.10.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4601 Feature update for GNOME 41 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for GNOME 41 fixes the following issues: atkmm1_6: - Version update from 2.28.1 to 2.28.3 (jsc#PED-2235): * Meson build: Avoid unnecessary configuration warnings * Meson build: Perl is not required by new versions of mm-common * Meson build: Require meson >= 0.55.0 * Meson build: Specify 'check' option in run_command(). Will be necessary with future versions of Meson. * Require atk >= 2.12.0 Not a new requirement, but previously it was not specified in configure.ac and meson.build * Support building with Visual Studio 2022 eog: - Version update from 41.1 to 41.2 (jsc#PED-2235): * eog-window: use correct type for display_profile * Fix discovery of Evince for multi-page images evince: - Version update 41.3 to 41.4 (jsc#PED-2235): * shell: Fix failures when thumbnail extraction takes too long * Fix build with meson 0.60.0 and newer evolution: - Ensure evolution-devel is forward compatible with evolution-data-server-devel in a same major version (jsc#PED-2235) evolution-data-center: - Version update from 3.42.4 to 3.42.5 (jsc#PED-2235): * Google OAuth out-of-band (oob) flow will be deprecated folks: - Version update 0.15.3 to 0.15.5 (jsc#PED-2235): * vapi: Add missing generic type argument * Fix docs build against newer eds version * Fix build against newer eds version * Remove volatile keyword from tests gcr: - Version update 3.41.0 to 3.41.1 (jsc#PED-2235): * Add G_SPAWN_CLOEXEC_PIPES flag to all the g_spawn commands * Add gi-docgen dependency which is needed by the docs * Fix build with meson 0.60.0 and newer * Fix build without systemd * Several CI fixes geocode-glib: - Version update from 3.26.2 to 3.26.4 (jsc#PED-2235): * Fix to a test data file not being installed, and a bug fix for a bug in the libsoup3 port * Add support for libsoup 3.x gjs: - Version update from 1.70.1 to 1.70.2 (jsc#PED-2235): * Build and compatibility fixes backported from the development branch * Reverse order of running-from-source checks - Require xorg-x11-Xvfb for proper package build (bsc#1203274) glib2: - Version update from 2.70.4 to 2.70.5 (jsc#PED-2235): * Bugs fixed: glgo#GNOME/GLib#2620, glgo#GNOME/GLib!2537, glgo#GNOME/GLib!2555 * Split gtk-docs from -devel package, these are not needed during building projects using glib2 gnome-control-center: - Fix the size of logo icon in About system (bsc#1200581) - Version update from 41.4 to 41.7 (jsc#PED-2235): * Cellular: Remove duplicate line from .desktop * Info: Allow changing "Device Name" by pressing "Enter" * Info: Remove trailing space after CPU name * Keyboard: Fix crash resetting all keyboard shortcuts * Keyboard: Fix leaks * Network: Fix saving passwords for non-wifi connections * Network: Fix critical when opening VPN details page * Wacom: Fix leaks gnome-desktop: - Version update from 41.2 to 41.8 (jsc#PED-2235): * Version increase but no actual changes gnome-music: - Version update from 41.0 to 41.1 (jsc#PED-2235): * Ensure the correct album is played * Fix build with meson 0.61.0 and newer * Fix crash on empty selection * Fix incorrect playlist import * Fix time displayed in RTL languages * Improve async queue work * Make random shuffle actually random * Make shuffle random * Speed increase on first startup on larger collections * Time is reversed in RTL gnome-remote-desktop: - Version update from 41.2 to 41.3 (jsc#PED-2235): * Add Icelandic translation gnome-session: - Clear error messages that can be ignored because expected to happen for GDM sessions (bsc#1204867) - Add fix for gnome-session to exit immediately when lost name on bus (bsc#1175622, bsc#1188882) gnome-shell: - Disable offline update suggestion before shutdown/reboot in SLE and openSUSE Leap (bsc#944832) - Version update from 41.4 to 41.9 (jsc#PED-2235): * Allow extension updates with only Extension Manager installed * Allow more intermediate icon sizes in app grid * Disable workspace switching while in search. * Do not create systemd scope for D-Bus activated apps * Fix calendar to correctly align world clocks header in RTL * Fix drag placeholder position in dash in RTL locales * Fix edge case where windows stay dimmed after a modal is closed * Fix feedback when turning on a11y features by keyboard * Fix focus tracking in magnifier on wayland * Fix fractional timezone offsets in world clock * Fix glitches in overview transition * Fix logging in with realmd * Fix memory leak * Fix opening device settings for enterprise WPA networks * Fix programatically set scrollview fade * Fix regression in ibus support * Fix unresponsive top bar in overview when in fullscreen * Handle monitor changes during startup animation * Hide overview after 'Show Details' from app context menu * Improve Belgian on-screen keyboard layout * Improve CSS shadow appearance * Make sure startup animation completes * Misc. bug fixes and cleanups * Only close messages via delete key if they can be closed * Respect IM hint for candidates list in on-screen keyboard gnome-software: - Disable offline update feature in SUSE Linux Enterprise and openSUSE Leap (bsc#944832) - Version update from 41.4 to 41.5 (jsc#PED-2235): * Added several appstream-related fixed * Disable scroll-by-mouse-wheel on featured carousel * Ensure details page shows app provided on command line gnome-terminal: - Version update from 3.42.2 to 3.42.3 (jsc#PED-2235): * Fix build with meson 0.61.0 and newer * window: Use a normal menu for the popup menu gnome-user-docs: - Version update from 41.1 to 41.5 (jsc#PED-2235): * Added missing icon for network-wired-symbolic gspell: - Version update from 1.8.4 to 1.10.0 (jsc#PED-2235): * Build: distribute more files in tarballs * Documentation improvements gtkmm3: - Version update from 3.24.5 to 3.24.6 (jsc#PED-2235): * Build with Meson: MSVC build: Support Visual Studio 2022 * Check if Perl is required for building documentation * Don't use deprecated python3.path() and execute (..., gui_app...) * GTK: TreeValueProxy: Declare copy constructor = default, avoiding warnings from the claing++ compiler * Object::_release_c_instance(): Unref orphan managed widgets * SizeGroup demo: Set active items in the combo boxs, so something is shown * Specify 'check' option in run_command() gtk-vnc: - Version update from 1.3.0 to 1.3.1 (jsc#PED-2235): * Add 'check' arg to meson run_command() * Fix invalid use of subprojects with meson * Support ZRLE encoding for zero size alpha cursors gupnp-av: - Version update from 0.12.11 to 0.14.1 (jsc#PED-2235): * Add utility function to format GDateTime to the iso variant DIDL expects * Allow to be used as a subproject * Drop autotools * Fix stripping @refID * Fix unsetting subtitleFileType * Make Feature derivable again * Obsolete code removal. * Port to modern GObject * Remove hand-written ref-counting, use RcBox/AtomicRcBox instead. * Switch to meson build system, following upstream - Rename libgupnp-av-1_0-2 subpackage to libgupnp-av-1_0-3, correcting the package name to match the provided library - Conflict with the wrongly provided libgupnp-av-1_0-2 gvfs: - Version update from 1.48.1 to 1.48.2 (jsc#PED-2235): * sftp: Adapt on new OpenSSH password prompts * smb: Rework anonymous handling to avoid EINVAL * smb: Ignore EINVAL for kerberos/ccache login libgsf: - Version update from 1.14.48 to 1.14.50 (jsc#PED-2235): * Fix error handling problem when writing ole files * Fix problems with non-western text in OLE properties * Use g_date_time_new_from_iso8601 and g_date_time_format_iso8601 when available libmediaart: - Version update from 1.9.5 to 1.9.6 (jsc#PED-2235): * build: Add introspection/vapi/tests options * build: Use library() to optionally build a static library libnma: - Version update from 1.8.32 to 1.8.40 (jsc#PED-2235): * Ad-Hoc networks now default to using WPA2 instead of WEP * Add possibility of building libnma-gtk4 library with Gtk4 support * Do not allow setting empty 802.1x domain for EAP TLS * Fixed keyboard accelerator for certificate chooser * Fixed libnma-gtk4 version of mobile-wizard * Include OWE wireless security option * The GtkBuilder files for Gtk4 are now included in the release tarball * WEP is no longer provided as an option for connecting to hidden networks due to its deprecated status - New sub-packages libnma-gtk4-0, typelib-1_0-NMA4-1_0 and libnma-gtk4-devel - Split out documentation files in own docs sub-package libnotify: - Version update from 0.7.10 to 0.7.12 (jsc#PED-2235): * Delete unused notifynotification.xml * Fix potential build errors with old glib version we require * docs/notify-send: Add --transient option to manpage * notification: Bookend calling NotifyActionCallback with temporary reference * notification: Include sender-pid hint by default if not provided * notify-send: Add debug message about server not supporting persistence * notify-send: Add explicit option to create transient notifications * notify-send: Add support for boolean hints * notify-send: Move server capabilities check to a separate function * notify-send: Support passing any hint value, by parsing variant strings libpeas: - Version update from 1.30.0 to 1.32.0 (jsc#PED-2235): * Icon licenses have been corrected * Parallel build system operation fixes * Use gi-docgen for documentation * Various build warnings squashed * Various GIR data that should not have been exported was removed - Stop packaging the demo files/sub-package librsvg: - Version update from 2.52.6 to 2.52.9 (jsc#PED-2235): * Catch circular references when rendering patterns * Fix regressions when computing element geometries * Fix regression outputting all text as paths libsecret: - Version update from 0.20.4 to 0.20.5 (jsc#PED-2235): * Add bash-completion for secret-tool * Add locking capabilities to secret tool * Add support for TPM2 based secret storage * Create default collection after DBus.Error.UnknownObject * Detect local storage in snaps in the same way as flatpaks * Drop autotools-based build * GI annotation and documentation fixes * Port documentation to gi-docgen * Use G_GNUC_NULL_TERMINATED where appropriate collection, methods, prompt: Port to GTask * secret-file-backend: Avoid closing the same file descriptor twice mutter: - Version update from 41.5 to 41.9 (jsc#PED-2235): * Fix '--replace option' * Fix missing root window properties after XWayland start * Fix night light without GAMMA_LUT property * KMS: Survive missing GAMMA_LUT property * wayland: Fix rotation transform * Misc. bug fixes nautilus: - Version update from 41.2 to 41.5(jsc#PED-2235): * Drag-and-drop bugfixes * HighContrast style fixes orca: - Version update from 41.1 to 41.3 (jsc#PED-2235): * Add more event-flood detection and handling for improved performance * Fix bug causing accessing preferences to fail for Esperanto * Web: Fix bug causing widgets descending from off-screen label elements to be skipped over * Web: Fix presentation of the FluentUI react dialog (and any other dialog which has an ARIA document-role descendant) * WebKitGtk: Fail gracefully when structural navigation commands are used in WebKitGtk 2.36.x python-cairo: - Add python3-cairo to SUSE Linux Enterprise Micro 5.3 as it is now required by python3-gobject-cairo python-gobject: - Add dependency on python-cairo to python-gobject-cairo: The introspection wrapper needs pycairo (bsc#1179584) - Version update from 3.42.0 to 3.42.2 (jsc#PED-2235): * Add a workaround for a PyPy 3.9+ bug when threads are used * Do not error out for unknown scopes * Prompt an error instead of crashing when marshaling unsupported fundamental types in some cases * Fix a crash/refcounting error in case marshaling a hash table fails * Fix crashes when marshaling zero terminated arrays for certain item types * Implement DynamicImporter.find_spec() to silence deprecation warning * Make the test suite pass again with PyPy * Some test/CI fixes * gtk overrides: Do not override Treeview.enable_model_drag_xx for GTK4 * gtk overrides: restore Gtk.ListStore.insert_with_valuesv with newer GTK4 * interface: Fix leak when overriding GInterfaceInfo * setup.py: look up pycairo headers without importing the module trackers-python: - Allow system calls used by gstreamer (bsc#1196205) - Version update from 3.2.2 to 3.2.1 (jsc#PED-2235): * Backport seccomp rules for rseq and mbind syscalls vala: - Version update from 0.54.6 to 0.54.8 (jsc#PED-2235): * Add missing TraverseVisitor.visit_data_type() * Add support for "copy_/free_function" metadata for compact classes * Catch and throw possible inner error of lock statements * Clear SemanticAnalyzer.current_{symbol,source_file} when not needed anymore * Don't count instance-parameter when checking for backwards closure reference * Fix a few binding errors * Free empty stack list for code contexts * Handle duplicated and unnamed symbols. * Improve UI parsing and handling of nested objects and properties * Make sure to drop our "trap" jump target in case of an error * Move dynamic property errors to semantic analyzer pass * Require lvalue access of delegate target/destroy "fields" * Show source location when reporting deprecations * Transform assignment of an array element as needed * manual: Update from wiki.gnome.org * parser: Improve handling of nullable VarType in with-statement * parser: Reduce the source reference of main block method to its beginning xdg-desktop-portal-gnome: - Version update from 0.54.6 to 0.54.8 (jsc#PED-2235): * Properly bind property in Lockdown portal atkmm1_6-2.28.3-150400.4.3.1.src.rpm atkmm1_6-devel-2.28.3-150400.4.3.1.x86_64.rpm eog-41.2-150400.3.3.2.src.rpm eog-41.2-150400.3.3.2.x86_64.rpm eog-devel-41.2-150400.3.3.2.x86_64.rpm eog-lang-41.2-150400.3.3.2.noarch.rpm evince-41.4-150400.3.3.3.src.rpm evince-41.4-150400.3.3.3.x86_64.rpm evince-devel-41.4-150400.3.3.3.x86_64.rpm evince-lang-41.4-150400.3.3.3.noarch.rpm evince-plugin-djvudocument-41.4-150400.3.3.3.x86_64.rpm evince-plugin-dvidocument-41.4-150400.3.3.3.x86_64.rpm evince-plugin-pdfdocument-41.4-150400.3.3.3.x86_64.rpm evince-plugin-psdocument-41.4-150400.3.3.3.x86_64.rpm evince-plugin-tiffdocument-41.4-150400.3.3.3.x86_64.rpm evince-plugin-xpsdocument-41.4-150400.3.3.3.x86_64.rpm gcr-3.41.1-150400.3.3.1.src.rpm gcr-data-3.41.1-150400.3.3.1.x86_64.rpm gcr-lang-3.41.1-150400.3.3.1.noarch.rpm gcr-prompter-3.41.1-150400.3.3.1.x86_64.rpm gcr-ssh-agent-3.41.1-150400.3.3.1.x86_64.rpm gcr-ssh-askpass-3.41.1-150400.3.3.1.x86_64.rpm gcr-viewer-3.41.1-150400.3.3.1.x86_64.rpm geocode-glib-3.26.4-150400.3.3.2.src.rpm geocode-glib-3.26.4-150400.3.3.2.x86_64.rpm geocode-glib-devel-3.26.4-150400.3.3.2.x86_64.rpm gjs-1.70.2-150400.3.3.1.src.rpm gjs-1.70.2-150400.3.3.1.x86_64.rpm gnome-control-center-41.7-150400.3.3.1.src.rpm gnome-control-center-41.7-150400.3.3.1.x86_64.rpm gnome-control-center-devel-41.7-150400.3.3.1.x86_64.rpm gnome-control-center-lang-41.7-150400.3.3.1.noarch.rpm gnome-desktop-41.8-150400.3.3.1.src.rpm gnome-desktop-lang-41.8-150400.3.3.1.noarch.rpm gnome-extensions-41.9-150400.3.3.2.x86_64.rpm gnome-session-41.3-150400.3.3.1.src.rpm gnome-session-41.3-150400.3.3.1.x86_64.rpm gnome-session-core-41.3-150400.3.3.1.x86_64.rpm gnome-session-default-session-41.3-150400.3.3.1.x86_64.rpm gnome-session-lang-41.3-150400.3.3.1.noarch.rpm gnome-shell-41.9-150400.3.3.2.src.rpm gnome-shell-41.9-150400.3.3.2.x86_64.rpm gnome-shell-devel-41.9-150400.3.3.2.x86_64.rpm gnome-shell-lang-41.9-150400.3.3.2.noarch.rpm gnome-shell-search-provider-gnome-terminal-3.42.3-150400.3.3.1.x86_64.rpm gnome-shell-search-provider-nautilus-41.5-150400.3.3.1.x86_64.rpm gnome-software-41.5-150400.3.3.2.src.rpm gnome-software-41.5-150400.3.3.2.x86_64.rpm gnome-software-devel-41.5-150400.3.3.2.x86_64.rpm gnome-software-lang-41.5-150400.3.3.2.noarch.rpm gnome-terminal-3.42.3-150400.3.3.1.src.rpm gnome-terminal-3.42.3-150400.3.3.1.x86_64.rpm gnome-terminal-lang-3.42.3-150400.3.3.1.noarch.rpm gnome-user-docs-41.5-150400.3.3.1.noarch.rpm gnome-user-docs-41.5-150400.3.3.1.src.rpm gnome-user-docs-lang-41.5-150400.3.3.1.noarch.rpm gnome-version-41.8-150400.3.3.1.x86_64.rpm gspell-1.10.0-150400.3.3.1.src.rpm gspell-devel-1.10.0-150400.3.3.1.x86_64.rpm gspell-lang-1.10.0-150400.3.3.1.noarch.rpm gtkmm3-3.24.6-150400.3.3.1.src.rpm gtkmm3-devel-3.24.6-150400.3.3.1.x86_64.rpm gvfs-1.48.2-150400.4.6.1.src.rpm gvfs-1.48.2-150400.4.6.1.x86_64.rpm gvfs-backend-afc-1.48.2-150400.4.6.1.x86_64.rpm gvfs-backend-samba-1.48.2-150400.4.6.1.x86_64.rpm gvfs-backends-1.48.2-150400.4.6.1.x86_64.rpm gvfs-devel-1.48.2-150400.4.6.1.x86_64.rpm gvfs-fuse-1.48.2-150400.4.6.1.x86_64.rpm gvfs-lang-1.48.2-150400.4.6.1.noarch.rpm libatkmm-1_6-1-2.28.3-150400.4.3.1.x86_64.rpm libevdocument3-4-41.4-150400.3.3.3.x86_64.rpm libevview3-3-41.4-150400.3.3.3.x86_64.rpm libgck-1-0-3.41.1-150400.3.3.1.x86_64.rpm libgck-devel-3.41.1-150400.3.3.1.x86_64.rpm libgcr-3-1-3.41.1-150400.3.3.1.x86_64.rpm libgcr-devel-3.41.1-150400.3.3.1.x86_64.rpm libgeocode-glib0-3.26.4-150400.3.3.2.x86_64.rpm libgjs-devel-1.70.2-150400.3.3.1.x86_64.rpm libgjs0-1.70.2-150400.3.3.1.x86_64.rpm libgnome-desktop-3-19-41.8-150400.3.3.1.x86_64.rpm libgnome-desktop-3-devel-41.8-150400.3.3.1.x86_64.rpm libgnome-desktop-3_0-common-41.8-150400.3.3.1.x86_64.rpm libgsf-1-114-1.14.50-150400.3.3.1.x86_64.rpm libgsf-1.14.50-150400.3.3.1.src.rpm libgspell-1-2-1.10.0-150400.3.3.1.x86_64.rpm libgtkmm-3_0-1-3.24.6-150400.3.3.1.x86_64.rpm libnautilus-extension1-41.5-150400.3.3.1.x86_64.rpm libnma-1.8.40-150400.3.3.1.src.rpm libnma0-1.8.40-150400.3.3.1.x86_64.rpm libnotify-0.7.12-150400.3.3.1.src.rpm libnotify-devel-0.7.12-150400.3.3.1.x86_64.rpm libnotify-tools-0.7.12-150400.3.3.1.x86_64.rpm libpeas-1.32.0-150400.4.3.2.src.rpm libpeas-1_0-0-1.32.0-150400.4.3.2.x86_64.rpm libpeas-devel-1.32.0-150400.4.3.2.x86_64.rpm libpeas-gtk-1_0-0-1.32.0-150400.4.3.2.x86_64.rpm libpeas-lang-1.32.0-150400.4.3.2.noarch.rpm libpeas-loader-python3-1.32.0-150400.4.3.2.x86_64.rpm librsvg-2.52.9-150400.3.3.1.src.rpm librsvg-devel-2.52.9-150400.3.3.1.x86_64.rpm mutter-41.9-150400.3.6.1.src.rpm mutter-41.9-150400.3.6.1.x86_64.rpm mutter-devel-41.9-150400.3.6.1.x86_64.rpm mutter-lang-41.9-150400.3.6.1.noarch.rpm nautilus-41.5-150400.3.3.1.src.rpm nautilus-41.5-150400.3.3.1.x86_64.rpm nautilus-devel-41.5-150400.3.3.1.x86_64.rpm nautilus-evince-41.4-150400.3.3.3.x86_64.rpm nautilus-extension-terminal-3.42.3-150400.3.3.1.x86_64.rpm nautilus-lang-41.5-150400.3.3.1.noarch.rpm orca-41.3-150400.3.3.1.noarch.rpm orca-41.3-150400.3.3.1.src.rpm orca-lang-41.3-150400.3.3.1.noarch.rpm python-cairo-1.15.1-150000.3.6.1.src.rpm python-cairo-common-devel-1.15.1-150000.3.6.1.x86_64.rpm python3-cairo-devel-1.15.1-150000.3.6.1.x86_64.rpm tracker-miner-files-3.2.2-150400.3.3.1.x86_64.rpm tracker-miners-3.2.2-150400.3.3.1.src.rpm tracker-miners-3.2.2-150400.3.3.1.x86_64.rpm typelib-1_0-EvinceDocument-3_0-41.4-150400.3.3.3.x86_64.rpm typelib-1_0-EvinceView-3_0-41.4-150400.3.3.3.x86_64.rpm typelib-1_0-Gck-1-3.41.1-150400.3.3.1.x86_64.rpm typelib-1_0-Gcr-3-3.41.1-150400.3.3.1.x86_64.rpm typelib-1_0-GcrUi-3-3.41.1-150400.3.3.1.x86_64.rpm typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.3.2.x86_64.rpm typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.3.1.x86_64.rpm typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.3.1.x86_64.rpm typelib-1_0-Gspell-1-1.10.0-150400.3.3.1.x86_64.rpm typelib-1_0-NMA-1_0-1.8.40-150400.3.3.1.x86_64.rpm typelib-1_0-Nautilus-3_0-41.5-150400.3.3.1.x86_64.rpm typelib-1_0-Notify-0_7-0.7.12-150400.3.3.1.x86_64.rpm typelib-1_0-Peas-1_0-1.32.0-150400.4.3.2.x86_64.rpm typelib-1_0-PeasGtk-1_0-1.32.0-150400.4.3.2.x86_64.rpm typelib-1_0-Rsvg-2_0-2.52.9-150400.3.3.1.x86_64.rpm xdg-desktop-portal-gnome-41.2-150400.3.3.1.src.rpm xdg-desktop-portal-gnome-41.2-150400.3.3.1.x86_64.rpm xdg-desktop-portal-gnome-lang-41.2-150400.3.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4002 Recommended update for gegl, gimp, gnome-photos, libgexiv2 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gegl, gimp, gnome-photos, libgexiv2 has the following changes: - The packages were rebuilt against exiv2 0.27, to allow obsoleting the old 0.26 version. - No other changes were done. libgexiv2-0.14.0-150400.4.2.1.src.rpm libgexiv2-2-0.14.0-150400.4.2.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4206 Security update for pixman important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for pixman fixes the following issues: - CVE-2022-44638: Fixed an integer overflow in pixman_sample_floor_y leading to heap out-of-bounds write (bsc#1205033). pixman-0.40.0-150400.3.3.1.src.rpm libpixman-1-0-32bit-0.40.0-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4058 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270): - CVE-2022-45403: Service Workers might have learned size of cross-origin media files - CVE-2022-45404: Fullscreen notification bypass - CVE-2022-45405: Use-after-free in InputStream implementation - CVE-2022-45406: Use-after-free of a JavaScript Realm - CVE-2022-45408: Fullscreen notification bypass via windowName - CVE-2022-45409: Use-after-free in Garbage Collection - CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy - CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers - CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers - CVE-2022-45416: Keystroke Side-Channel Leakage - CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI - CVE-2022-45420: Iframe contents could be rendered outside the iframe - CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 MozillaFirefox-102.5.0-150200.152.67.3.src.rpm MozillaFirefox-102.5.0-150200.152.67.3.x86_64.rpm MozillaFirefox-devel-102.5.0-150200.152.67.3.x86_64.rpm MozillaFirefox-translations-common-102.5.0-150200.152.67.3.x86_64.rpm MozillaFirefox-translations-other-102.5.0-150200.152.67.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4194 Security update for ffmpeg-4 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg-4 fixes the following issues: - CVE-2022-3964: Fixed out of bounds read in update_block_in_prev_frame() (bsc#1205388). ffmpeg-4-4.4-150400.3.5.1.src.rpm libavcodec58_134-4.4-150400.3.5.1.x86_64.rpm libavutil56_70-4.4-150400.3.5.1.x86_64.rpm libswresample3_9-4.4-150400.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4207 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 Security fixes: - CVE-2022-32888: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205121). - CVE-2022-32923: Fixed possible information leak via maliciously crafted web content (bsc#1205122). - CVE-2022-42799: Fixed user interface spoofing when visiting a malicious website (bsc#1205123). - CVE-2022-42823: Fixed possible arbitrary code execution via maliciously crafted web content (bsc#1205120). - CVE-2022-42824: Fixed possible sensitive user information leak via maliciously crafted web content (bsc#1205124). Update to version 2.38.2: - Fix scrolling issues in some sites having fixed background. - Fix prolonged buffering during progressive live playback. - Fix the build with accessibility disabled. - Fix several crashes and rendering issues. Update to version 2.38.1: - Make xdg-dbus-proxy work if host session bus address is an abstract socket. - Use a single xdg-dbus-proxy process when sandbox is enabled. - Fix high resolution video playback due to unimplemented changeType operation. - Ensure GSubprocess uses posix_spawn() again and inherit file descriptors. - Fix player stucking in buffering (paused) state for progressive streaming. - Do not try to preconnect on link click when link preconnect setting is disabled. - Fix close status code returned when the client closes a WebSocket in some cases. - Fix media player duration calculation. - Fix several crashes and rendering issues. Update to version 2.38.0: - New media controls UI style. - Add new API to set WebView's Content-Security-Policy for web extensions support. - Make it possible to use the remote inspector from other browsers using WEBKIT_INSPECTOR_HTTP_SERVER env var. - MediaSession is enabled by default, allowing remote media control using MPRIS. - Add support for PDF documents using PDF.js. libjavascriptcoregtk-4_1-0-2.38.2-150400.4.22.1.x86_64.rpm libwebkit2gtk-4_1-0-2.38.2-150400.4.22.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.38.2-150400.4.22.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.38.2-150400.4.22.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.38.2-150400.4.22.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.38.2-150400.4.22.1.x86_64.rpm webkit2gtk3-2.38.2-150400.4.22.1.src.rpm webkit2gtk3-devel-2.38.2-150400.4.22.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4208 Security update for exiv2-0_26 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for exiv2-0_26 fixes the following issues: - CVE-2019-17402: Fixed improper validation of the total size to the offset and size leads to a crash in Exiv2::getULong in types.cpp (bsc#1153577). - CVE-2018-20098: Fixed a heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header (bsc#1119560). - CVE-2018-17581: Fixed an excessive stack consumption CiffDirectory:readDirectory() at crwimage_int.cpp (bsc#1110282). - CVE-2018-20099: exiv2: infinite loop in Exiv2::Jp2Image::encodeJp2Header (bsc#1119559). - CVE-2018-20097: Fixed SEGV in Exiv2::Internal::TiffParserWorker::findPrimaryGroupsu (bsc#1119562). - CVE-2017-11591: Fixed a floating point exception in Exiv2::ValueType (bsc#1050257). - CVE-2018-11531: Fixed a heap-based buffer overflow in getData in preview.cpp (bsc#1095070). - CVE-2021-32815: Fixed a deny-of-service due to assertion failure in crwimage_int.cpp (bsc#1189337). - CVE-2021-29473: Fixed out-of-bounds read in Exiv2::Jp2Image:doWriteMetadata (bsc#1186231). - CVE-2019-13109: Fixed a denial of service in PngImage:readMetadata (bsc#1142677). - CVE-2019-13110: Fixed an integer-overflow and out-of-bounds read in CiffDirectory:readDirectory leads to denail of service (bsc#1142678). exiv2-0_26-0.26-150400.9.21.1.src.rpm libexiv2-26-0.26-150400.9.21.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4499 Recommended update for openssh moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openssh fixes the following issues: - Make ssh connections update their dbus environment (bsc#1179465): * Add openssh-dbus.sh, openssh-dbus.csh, openssh-dbus.fish openssh-askpass-gnome-8.4p1-150300.3.15.2.src.rpm openssh-askpass-gnome-8.4p1-150300.3.15.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4282 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: Updated to version 9.0 with patch level 0814: - CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478). - CVE-2022-3234: Fixed heap-based buffer overflow (bsc#1203508). - CVE-2022-3235: Fixed use-after-free (bsc#1203509). - CVE-2022-3324: Fixed stack-based buffer overflow (bsc#1203820). - CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c (bsc#1204779). - CVE-2022-2982: Fixed use-after-free in qf_fill_buffer() (bsc#1203152). - CVE-2022-3296: Fixed stack out of bounds read in ex_finally() in ex_eval.c (bsc#1203796). - CVE-2022-3297: Fixed use-after-free in process_next_cpt_value() at insexpand.c (bsc#1203797). - CVE-2022-3099: Fixed use-after-free in ex_docmd.c (bsc#1203110). - CVE-2022-3134: Fixed use-after-free in do_tag() (bsc#1203194). - CVE-2022-3153: Fixed NULL pointer dereference (bsc#1203272). - CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank() in eval.c (bsc#1203799). - CVE-2022-3352: Fixed use-after-free (bsc#1203924). - CVE-2022-2980: Fixed NULL pointer dereference in do_mouse() (bsc#1203155). - CVE-2022-3037: Fixed use-after-free (bsc#1202962). gvim-9.0.0814-150000.5.28.1.x86_64.rpm vim-9.0.0814-150000.5.28.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4339 Recommended update for hplip moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of hplip fixes the following issues: - rebuild against the new net-snmp (jsc#SLE-11203). hplip-3.21.10-150400.3.5.1.src.rpm hplip-3.21.10-150400.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4311 Recommended update for open-vm-tools critical SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - Include binaries of open-vm-tools for ARM architecture aarch64 in SUSE Linux Enterprise 15 Service Pack 4 (jsc#SLE-22385) open-vm-tools-12.1.0-150300.21.2.src.rpm open-vm-tools-desktop-12.1.0-150300.21.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4304 Security update for emacs important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for emacs fixes the following issues: - CVE-2022-45939: Fixed shell command injection via source code files when using ctags (bsc#1205822). emacs-27.2-150400.3.3.1.src.rpm emacs-x11-27.2-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4465 Recommended update for motif important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for motif fixes the following issues: - Fix to prevent third party application crash (bsc#1205253) libMrm4-2.3.4-150000.3.8.1.x86_64.rpm libUil4-2.3.4-150000.3.8.1.x86_64.rpm libUil4-32bit-2.3.4-150000.3.8.1.x86_64.rpm libXm4-2.3.4-150000.3.8.1.x86_64.rpm motif-2.3.4-150000.3.8.1.src.rpm motif-2.3.4-150000.3.8.1.x86_64.rpm motif-devel-2.3.4-150000.3.8.1.x86_64.rpm libMrm4-32bit-2.3.4-150000.3.8.1.x86_64.rpm libXm4-32bit-2.3.4-150000.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4478 Security update for capnproto moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for capnproto fixes the following issues: - CVE-2022-46149: Fixed out of bounds read when handling a list of lists (bsc#1205968). capnproto-0.9.1-150400.3.4.1.src.rpm libcapnp-0_9-0.9.1-150400.3.4.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4453 Security update for wireshark important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Update to version 3.6.10: - CVE-2022-3725: OPUS dissector crash (bsc#1204822). - Multiple dissector infinite loops (bsc#1206189). - Kafka dissector memory exhaustion (bsc#1206190). wireshark-3.6.10-150000.3.78.1.src.rpm wireshark-devel-3.6.10-150000.3.78.1.x86_64.rpm wireshark-ui-qt-3.6.10-150000.3.78.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-87 Recommended update for python-cairo moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for python-cairo ships the missing python3-cairo to openSUSE Leap Micro 5.3. python-cairo-1.15.1-150000.3.8.1.src.rpm python-cairo-common-devel-1.15.1-150000.3.8.1.x86_64.rpm python3-cairo-devel-1.15.1-150000.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4462 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 102.6.0 ESR (bsc#1206242): - CVE-2022-46880: Use-after-free in WebGL - CVE-2022-46872: Arbitrary file read from a compromised content process - CVE-2022-46881: Memory corruption in WebGL - CVE-2022-46874: Drag and Dropped Filenames could have been truncated to malicious extensions - CVE-2022-46875: Download Protections were bypassed by .atloc and .ftploc files on Mac OS - CVE-2022-46882: Use-after-free in WebGL - CVE-2022-46878: Memory safety bugs fixed in Firefox 108 and Firefox ESR 102.6 MozillaFirefox-102.6.0-150200.152.70.1.src.rpm MozillaFirefox-102.6.0-150200.152.70.1.x86_64.rpm MozillaFirefox-devel-102.6.0-150200.152.70.1.x86_64.rpm MozillaFirefox-translations-common-102.6.0-150200.152.70.1.x86_64.rpm MozillaFirefox-translations-other-102.6.0-150200.152.70.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4631 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: Updated to version 9.0.1040: - CVE-2022-3491: vim: Heap-based Buffer Overflow prior to 9.0.0742 (bsc#1206028). - CVE-2022-3520: vim: Heap-based Buffer Overflow (bsc#1206071). - CVE-2022-3591: vim: Use After Free (bsc#1206072). - CVE-2022-4292: vim: Use After Free in GitHub repository vim/vim prior to 9.0.0882 (bsc#1206075). - CVE-2022-4293: vim: Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804 (bsc#1206077). - CVE-2022-4141: vim: heap-buffer-overflow in alloc.c 246:11 (bsc#1205797). - CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c (bsc#1204779). gvim-9.0.1040-150000.5.31.1.x86_64.rpm vim-9.0.1040-150000.5.31.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-6 Security update for nautilus moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for nautilus fixes the following issues: - CVE-2022-37290: Fixed a denial of service caused by pasted ZIP archives (bsc#1205418). gnome-shell-search-provider-nautilus-41.5-150400.3.6.1.x86_64.rpm libnautilus-extension1-41.5-150400.3.6.1.x86_64.rpm nautilus-41.5-150400.3.6.1.src.rpm nautilus-41.5-150400.3.6.1.x86_64.rpm nautilus-devel-41.5-150400.3.6.1.x86_64.rpm nautilus-lang-41.5-150400.3.6.1.noarch.rpm typelib-1_0-Nautilus-3_0-41.5-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-4634 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.38.3: - CVE-2022-42856: Fixed a potential arbitrary code execution when processing maliciously crafted web content (bsc#1206474). libjavascriptcoregtk-4_1-0-2.38.3-150400.4.25.1.x86_64.rpm libwebkit2gtk-4_1-0-2.38.3-150400.4.25.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.38.3-150400.4.25.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.38.3-150400.4.25.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.38.3-150400.4.25.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.38.3-150400.4.25.1.x86_64.rpm webkit2gtk3-2.38.3-150400.4.25.1.src.rpm webkit2gtk3-devel-2.38.3-150400.4.25.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-8 Security update for ffmpeg-4 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg-4 fixes the following issues: - CVE-2022-3109: Fixed null pointer dereference in vp3_decode_frame() (bsc#1206442). ffmpeg-4-4.4-150400.3.8.1.src.rpm libavcodec58_134-4.4-150400.3.8.1.x86_64.rpm libavutil56_70-4.4-150400.3.8.1.x86_64.rpm libswresample3_9-4.4-150400.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-7 Security update for ffmpeg moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg fixes the following issues: - CVE-2022-3109: Fixed null pointer dereference in vp3_decode_frame() (bsc#1206442). ffmpeg-3.4.2-150200.11.20.1.src.rpm libavcodec57-3.4.2-150200.11.20.1.x86_64.rpm libavutil-devel-3.4.2-150200.11.20.1.x86_64.rpm libavutil55-3.4.2-150200.11.20.1.x86_64.rpm libpostproc-devel-3.4.2-150200.11.20.1.x86_64.rpm libpostproc54-3.4.2-150200.11.20.1.x86_64.rpm libswresample-devel-3.4.2-150200.11.20.1.x86_64.rpm libswresample2-3.4.2-150200.11.20.1.x86_64.rpm libswscale-devel-3.4.2-150200.11.20.1.x86_64.rpm libswscale4-3.4.2-150200.11.20.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-69 Security update for SDL2 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for SDL2 fixes the following issues: - CVE-2022-4743: Fixed a potential memory leak when creating a texture for an OpenGL ES image (bsc#1206727). SDL2-2.0.8-150200.11.9.1.src.rpm libSDL2-2_0-0-2.0.8-150200.11.9.1.x86_64.rpm libSDL2-devel-2.0.8-150200.11.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-95 Security update for libzypp-plugin-appdata important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libzypp-plugin-appdata fixes the following issues: - CVE-2023-22643: Fixed potential shell injection related to malicious repo names (bsc#1206836). libzypp-plugin-appdata-1.0.1+git.20180426-150400.18.3.1.noarch.rpm libzypp-plugin-appdata-1.0.1+git.20180426-150400.18.3.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-489 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.38.5 (boo#1208328): - CVE-2023-23529: Fixed possible arbitrary code execution via maliciously crafted web content. Update to version 2.38.4 (boo#1207997): - CVE-2023-23517: Fixed web content processing that could have led to arbitrary code execution. - CVE-2023-23518: Fixed web content processing that could have led to arbitrary code execution. - CVE-2022-42826: Fixed a use-after-free issue that was caused by improper memory management. New CVE and bug references where added for already released updates: Update to version 2.38.3 (boo#1206750): - CVE-2022-42852: Fixed disclosure of process memory by improved memory handling. - CVE-2022-42867: Fixed a use after free issue was addressed with improved memory management. - CVE-2022-46692: Fixed bypass of Same Origin Policy through improved state management. - CVE-2022-46698: Fixed disclosure of sensitive user information with improved checks. - CVE-2022-46699: Fixed an arbitrary code execution caused by memory corruption. - CVE-2022-46700: Fixed a potential arbitrary code execution when processing maliciously crafted web content. Update to version 2.38.1: - CVE-2022-46691: Fixed a potential arbitrary code execution when processing maliciously crafted web content. Update to version 2.38.0: - CVE-2022-42863: Fixed a potential arbitrary code execution when processing maliciously crafted web content. libjavascriptcoregtk-4_1-0-2.38.5-150400.4.34.2.x86_64.rpm libwebkit2gtk-4_1-0-2.38.5-150400.4.34.2.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.38.5-150400.4.34.2.x86_64.rpm typelib-1_0-WebKit2-4_1-2.38.5-150400.4.34.2.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.38.5-150400.4.34.2.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.38.5-150400.4.34.2.x86_64.rpm webkit2gtk3-2.38.5-150400.4.34.2.src.rpm webkit2gtk3-devel-2.38.5-150400.4.34.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-113 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Updated to version 102.7.0 ESR (bsc#1207119): - CVE-2022-46871: Updated an out of date library (libusrsctp) which contained several vulnerabilities. - CVE-2023-23598: Fixed an arbitrary file read from GTK drag and drop on Linux. - CVE-2023-23601: Fixed a potential spoofing attack when dragging a URL from a cross-origin iframe into the same tab. - CVE-2023-23602: Fixed a mishandled security check, which caused the Content Security Policy header to be ignored for WebSockets in WebWorkers. - CVE-2022-46877: Fixed a fullscreen notification bypass which could be leveraged in spoofing attacks. - CVE-2023-23603: Fixed a Content Security Policy bypass via format directives. - CVE-2023-23605: Fixed several memory safety bugs. MozillaFirefox-102.7.0-150200.152.73.1.src.rpm MozillaFirefox-102.7.0-150200.152.73.1.x86_64.rpm MozillaFirefox-devel-102.7.0-150200.152.73.1.x86_64.rpm MozillaFirefox-translations-common-102.7.0-150200.152.73.1.x86_64.rpm MozillaFirefox-translations-other-102.7.0-150200.152.73.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-167 Security update for bluez moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for bluez fixes the following issues: - CVE-2022-3563: Fixed a potential crash in the mgmt-tester tool (bsc#1204426). bluez-5.62-150400.4.8.1.src.rpm bluez-devel-5.62-150400.4.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-206 Security update for ffmpeg moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg fixes the following issues: - CVE-2022-3341: Fixed a potential crash when processing a crafted NUT stream (bsc#1206778). - CVE-2019-13390: Fixed a potential crash when processing a crafted AVI stream (bsc#1140754). ffmpeg-3.4.2-150200.11.25.1.src.rpm libavcodec57-3.4.2-150200.11.25.1.x86_64.rpm libavformat57-3.4.2-150200.11.25.1.x86_64.rpm libavresample3-3.4.2-150200.11.25.1.x86_64.rpm libavutil-devel-3.4.2-150200.11.25.1.x86_64.rpm libavutil55-3.4.2-150200.11.25.1.x86_64.rpm libpostproc-devel-3.4.2-150200.11.25.1.x86_64.rpm libpostproc54-3.4.2-150200.11.25.1.x86_64.rpm libswresample-devel-3.4.2-150200.11.25.1.x86_64.rpm libswresample2-3.4.2-150200.11.25.1.x86_64.rpm libswscale-devel-3.4.2-150200.11.25.1.x86_64.rpm libswscale4-3.4.2-150200.11.25.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-792 Recommended update for gnome-shell moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gnome-shell fixes the following issues: - Fix for warning messages not showing in login screen (bsc#1207323) - Fix GNOME graphical session startup issues (bsc#1205518) gnome-extensions-41.9-150400.3.8.1.x86_64.rpm gnome-shell-41.9-150400.3.8.1.src.rpm gnome-shell-41.9-150400.3.8.1.x86_64.rpm gnome-shell-devel-41.9-150400.3.8.1.x86_64.rpm gnome-shell-lang-41.9-150400.3.8.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-172 Security update for ffmpeg-4 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg-4 fixes the following issues: - CVE-2022-3341: Fixed a potential crash when processing a crafted NUT stream (bsc#1206778). ffmpeg-4-4.4-150400.3.11.1.src.rpm libavcodec58_134-4.4-150400.3.11.1.x86_64.rpm libavformat58_76-4.4-150400.3.11.1.x86_64.rpm libavutil56_70-4.4-150400.3.11.1.x86_64.rpm libpostproc55_9-4.4-150400.3.11.1.x86_64.rpm libswresample3_9-4.4-150400.3.11.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-343 Security update for wireshark important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: - Updated to version 3.6.11 (bsc#1207447): - CVE-2023-0417: Fixed a memory leak in the NFS dissector (bsc#1207669). - CVE-2023-0413: Fixed a crash in the dissection engine (bsc#1207665). - CVE-2023-0416: Fixed a crash in the GNW dissector (bsc#1207668). - CVE-2023-0415: Fixed a crash in the iSCSI dissector (bsc#1207667). - CVE-2023-0411: Fixed several issues where an excessive CPU consumption could be triggered in multiple dissectors (bsc#1207663). - CVE-2023-0412: Fixed a crash in the TIPC dissector (bsc#1207664). wireshark-3.6.11-150000.3.83.1.src.rpm wireshark-devel-3.6.11-150000.3.83.1.x86_64.rpm wireshark-ui-qt-3.6.11-150000.3.83.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-211 Security update for vim moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - Updated to version 9.0.1234: - CVE-2023-0433: Fixed an out of bounds memory access that could cause a crash (bsc#1207396). - CVE-2023-0288: Fixed an out of bounds memory access that could cause a crash (bsc#1207162). - CVE-2023-0054: Fixed an out of bounds memory write that could cause a crash or memory corruption (bsc#1206868). - CVE-2023-0051: Fixed an out of bounds memory access that could cause a crash (bsc#1206867). - CVE-2023-0049: Fixed an out of bounds memory access that could cause a crash (bsc#1206866). gvim-9.0.1234-150000.5.34.1.x86_64.rpm vim-9.0.1234-150000.5.34.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-303 Recommended update for sane-backends moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of sane-backends fixes the following issues: - rebuild against the new net-snmp (jsc#SLE-11203). sane-backends-1.0.32-150400.15.2.1.src.rpm sane-backends-1.0.32-150400.15.2.1.x86_64.rpm sane-backends-autoconfig-1.0.32-150400.15.2.1.x86_64.rpm sane-backends-devel-1.0.32-150400.15.2.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2087 This update has recommended fixes for ffmpeg-4 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This updates fixes the following issues for ffmpeg-4: Security fixes: - CVE-2022-48434: Fixed use after free in libavcodec/pthread_frame.c (bsc#1209934). Other fixes: - Add necessary subpackages to the Packagehub. (bsc#1206067) ffmpeg-4-4.4-150400.3.15.1.src.rpm libavcodec58_134-4.4-150400.3.15.1.x86_64.rpm libavformat58_76-4.4-150400.3.15.1.x86_64.rpm libavutil56_70-4.4-150400.3.15.1.x86_64.rpm libpostproc55_9-4.4-150400.3.15.1.x86_64.rpm libswresample3_9-4.4-150400.3.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-428 Security update for ImageMagick important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2022-44267: Fixed a denial of service when parsing a PNG image (bsc#1207982). - CVE-2022-44268: Fixed arbitrary file disclosure when parsing a PNG image (bsc#1207983). ImageMagick-7.1.0.9-150400.6.12.1.src.rpm ImageMagick-7.1.0.9-150400.6.12.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.12.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.12.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.12.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.12.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.12.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.12.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-461 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Updated to version 102.8.0 ESR (bsc#1208144): - CVE-2023-25728: Fixed content security policy leak in violation reports using iframes. - CVE-2023-25730: Fixed screen hijack via browser fullscreen mode. - CVE-2023-25743: Fixed Fullscreen notification not being shown in Firefox Focus. - CVE-2023-0767: Fixed arbitrary memory write via PKCS 12 in NSS. - CVE-2023-25735: Fixed potential use-after-free from compartment mismatch in SpiderMonkey. - CVE-2023-25737: Fixed invalid downcast in SVGUtils::SetupStrokeGeometry. - CVE-2023-25738: Fixed printing on Windows which could potentially crash Firefox with some device drivers. - CVE-2023-25739: Fixed use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext. - CVE-2023-25729: Fixed extensions opening external schemes without user knowledge. - CVE-2023-25732: Fixed out of bounds memory write from EncodeInputStream. - CVE-2023-25734: Fixed opening local .url files that causes unexpected network loads. - CVE-2023-25742: Fixed tab crash by Web Crypto ImportKey. - CVE-2023-25744: Fixed Memory safety bugs. - CVE-2023-25746: Fixed Memory safety bugs. MozillaFirefox-102.8.0-150200.152.78.1.src.rpm MozillaFirefox-102.8.0-150200.152.78.1.x86_64.rpm MozillaFirefox-devel-102.8.0-150200.152.78.1.x86_64.rpm MozillaFirefox-translations-common-102.8.0-150200.152.78.1.x86_64.rpm MozillaFirefox-translations-other-102.8.0-150200.152.78.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1668 Recommended update for firewalld moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for firewalld fixes the following issues: - Fix `firewall-offline-cmd` command failing with error (bsc#1206928) firewall-applet-0.9.3-150400.8.9.1.noarch.rpm firewall-config-0.9.3-150400.8.9.1.noarch.rpm firewalld-0.9.3-150400.8.9.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-512 Security update for libraw moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libraw fixes the following issues: - CVE-2021-32142: Fixed buffer overflow in the LibRaw_buffer_datastream:gets function (bsc#1208470). libraw-0.20.2-150400.3.3.1.src.rpm libraw20-0.20.2-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1742 Recommended update for gdm moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gdm fixes the following issues: - Update gdm-fingerprint.pamd and gdm-smartcard.pamd with correct configuration to make them work (bsc#1205664) - Enable split authentication - Made preparations for first boot setup for a possible implementation in a future release of SUSE Linux Enterprise Desktop (jsc#PED-1719) gdm-41.3-150400.4.6.1.src.rpm gdm-41.3-150400.4.6.1.x86_64.rpm gdm-devel-41.3-150400.4.6.1.x86_64.rpm gdm-lang-41.3-150400.4.6.1.noarch.rpm gdm-schema-41.3-150400.4.6.1.noarch.rpm gdm-systemd-41.3-150400.4.6.1.noarch.rpm gdmflexiserver-41.3-150400.4.6.1.noarch.rpm libgdm1-41.3-150400.4.6.1.x86_64.rpm typelib-1_0-Gdm-1_0-41.3-150400.4.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-598 Security update for emacs important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for emacs fixes the following issues: - CVE-2022-48337: Fixed etags local command injection vulnerability (bsc#1208515). - CVE-2022-48339: Fixed htmlfontify.el command injection vulnerability (bsc#1208512). - CVE-2022-48338: Fixed ruby-mode.el local command injection vulnerability (bsc#1208514). emacs-27.2-150400.3.6.1.src.rpm emacs-x11-27.2-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1686 Security update for libmicrohttpd moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libmicrohttpd fixes the following issues: - CVE-2023-27371: Fixed a parser bug that could be used to crash servers using the MHD_PostProcessor (bsc#1208745). libmicrohttpd-0.9.57-150000.3.3.1.src.rpm libmicrohttpd-devel-0.9.57-150000.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1762 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: - CVE-2023-1161: Fixed crash in ISO 15765 and ISO 10681 dissector (bsc#1208914). Update to 3.6.12: * https://www.wireshark.org/docs/relnotes/wireshark-3.6.12.html wireshark-3.6.12-150000.3.86.1.src.rpm wireshark-devel-3.6.12-150000.3.86.1.x86_64.rpm wireshark-ui-qt-3.6.12-150000.3.86.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1744 Recommended update for patterns-gnome moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for patterns-gnome fixes the following issues: - Add requirement for xorg-x11-fonts to fix gnome-shell starting failure (bsc#1203966) patterns-gnome-20201210-150400.7.3.1.src.rpm patterns-gnome-gnome_basic-20201210-150400.7.3.1.x86_64.rpm patterns-gnome-gnome_basis-20201210-150400.7.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-781 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - CVE-2023-0512: Fixed a divide By Zero (bsc#1207780). - CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957). - CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959). - CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828). Updated to version 9.0 with patch level 1386. - https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386 gvim-9.0.1386-150000.5.37.1.x86_64.rpm vim-9.0.1386-150000.5.37.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-835 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Update to version 102.9.0 ESR (bsc#1209173): - CVE-2023-28159: Fullscreen Notification could have been hidden by download popups on Android - CVE-2023-25748: Fullscreen Notification could have been hidden by window prompts on Android - CVE-2023-25749: Firefox for Android may have opened third-party apps without a prompt - CVE-2023-25750: Potential ServiceWorker cache leak during private browsing mode - CVE-2023-25751: Incorrect code generation during JIT compilation - CVE-2023-28160: Redirect to Web Extension files may have leaked local path - CVE-2023-28164: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation - CVE-2023-28161: One-time permissions granted to a local file were extended to other local files loaded in the same tab - CVE-2023-28162: Invalid downcast in Worklets - CVE-2023-25752: Potential out-of-bounds when accessing throttled streams - CVE-2023-28163: Windows Save As dialog resolved environment variables - CVE-2023-28176: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 - CVE-2023-28177: Memory safety bugs fixed in Firefox 111 MozillaFirefox-102.9.0-150200.152.81.1.src.rpm MozillaFirefox-102.9.0-150200.152.81.1.x86_64.rpm MozillaFirefox-devel-102.9.0-150200.152.81.1.x86_64.rpm MozillaFirefox-translations-common-102.9.0-150200.152.81.1.x86_64.rpm MozillaFirefox-translations-other-102.9.0-150200.152.81.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1813 Recommended update for open-vm-tools low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issue: - Ship missing open-vm-tools-salt-minion package. (bsc#1208880) open-vm-tools-12.1.0-150300.23.5.src.rpm open-vm-tools-desktop-12.1.0-150300.23.5.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1733 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2023-1289: Fixed segmentation fault and possible DoS via specially crafted SVG. (bsc#1209141) ImageMagick-7.1.0.9-150400.6.15.1.src.rpm ImageMagick-7.1.0.9-150400.6.15.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.15.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.15.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.15.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.15.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.15.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.15.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1938 Recommended update for NetworkManager low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for NetworkManager fixes the following issue: - Adds missing NetworkManager and dependencies to Micro 5.3 (bsc#1204549, bsc#1205529) - rp-pppoe: replace deprecated ifconfig dependency with iproute2. (bsc#1194715, jsc#SLE-24004) bluez-5.62-150400.4.10.3.src.rpm bluez-devel-5.62-150400.4.10.3.x86_64.rpm libatm1-2.5.2-150400.14.2.3.x86_64.rpm linux-atm-2.5.2-150400.14.2.3.src.rpm linux-atm-devel-2.5.2-150400.14.2.3.x86_64.rpm newt-0.52.20-150000.7.2.3.src.rpm newt-devel-0.52.20-150000.7.2.3.x86_64.rpm ppp-2.4.7-150000.5.10.3.src.rpm ppp-2.4.7-150000.5.10.3.x86_64.rpm ppp-devel-2.4.7-150000.5.10.3.x86_64.rpm slang-2.3.1a-150000.5.2.3.src.rpm slang-devel-2.3.1a-150000.5.2.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1715 Security update for flatpak important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for flatpak fixes the following issues: - CVE-2023-28101: Fixed misleading terminal output with metadata with ANSI control codes (bsc#1209410). - CVE-2023-28100: Fixed unsandboxed TIOCLINUX commands (bsc#1209411). Update to version 1.12.8: - Update the SELinux module to explicitly permit the system helper have read access to /etc/passwd and systemd-userdbd, read and lock access to /var/lib/flatpak, and watch files inside $libexecdir - If an app update is blocked by parental controls policies, clean up the temporary deploy directory - Fix Autotools build with versions of gpgme that no longer provide gpgme-config(1) - Remove some unreachable code - Add missing handling for some D-Bus errors Update to version 1.12.7: - We now allow networked access to X11 and PulseAudio services if that is configured, and the application has network access. - Absolute paths in WAYLAND_DISPLAY now work - Allow apps that were built with Flatpak 1.13.x to export AppStream metadata in share/metainfo - Most commands now work if /var/lib/flatpak exists but flatpak-1.12.8-150400.3.3.1.src.rpm flatpak-1.12.8-150400.3.3.1.x86_64.rpm flatpak-devel-1.12.8-150400.3.3.1.x86_64.rpm flatpak-zsh-completion-1.12.8-150400.3.3.1.x86_64.rpm libflatpak0-1.12.8-150400.3.3.1.x86_64.rpm system-user-flatpak-1.12.8-150400.3.3.1.x86_64.rpm typelib-1_0-Flatpak-1_0-1.12.8-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1771 Security update for liblouis important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for liblouis fixes the following issues: - CVE-2023-26767: Fixed buffer overflow vulnerability in lou_logFile function (bsc#1209429). - CVE-2023-26769: Fixed buffer Overflow vulnerability in resolveSubtable function (bsc#1209432). liblouis-3.20.0-150400.3.8.1.src.rpm liblouis-data-3.20.0-150400.3.8.1.noarch.rpm liblouis-devel-3.20.0-150400.3.8.1.x86_64.rpm liblouis20-3.20.0-150400.3.8.1.x86_64.rpm python3-louis-3.20.0-150400.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1854 Security update for liblouis important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for liblouis fixes the following issues: - CVE-2023-26768: Fixed buffer overflow in lou_logFile() (bsc#1209431). liblouis-3.20.0-150400.3.13.1.src.rpm liblouis-data-3.20.0-150400.3.13.1.noarch.rpm liblouis-devel-3.20.0-150400.3.13.1.x86_64.rpm liblouis20-3.20.0-150400.3.13.1.x86_64.rpm python3-louis-3.20.0-150400.3.13.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1855 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Firefox Extended Support Release 102.10.0 ESR (bsc#1210212) - CVE-2023-29531: Out-of-bound memory access in WebGL on macOS - CVE-2023-29532: Mozilla Maintenance Service Write-lock bypass - CVE-2023-29533: Fullscreen notification obscured - MFSA-TMP-2023-0001: Double-free in libwebp - CVE-2023-29535: Potential Memory Corruption following Garbage Collector compaction - CVE-2023-29536: Invalid free from JavaScript code - CVE-2023-29539: Content-Disposition filename truncation leads to Reflected File Download - CVE-2023-29541: Files with malicious extensions could have been downloaded unsafely on Linux - CVE-2023-29542: Bypass of file download extension restrictions - CVE-2023-29545: Windows Save As dialog resolved environment variables - CVE-2023-1945: Memory Corruption in Safe Browsing Code - CVE-2023-29548: Incorrect optimization result on ARM64 - CVE-2023-29550: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 MozillaFirefox-102.10.0-150200.152.84.1.src.rpm MozillaFirefox-102.10.0-150200.152.84.1.x86_64.rpm MozillaFirefox-devel-102.10.0-150200.152.84.1.x86_64.rpm MozillaFirefox-translations-common-102.10.0-150200.152.84.1.x86_64.rpm MozillaFirefox-translations-other-102.10.0-150200.152.84.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1994 Security update for avahi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for avahi fixes the following issues: - CVE-2023-1981: Fixed crash in avahi-daemon (bsc#1210328). avahi-0.8-150400.7.3.1.src.rpm avahi-autoipd-0.8-150400.7.3.1.x86_64.rpm avahi-glib2-0.8-150400.7.3.1.src.rpm avahi-utils-gtk-0.8-150400.7.3.1.x86_64.rpm libavahi-gobject-devel-0.8-150400.7.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1931 Security update for wireshark important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: - CVE-2023-1992: Fixed RPCoRDMA dissector crash (bsc#1210405). - CVE-2023-1993: Fixed LISP dissector large loop (bsc#1210404). - CVE-2023-1994: Fixed GQUIC dissector crash (bsc#1210403). Update to 3.6.13: - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.13.html wireshark-3.6.13-150000.3.89.1.src.rpm wireshark-devel-3.6.13-150000.3.89.1.x86_64.rpm wireshark-ui-qt-3.6.13-150000.3.89.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1927 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2023-1906: Fixed a heap-based buffer overflow in ImportMultiSpectralQuantum. (bsc#1210308) ImageMagick-7.1.0.9-150400.6.18.1.src.rpm ImageMagick-7.1.0.9-150400.6.18.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.18.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.18.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.18.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.18.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.18.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.18.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.18.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-1999 Security update for fwupd moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of fwupd fixes the following issues: - rebuild the package with the new secure boot key (bsc#1209188). fwupd-1.5.8-150300.3.7.1.src.rpm fwupdtpmevlog-1.5.8-150300.3.7.1.x86_64.rpm libfwupdplugin1-1.5.8-150300.3.7.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2050 Security update for fwupd moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update of fwupd fixes the following issues: - rebuild the package with the new secure boot key (bsc#1209188). fwupd-1.7.3-150400.3.5.1.src.rpm fwupd-1.7.3-150400.3.5.1.x86_64.rpm fwupd-devel-1.7.3-150400.3.5.1.x86_64.rpm fwupd-lang-1.7.3-150400.3.5.1.noarch.rpm libfwupd2-1.7.3-150400.3.5.1.x86_64.rpm libfwupdplugin5-1.7.3-150400.3.5.1.x86_64.rpm typelib-1_0-Fwupd-2_0-1.7.3-150400.3.5.1.x86_64.rpm typelib-1_0-FwupdPlugin-1_0-1.7.3-150400.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2065 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.38.6 (bsc#1210731): - CVE-2022-0108: Fixed information leak. - CVE-2022-32885: Fixed arbitrary code execution. - CVE-2023-25358: Fixed use-after-free vulnerability in WebCore::RenderLayer. - CVE-2023-27932: Fixed Same Origin Policy bypass. - CVE-2023-27954: Fixed sensitive user information tracking. - CVE-2023-28205: Fixed arbitrary code execution (bsc#1210295). Already fixed in version 2.38.5: - CVE-2022-32886, CVE-2022-32912, CVE-2023-25360, CVE-2023-25361, CVE-2023-25362, CVE-2023-25363. libjavascriptcoregtk-4_1-0-2.38.6-150400.4.39.1.x86_64.rpm libwebkit2gtk-4_1-0-2.38.6-150400.4.39.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.38.6-150400.4.39.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.38.6-150400.4.39.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.38.6-150400.4.39.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.38.6-150400.4.39.1.x86_64.rpm webkit2gtk3-2.38.6-150400.4.39.1.src.rpm webkit2gtk3-devel-2.38.6-150400.4.39.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2437 Recommended update for hplip moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for hplip fixes the following issues: - Fix printer attribute handling which could provoke a buffer overflow if CUPS returned a printer with too large `name/location/uri/etc` (bsc#1209866) hplip-3.21.10-150400.3.8.1.src.rpm hplip-3.21.10-150400.3.8.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2103 Security update for vim moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: Updated to version 9.0 with patch level 1443, fixes the following security problems - CVE-2023-1264: Fixed NULL Pointer Dereference (bsc#1209042). - CVE-2023-1355: Fixed NULL Pointer Dereference (bsc#1209187). - CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828). gvim-9.0.1443-150000.5.40.1.x86_64.rpm vim-9.0.1443-150000.5.40.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2108 Security update for ffmpeg important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg fixes the following issues: - CVE-2022-48434: Fixed use after free in libavcodec/pthread_frame.c (bsc#1209934). ffmpeg-3.4.2-150200.11.28.1.src.rpm libavcodec57-3.4.2-150200.11.28.1.x86_64.rpm libavformat57-3.4.2-150200.11.28.1.x86_64.rpm libavresample3-3.4.2-150200.11.28.1.x86_64.rpm libavutil-devel-3.4.2-150200.11.28.1.x86_64.rpm libavutil55-3.4.2-150200.11.28.1.x86_64.rpm libpostproc-devel-3.4.2-150200.11.28.1.x86_64.rpm libpostproc54-3.4.2-150200.11.28.1.x86_64.rpm libswresample-devel-3.4.2-150200.11.28.1.x86_64.rpm libswresample2-3.4.2-150200.11.28.1.x86_64.rpm libswscale-devel-3.4.2-150200.11.28.1.x86_64.rpm libswscale4-3.4.2-150200.11.28.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2131 Recommended update for openssh important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openssh fixes the following issues: - Remove some patches that cause invalid environment assignments (bsc#1207014). openssh-askpass-gnome-8.4p1-150300.3.18.2.src.rpm openssh-askpass-gnome-8.4p1-150300.3.18.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2194 Security update for libraw low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libraw fixes the following issues: - CVE-2023-1729: Fixed a heap buffer overflow when converting an image (bsc#1210720). libraw-0.20.2-150400.3.6.1.src.rpm libraw20-0.20.2-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2159 Recommended update for open-vm-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - Update to 12.2.0 (bsc#1209128) - Build the containerinfo plugin for TW/SLES15-SP5 and newer.(jsc#PED-1344) open-vm-tools-12.2.0-150300.26.1.src.rpm open-vm-tools-desktop-12.2.0-150300.26.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2149 Recommended update for tigervnc low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for tigervnc fixes the following issues: - Drop chown vnc:vnc calls in with-vnc-key.sh (bsc#1209283) - Add TLSNone to -securitytypes to increase security in xvnc@.service (bsc#1209283) libXvnc-devel-1.10.1-150400.7.8.1.x86_64.rpm tigervnc-1.10.1-150400.7.8.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2341 Recommended update for libsigc++2 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libsigc++2 fixes the following issues: - Remove executable permission for file (bsc#1209094, bsc#1209140) atkmm1_6-2.28.3-150400.4.6.1.src.rpm atkmm1_6-devel-2.28.3-150400.4.6.1.x86_64.rpm libatkmm-1_6-1-2.28.3-150400.4.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2173 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Extended Support Release 102.11.0 ESR (bsc#1211175): - CVE-2023-32205: Browser prompts could have been obscured by popups - CVE-2023-32206: Crash in RLBox Expat driver - CVE-2023-32207: Potential permissions request bypass via clickjacking - CVE-2023-32211: Content process crash due to invalid wasm code - CVE-2023-32212: Potential spoof due to obscured address bar - CVE-2023-32213: Potential memory corruption in FileReader::DoReadData() - CVE-2023-32214: Potential DoS via exposed protocol handlers - CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 MozillaFirefox-102.11.0-150200.152.87.1.src.rpm MozillaFirefox-102.11.0-150200.152.87.1.x86_64.rpm MozillaFirefox-devel-102.11.0-150200.152.87.1.x86_64.rpm MozillaFirefox-translations-common-102.11.0-150200.152.87.1.x86_64.rpm MozillaFirefox-translations-other-102.11.0-150200.152.87.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2223 Security update for libheif moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libheif fixes the following issues: - CVE-2023-29659: Fixed segfault caused by divide-by-zero (bsc#1211174). libheif-1.12.0-150400.3.11.1.src.rpm libheif1-1.12.0-150400.3.11.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2237 Recommended update for vim moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: * Make xxd conflict with the previous vim packages to avoid a file conflict during migration (bsc#1211144) gvim-9.0.1443-150000.5.43.1.x86_64.rpm vim-9.0.1443-150000.5.43.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2284 Security update for texlive important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for texlive fixes the following issues: - CVE-2023-32700: Fixed arbitrary code execution in LuaTeX (bsc#1211389). libkpathsea6-6.3.3-150400.31.3.1.x86_64.rpm libptexenc1-1.3.9-150400.31.3.1.x86_64.rpm libsynctex2-1.21-150400.31.3.1.x86_64.rpm libtexlua53-5-5.3.6-150400.31.3.1.x86_64.rpm libtexluajit2-2.1.0beta3-150400.31.3.1.x86_64.rpm texlive-2021.20210325-150400.31.3.1.src.rpm texlive-2021.20210325-150400.31.3.1.x86_64.rpm texlive-a2ping-bin-2021.20210325.svn27321-150400.31.3.1.x86_64.rpm texlive-accfonts-bin-2021.20210325.svn12688-150400.31.3.1.x86_64.rpm texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.3.1.x86_64.rpm texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-albatross-bin-2021.20210325.svn57089-150400.31.3.1.x86_64.rpm texlive-aleph-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-amstex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-arara-bin-2021.20210325.svn29036-150400.31.3.1.x86_64.rpm texlive-asymptote-bin-2021.20210325.svn57890-150400.31.3.1.x86_64.rpm texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.3.1.x86_64.rpm texlive-authorindex-bin-2021.20210325.svn18790-150400.31.3.1.x86_64.rpm texlive-autosp-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.3.1.x86_64.rpm texlive-biber-bin-2021.20210325.svn57273-150400.31.3.1.noarch.rpm texlive-bibexport-bin-2021.20210325.svn16219-150400.31.3.1.x86_64.rpm texlive-bibtex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-bin-devel-2021.20210325-150400.31.3.1.x86_64.rpm texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.3.1.x86_64.rpm texlive-cachepic-bin-2021.20210325.svn15543-150400.31.3.1.x86_64.rpm texlive-checkcites-bin-2021.20210325.svn25623-150400.31.3.1.x86_64.rpm texlive-checklistings-bin-2021.20210325.svn38300-150400.31.3.1.x86_64.rpm texlive-chklref-bin-2021.20210325.svn52631-150400.31.3.1.x86_64.rpm texlive-chktex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.3.1.x86_64.rpm texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.3.1.x86_64.rpm texlive-cluttex-bin-2021.20210325.svn48871-150400.31.3.1.x86_64.rpm texlive-context-bin-2021.20210325.svn34112-150400.31.3.1.x86_64.rpm texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.3.1.x86_64.rpm texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.3.1.x86_64.rpm texlive-cslatex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-csplain-bin-2021.20210325.svn50528-150400.31.3.1.x86_64.rpm texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.3.1.x86_64.rpm texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.3.1.x86_64.rpm texlive-ctanify-bin-2021.20210325.svn24061-150400.31.3.1.x86_64.rpm texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.3.1.x86_64.rpm texlive-ctie-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-cweb-bin-2021.20210325.svn58136-150400.31.3.1.x86_64.rpm texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.3.1.x86_64.rpm texlive-de-macro-bin-2021.20210325.svn17399-150400.31.3.1.x86_64.rpm texlive-detex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-diadia-bin-2021.20210325.svn37645-150400.31.3.1.noarch.rpm texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.3.1.x86_64.rpm texlive-dtl-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.3.1.x86_64.rpm texlive-dviasm-bin-2021.20210325.svn8329-150400.31.3.1.x86_64.rpm texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.3.1.x86_64.rpm texlive-dviljk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-dvipng-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dvipos-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dvips-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-eplain-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-epspdf-bin-2021.20210325.svn29050-150400.31.3.1.x86_64.rpm texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.3.1.x86_64.rpm texlive-exceltex-bin-2021.20210325.svn25860-150400.31.3.1.x86_64.rpm texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.3.1.x86_64.rpm texlive-findhyph-bin-2021.20210325.svn14758-150400.31.3.1.x86_64.rpm texlive-fontinst-bin-2021.20210325.svn53554-150400.31.3.1.x86_64.rpm texlive-fontools-bin-2021.20210325.svn25997-150400.31.3.1.x86_64.rpm texlive-fontware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-getmap-bin-2021.20210325.svn34971-150400.31.3.1.x86_64.rpm texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.3.1.x86_64.rpm texlive-glossaries-bin-2021.20210325.svn37813-150400.31.3.1.x86_64.rpm texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.3.1.x86_64.rpm texlive-jadetex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.3.1.x86_64.rpm texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.3.1.x86_64.rpm texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.3.1.x86_64.rpm texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-kpathsea-devel-6.3.3-150400.31.3.1.x86_64.rpm texlive-l3build-bin-2021.20210325.svn46894-150400.31.3.1.x86_64.rpm texlive-lacheck-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.3.1.x86_64.rpm texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.3.1.x86_64.rpm texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.3.1.x86_64.rpm texlive-latex2man-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.3.1.x86_64.rpm texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.3.1.x86_64.rpm texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.3.1.x86_64.rpm texlive-latexindent-bin-2021.20210325.svn32150-150400.31.3.1.x86_64.rpm texlive-latexmk-bin-2021.20210325.svn10937-150400.31.3.1.x86_64.rpm texlive-latexpand-bin-2021.20210325.svn27025-150400.31.3.1.x86_64.rpm texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.3.1.x86_64.rpm texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.3.1.x86_64.rpm texlive-listbib-bin-2021.20210325.svn26126-150400.31.3.1.x86_64.rpm texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.3.1.x86_64.rpm texlive-lollipop-bin-2021.20210325.svn41465-150400.31.3.1.x86_64.rpm texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.3.1.x86_64.rpm texlive-ltximg-bin-2021.20210325.svn32346-150400.31.3.1.x86_64.rpm texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-luajittex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.3.1.x86_64.rpm texlive-luatex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-lwarp-bin-2021.20210325.svn43292-150400.31.3.1.x86_64.rpm texlive-m-tx-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-make4ht-bin-2021.20210325.svn37750-150400.31.3.1.x86_64.rpm texlive-makedtx-bin-2021.20210325.svn38769-150400.31.3.1.x86_64.rpm texlive-makeindex-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-match_parens-bin-2021.20210325.svn23500-150400.31.3.1.x86_64.rpm texlive-mathspic-bin-2021.20210325.svn23661-150400.31.3.1.x86_64.rpm texlive-metafont-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-metapost-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-mex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.3.1.x86_64.rpm texlive-mflua-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-mfware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.3.1.x86_64.rpm texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.3.1.x86_64.rpm texlive-mkpic-bin-2021.20210325.svn33688-150400.31.3.1.x86_64.rpm texlive-mltex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.3.1.x86_64.rpm texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.3.1.x86_64.rpm texlive-musixtex-bin-2021.20210325.svn37026-150400.31.3.1.x86_64.rpm texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-omegaware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-optex-bin-2021.20210325.svn53804-150400.31.3.1.x86_64.rpm texlive-patgen-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-pax-bin-2021.20210325.svn10843-150400.31.3.1.x86_64.rpm texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.3.1.x86_64.rpm texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.3.1.x86_64.rpm texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.3.1.x86_64.rpm texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.3.1.x86_64.rpm texlive-pdftex-bin-2021.20210325.svn58535-150400.31.3.1.x86_64.rpm texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.3.1.x86_64.rpm texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.3.1.x86_64.rpm texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.3.1.x86_64.rpm texlive-perltex-bin-2021.20210325.svn16181-150400.31.3.1.x86_64.rpm texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.3.1.x86_64.rpm texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.3.1.x86_64.rpm texlive-pkfix-bin-2021.20210325.svn13364-150400.31.3.1.x86_64.rpm texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-platex-bin-2021.20210325.svn52800-150400.31.3.1.x86_64.rpm texlive-pmx-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.3.1.x86_64.rpm texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.3.1.x86_64.rpm texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.3.1.x86_64.rpm texlive-ptex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.3.1.x86_64.rpm texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.3.1.x86_64.rpm texlive-ptexenc-devel-1.3.9-150400.31.3.1.x86_64.rpm texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.3.1.x86_64.rpm texlive-pythontex-bin-2021.20210325.svn31638-150400.31.3.1.x86_64.rpm texlive-rubik-bin-2021.20210325.svn32919-150400.31.3.1.x86_64.rpm texlive-scripts-bin-2021.20210325.svn55172-150400.31.3.1.x86_64.rpm texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.3.1.x86_64.rpm texlive-seetexk-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-spix-bin-2021.20210325.svn55933-150400.31.3.1.x86_64.rpm texlive-splitindex-bin-2021.20210325.svn29688-150400.31.3.1.x86_64.rpm texlive-srcredact-bin-2021.20210325.svn38710-150400.31.3.1.x86_64.rpm texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.3.1.x86_64.rpm texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-synctex-bin-2021.20210325.svn58136-150400.31.3.1.x86_64.rpm texlive-synctex-devel-1.21-150400.31.3.1.x86_64.rpm texlive-tex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.3.1.x86_64.rpm texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-texcount-bin-2021.20210325.svn13013-150400.31.3.1.x86_64.rpm texlive-texdef-bin-2021.20210325.svn45011-150400.31.3.1.x86_64.rpm texlive-texdiff-bin-2021.20210325.svn15506-150400.31.3.1.x86_64.rpm texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.3.1.x86_64.rpm texlive-texdoc-bin-2021.20210325.svn47948-150400.31.3.1.x86_64.rpm texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.3.1.x86_64.rpm texlive-texfot-bin-2021.20210325.svn33155-150400.31.3.1.x86_64.rpm texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.3.1.x86_64.rpm texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-texlua-devel-5.3.6-150400.31.3.1.x86_64.rpm texlive-texluajit-devel-2.1.0beta3-150400.31.3.1.x86_64.rpm texlive-texosquery-bin-2021.20210325.svn43596-150400.31.3.1.x86_64.rpm texlive-texplate-bin-2021.20210325.svn53444-150400.31.3.1.x86_64.rpm texlive-texsis-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-texware-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.3.1.x86_64.rpm texlive-tie-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.3.1.x86_64.rpm texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.3.1.x86_64.rpm texlive-ulqda-bin-2021.20210325.svn13663-150400.31.3.1.x86_64.rpm texlive-uplatex-bin-2021.20210325.svn52800-150400.31.3.1.x86_64.rpm texlive-uptex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-urlbst-bin-2021.20210325.svn23262-150400.31.3.1.x86_64.rpm texlive-velthuis-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-vlna-bin-2021.20210325.svn50281-150400.31.3.1.x86_64.rpm texlive-vpe-bin-2021.20210325.svn6897-150400.31.3.1.x86_64.rpm texlive-web-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-webquiz-bin-2021.20210325.svn50419-150400.31.3.1.x86_64.rpm texlive-wordcount-bin-2021.20210325.svn46165-150400.31.3.1.x86_64.rpm texlive-xdvi-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.3.1.x86_64.rpm texlive-xetex-bin-2021.20210325.svn58378-150400.31.3.1.x86_64.rpm texlive-xindex-bin-2021.20210325.svn49312-150400.31.3.1.x86_64.rpm texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.3.1.x86_64.rpm texlive-xmltex-bin-2021.20210325.svn3006-150400.31.3.1.x86_64.rpm texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.3.1.x86_64.rpm texlive-yplan-bin-2021.20210325.svn34398-150400.31.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2320 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Updated to version 3.6.14: - CVE-2023-2855: Fixed a crash in the Candump log file parser (boo#1211703). - CVE-2023-2856: Fixed a crash in the VMS TCPIPtrace file parser (boo#1211707). - CVE-2023-2857: Fixed a crash in the BLF file parser (boo#1211705). - CVE-2023-2858: Fixed a crash in the NetScaler file parser (boo#1211706). - CVE-2023-0668: Fixed a crash in the IEEE C37.118 Synchrophasor dissector (boo#1211710). - CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793). Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.14.html wireshark-3.6.14-150000.3.92.1.src.rpm wireshark-devel-3.6.14-150000.3.92.1.x86_64.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2344 Security update for ImageMagick important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2023-34151: Fixed an undefined behavior issue due to floating point truncation (bsc#1211791). - CVE-2023-34153: Fixed a command injection issue when encoding or decoding VIDEO files (bsc#1211792). ImageMagick-7.1.0.9-150400.6.21.1.src.rpm ImageMagick-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2489 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Extended Support Release 102.12.0 ESR (bsc#1211922): - CVE-2023-34414: Click-jacking certificate exceptions through rendering lag - CVE-2023-34416: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 MozillaFirefox-102.12.0-150200.152.90.1.src.rpm MozillaFirefox-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-devel-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-translations-common-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-translations-other-102.12.0-150200.152.90.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2811 Recommended update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt fixes the following issues: This update provides a feature update to the FIDO2 stack. Changes in libfido2: - Version 1.13.0 (2023-02-20) * New API calls: + fido_assert_empty_allow_list; + fido_cred_empty_exclude_list. * fido2-token: fix issue when listing large blobs. - Version 1.12.0 (2022-09-22) * Support for COSE_ES384. * Improved support for FIDO 2.1 authenticators. * New API calls: + es384_pk_free; + es384_pk_from_EC_KEY; + es384_pk_from_EVP_PKEY; + es384_pk_from_ptr; + es384_pk_new; + es384_pk_to_EVP_PKEY; + fido_cbor_info_certs_len; + fido_cbor_info_certs_name_ptr; + fido_cbor_info_certs_value_ptr; + fido_cbor_info_maxrpid_minpinlen; + fido_cbor_info_minpinlen; + fido_cbor_info_new_pin_required; + fido_cbor_info_rk_remaining; + fido_cbor_info_uv_attempts; + fido_cbor_info_uv_modality. * Documentation and reliability fixes. - Version 1.11.0 (2022-05-03) * Experimental PCSC support; enable with -DUSE_PCSC. * Improved OpenSSL 3.0 compatibility. * Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. * winhello: advertise "uv" instead of "clientPin". * winhello: support hmac-secret in fido_dev_get_assert(). * New API calls: + fido_cbor_info_maxlargeblob. * Documentation and reliability fixes. * Separate build and regress targets. - Version 1.10.0 (2022-01-17) * bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. * New API calls: - fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. * Cygwin and NetBSD build fixes. * Documentation and reliability fixes. * Support for TPM 2.0 attestation of COSE_ES256 credentials. - Version 1.9.0 (2021-10-27) * Enabled NFC support on Linux. * Support for FIDO 2.1 "minPinLength" extension. * Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. * Support for TPM 2.0 attestation. * Support for device timeouts; see fido_dev_set_timeout(). * New API calls: - es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY. * Reliability and portability fixes. * Better handling of HID devices without identification strings; gh#381. - Update to version 1.8.0: * Better support for FIDO 2.1 authenticators. * Support for attestation format 'none'. * New API calls: - fido_assert_set_clientdata; - fido_cbor_info_algorithm_cose; - fido_cbor_info_algorithm_count; - fido_cbor_info_algorithm_type; - fido_cbor_info_transports_len; - fido_cbor_info_transports_ptr; - fido_cred_set_clientdata; - fido_cred_set_id; - fido_credman_set_dev_rk; - fido_dev_is_winhello. * fido2-token: new -Sc option to update a resident credential. * Documentation and reliability fixes. * HID access serialisation on Linux. - Update to version 1.7.0: * hid_win: detect devices with vendor or product IDs > 0x7fff * Support for FIDO 2.1 authenticator configuration. * Support for FIDO 2.1 UV token permissions. * Support for FIDO 2.1 "credBlobs" and "largeBlobs" extensions. * New API calls * New fido_init flag to disable fido_dev_open’s U2F fallback * Experimental NFC support on Linux. - Enabled hidapi again, issues related to hidapi are fixed upstream - Update to version 1.6.0: * Documentation and reliability fixes. * New API calls: + fido_cred_authdata_raw_len; + fido_cred_authdata_raw_ptr; + fido_cred_sigcount; + fido_dev_get_uv_retry_count; + fido_dev_supports_credman. * Hardened Windows build. * Native FreeBSD and NetBSD support. * Use CTAP2 canonical CBOR when combining hmac-secret and credProtect. - Create a udev subpackage and ship the udev rule. Changes in python-fido2: - update to 0.9.3: * Don't fail device discovery when hidraw doesn't support HIDIOCGRAWUNIQ * Support the latest Windows webauthn.h API (included in Windows 11). * Add product name and serial number to HidDescriptors. * Remove the need for the uhid-freebsd dependency on FreeBSD. - Update to version 0.9.1 * Add new CTAP error codes and improve handling of unknown codes. * Client: API changes to better support extensions. * Client.make_credential now returns a AuthenticatorAttestationResponse, which holds the AttestationObject and ClientData, as well as any client extension results for the credential. * Client.get_assertion now returns an AssertionSelection object, which is used to select between multiple assertions * Renames: The CTAP1 and CTAP2 classes have been renamed to Ctap1 and Ctap2, respectively. * ClientPin: The ClientPin API has been restructured to support multiple PIN protocols, UV tokens, and token permissions. * CTAP 2.1 PRE: Several new features have been added for CTAP 2.1 * HID: The platform specific HID code has been revamped - Version 0.8.1 (released 2019-11-25) * Bugfix: WindowsClient.make_credential error when resident key requirement is unspecified. - Version 0.8.0 (released 2019-11-25) * New fido2.webauthn classes modeled after the W3C WebAuthn spec introduced. * CTAP2 send_cbor/make_credential/get_assertion and U2fClient request/authenticate timeout arguments replaced with event used to cancel a request. * Fido2Client: - make_credential/get_assertion now take WebAuthn options objects. - timeout is now provided in ms in WebAuthn options objects. Event based cancelation also available by passing an Event. * Fido2Server: - ATTESTATION, USER_VERIFICATION, and AUTHENTICATOR_ATTACHMENT enums have been replaced with fido2.webauthn classes. - RelyingParty has been replaced with PublicKeyCredentialRpEntity, and name is no longer optional. - Options returned by register_begin/authenticate_begin now omit unspecified values if they are optional, instead of filling in default values. - Fido2Server.allowed_algorithms now contains a list of PublicKeyCredentialParameters instead of algorithm identifiers. - Fido2Server.timeout is now in ms and of type int. * Support native WebAuthn API on Windows through WindowsClient. - Version 0.7.2 (released 2019-10-24) * Support for the TPM attestation format. * Allow passing custom challenges to register/authenticate in Fido2Server. * Bugfix: CTAP2 CANCEL command response handling fixed. * Bugfix: Fido2Client fix handling of empty allow_list. * Bugfix: Fix typo in CTAP2.get_assertions() causing it to fail. - Version 0.7.1 (released 2019-09-20) * Enforce canonical CBOR on Authenticator responses by default. * PCSC: Support extended APDUs. * Server: Verify that UP flag is set. * U2FFido2Server: Implement AppID exclusion extension. * U2FFido2Server: Allow custom U2F facet verification. * Bugfix: U2FFido2Server.authenticate_complete now returns the result. - Version 0.7.0 (released 2019-06-17) * Add support for NFC devices using PCSC. * Add support for the hmac-secret Authenticator extension. * Honor max credential ID length and number of credentials to Authenticator. * Add close() method to CTAP devices to explicitly release their resources. - Version 0.6.0 (released 2019-05-10) * Don't fail if CTAP2 Info contains unknown fields. * Replace cbor loads/dumps functions with encode/decode/decode_from. * Server: Add support for AuthenticatorAttachment. * Server: Add support for more key algorithms. * Client: Expose CTAP2 Info object as Fido2Client.info. Changes in yubikey-manager: - Update to version 4.0.9 (released 2022-06-17) * Dependency: Add support for python-fido2 1.x * Fix: Drop stated support for Click 6 as features from 7 are being used. - Update to version 4.0.8 (released 2022-01-31) * Bugfix: Fix error message for invalid modhex when programing a YubiOTP credential. * Bugfix: Fix issue with displaying a Steam credential when it is the only account. * Bugfix: Prevent installation of files in site-packages root. * Bugfix: Fix cleanup logic in PIV for protected management key. * Add support for token identifier when programming slot-based HOTP. * Add support for programming NDEF in text mode. * Dependency: Add support for Cryptography ⇐ 38. - version update to 4.0.7 ** Bugfix release: Fix broken naming for "YubiKey 4", and a small OATH issue with touch Steam credentials. - version 4.0.6 (released 2021-09-08) ** Improve handling of YubiKey device reboots. ** More consistently mask PIN/password input in prompts. ** Support switching mode over CCID for YubiKey Edge. ** Run pkill from PATH instead of fixed location. - version 4.0.5 (released 2021-07-16) ** Bugfix: Fix PIV feature detection for some YubiKey NEO versions. ** Bugfix: Fix argument short form for --period when adding TOTP credentials. ** Bugfix: More strict validation for some arguments, resulting in better error messages. ** Bugfix: Correctly handle TOTP credentials using period != 30 AND touch_required. ** Bugfix: Fix prompting for access code in the otp settings command (now uses "-A -"). - Update to version 4.0.3 * Add support for fido reset over NFC. * Bugfix: The --touch argument to piv change-management-key was ignored. * Bugfix: Don’t prompt for password when importing PIV key/cert if file is invalid. * Bugfix: Fix setting touch-eject/auto-eject for YubiKey 4 and NEO. * Bugfix: Detect PKCS#12 format when outer sequence uses indefinite length. * Dependency: Add support for Click 8. - Update to version 4.0.2 * Update device names * Add read_info output to the --diagnose command, and show exception types. * Bugfix: Fix read_info for YubiKey Plus. * Add support for YK5-based FIPS YubiKeys. * Bugfix: Fix OTP device enumeration on Win32. * Drop reliance on libusb and libykpersonalize. * Support the "fido" and "otp" subcommands over NFC * New "ykman --diagnose" command to aid in troubleshooting. * New "ykman apdu" command for sending raw APDUs over the smart card interface. * New "yubikit" package added for custom development and advanced scripting. * OpenPGP: Add support for KDF enabled YubiKeys. * Static password: Add support for FR, IT, UK and BEPO keyboard layouts. - Update to 3.1.1 * Add support for YubiKey 5C NFC * OpenPGP: set-touch now performs compatibility checks before prompting for PIN * OpenPGP: Improve error messages and documentation for set-touch * PIV: read-object command no longer adds a trailing newline * CLI: Hint at missing permissions when opening a device fails * Linux: Improve error handling when pcscd is not running * Windows: Improve how .DLL files are loaded, thanks to Marius Gabriel Mihai for reporting this! * Bugfix: set-touch now accepts the cached-fixed option * Bugfix: Fix crash in OtpController.prepare_upload_key() error parsing * Bugfix: Fix crash in piv info command when a certificate slot contains an invalid certificate * Library: PivController.read_certificate(slot) now wraps certificate parsing exceptions in new exception type InvalidCertificate * Library: PivController.list_certificates() now returns None for slots containing invalid certificate, instead of raising an exception - Version 3.1.0 (released 2019-08-20) * Add support for YubiKey 5Ci * OpenPGP: the info command now prints OpenPGP specification version as well * OpenPGP: Update support for attestation to match OpenPGP v3.4 * PIV: Use UTC time for self-signed certificates * OTP: Static password now supports the Norman keyboard layout - Version 3.0.0 (released 2019-06-24) * Add support for new YubiKey Preview and lightning form factor * FIDO: Support for credential management * OpenPGP: Support for OpenPGP attestation, cardholder certificates and cached touch policies * OTP: Add flag for using numeric keypad when sending digits - Version 2.1.1 (released 2019-05-28) * OTP: Add initial support for uploading Yubico OTP credentials to YubiCloud * Don’t automatically select the U2F applet on YubiKey NEO, it might be blocked by the OS * ChalResp: Always pad challenge correctly * Bugfix: Don’t crash with older versions of cryptography * Bugfix: Password was always prompted in OATH command, even if sent as argument Changes in yubikey-manager-qt: - update to 1.2.5: * Compatibility update for ykman 5.0.1. * Update to Python 3.11. * Update product images. - Update to version 1.2.4 (released 2021-10-26) * Update device names and images. * PIV: Fix import of certificate. - Update to version 1.2.3 * Improved error handling when using Security Key Series devices. * PIV: Fix generation of certificate in slot 9c. - Update to version 1.2.2 * Fix detection of YubiKey Plus * Compatibility update for yubikey-manager 4.0 * Bugfix: Device caching with multiple devices * Drop dependencies on libusb and libykpers. * Add additional product names and images - update to 1.1.5 * Add support for YubiKey 5C NFC - Update to version 1.1.4 * OTP: Add option to upload YubiOTP credential to YubiCloud * Linux: Show hint about pcscd service if opening device fails * Bugfix: Signal handling now compatible with Python 3.8 - Version 1.1.3 (released 2019-08-20) * Add suppport for YubiKey 5Ci * PIV: Use UTC time for self-signed certificates - Version 1.1.2 (released 2019-06-24) * Add support for new YubiKey Preview * PIV: The popup for the management key now have a "Use default" option * Windows: Fix issue with importing PIV certificates * Bugfix: generate static password now works correctly yubikey-manager-qt-1.2.5-150400.9.3.1.src.rpm yubikey-manager-qt-1.2.5-150400.9.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2640 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - CVE-2023-2426: Fixed out-of-range pointer offset (bsc#1210996). - CVE-2023-2609: Fixed NULL pointer dereference (bsc#1211256). - CVE-2023-2610: Fixed integer overflow or wraparound (bsc#1211257). gvim-9.0.1572-150000.5.46.1.x86_64.rpm vim-9.0.1572-150000.5.46.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2647 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Add security patches (bsc#1211846): - CVE-2023-28204: Fixed processing of web content that may disclose sensitive information (bsc#1211659). - CVE-2023-32373: Fixed processing of maliciously crafted web content that may lead to arbitrary code execution (bsc#1211658). libjavascriptcoregtk-4_1-0-2.38.6-150400.4.42.4.x86_64.rpm libwebkit2gtk-4_1-0-2.38.6-150400.4.42.4.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.38.6-150400.4.42.4.x86_64.rpm typelib-1_0-WebKit2-4_1-2.38.6-150400.4.42.4.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.38.6-150400.4.42.4.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.38.6-150400.4.42.4.x86_64.rpm webkit2gtk3-2.38.6-150400.4.42.4.src.rpm webkit2gtk3-devel-2.38.6-150400.4.42.4.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2942 Recommended update for gtk3 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gtk3 fixes the following issues: - Fix nautilus crash after entering wrong SMB password (bsc#1211952) gtk3-devel-doc-3.24.34-150400.3.6.1.x86_64.rpm gtk3-doc-3.24.34-150400.3.6.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2604 Security update for open-vm-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143). Bug fixes: - Fixed build problem with grpc 1.54 (bsc#1210695). open-vm-tools-12.2.0-150300.29.1.src.rpm open-vm-tools-desktop-12.2.0-150300.29.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2976 Recommended update for gdm moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gdm fixes the following issues: - Update /var/log/btmp after failed login (bsc#1211825) gdm-41.3-150400.4.9.1.src.rpm gdm-41.3-150400.4.9.1.x86_64.rpm gdm-devel-41.3-150400.4.9.1.x86_64.rpm gdm-lang-41.3-150400.4.9.1.noarch.rpm gdm-schema-41.3-150400.4.9.1.noarch.rpm gdm-systemd-41.3-150400.4.9.1.noarch.rpm gdmflexiserver-41.3-150400.4.9.1.noarch.rpm libgdm1-41.3-150400.4.9.1.x86_64.rpm typelib-1_0-Gdm-1_0-41.3-150400.4.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2605 Security update for bluez important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for bluez fixes the following issues: - CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398). bluez-5.62-150400.4.13.1.src.rpm bluez-devel-5.62-150400.4.13.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2550 Recommended update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings ships the update stack to the INSTALLER self-update channel. yast2-pkg-bindings: - Added a new option for rebuilding the RPM database (--rebuilddb) (bsc#1209565) autoyast2: - Selected products are not installed after resetting the package manager internally (bsc#1202234) libyui: - Prevent buffer overflow when drawing very wide labels in ncurses (bsc#1211354) - Fixed loading icons from an absolute path (bsc#1210591) - Fix for main window stacking order to avoid unintentional transparency (bsc#1199020, bsc#1191112) - Force messages from .ui file through our translation mechanism (bsc#1198097) libyui-qt-pkg-4.3.7-150400.3.3.1.src.rpm True libyui-qt-pkg-devel-4.3.7-150400.3.3.1.x86_64.rpm True libyui-qt-pkg16-4.3.7-150400.3.3.1.x86_64.rpm True SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3252 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Update to Wireshark 3.6.15: - Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.15.html Security fixes: - CVE-2023-0667: Fixed failure to validate MS-MMS packet length (bsc#1212084). - CVE-2023-0668: Fixed IEEE C37.118 Synchrophasor dissector crash (bsc#1211710). - CVE-2023-2855: Fixed Candump log file parser crash (bsc#1211703). - CVE-2023-2856: Fixed VMS TCPIPtrace file parser crash (bsc#1211707). - CVE-2023-2857: Fixed BLF file parser crash (bsc#1211705). - CVE-2023-2858: Fixed NetScaler file parser crash (bsc#1211706). - CVE-2023-2879: Fixed GDSDB dissector infinite loop (bsc#1211793). - CVE-2023-2952: Fixed XRA dissector infinite loop (bsc#1211844). - CVE-2023-3648: Fixed Kafka dissector crash (bsc#1213319). wireshark-3.6.15-150000.3.97.1.src.rpm wireshark-devel-3.6.15-150000.3.97.1.x86_64.rpm wireshark-ui-qt-3.6.15-150000.3.97.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2878 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2023-34474: Fixed heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c (bsc#1212237). ImageMagick-7.1.0.9-150400.6.24.1.src.rpm ImageMagick-7.1.0.9-150400.6.24.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.24.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.24.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.24.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.24.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.24.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.24.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.24.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3468 Recommended update for python3 low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for python3 fixes the following issue: - Rename sources in preparation of python3.11 (jsc#PED-68) python3-pysmbc-1.0.23-150400.6.69.src.rpm python3-pysmbc-1.0.23-150400.6.69.x86_64.rpm python3-qt5-5.15.6-150400.5.54.src.rpm python3-qt5-5.15.6-150400.5.54.x86_64.rpm python3-qt5-5.15.6-150400.5.67.src.rpm python3-qt5-devel-5.15.6-150400.5.54.x86_64.rpm python3-qt5-sip-12.9.0-150400.5.69.src.rpm python3-qt5-sip-12.9.0-150400.5.69.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2903 Recommended update for xdg-desktop-portal important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for xdg-desktop-portal fixes the following issues: - Add patch from upstream to avoid making a synchronous call which can cause a deadlock in a non-GNOME, non-XFCE environment. This fixes a delay of ~20 seconds when starting gnome-terminal on a non-gnome desktop (bsc#1212037) - Add (rebased) patch from upstream to avoid creating portals with non-functional backends xdg-desktop-portal-1.10.1-150400.3.3.1.src.rpm xdg-desktop-portal-1.10.1-150400.3.3.1.x86_64.rpm xdg-desktop-portal-devel-1.10.1-150400.3.3.1.x86_64.rpm xdg-desktop-portal-lang-1.10.1-150400.3.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2886 Security update for MozillaFirefox, MozillaFirefox-branding-SLE important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox, MozillaFirefox-branding-SLE fixes the following issues: Changes in MozillaFirefox and MozillaFirefox-branding-SLE: This update provides Firefox Extended Support Release 115.0 ESR * New: - Required fields are now highlighted in PDF forms. - Improved performance on high-refresh rate monitors (120Hz+). - Buttons in the Tabs toolbar can now be reached with Tab, Shift+Tab, and Arrow keys. View this article for additional details. - Windows' "Make text bigger" accessibility setting now affects all the UI and content pages, rather than only applying to system font sizes. - Non-breaking spaces are now preserved—preventing automatic line breaks—when copying text from a form control. - Fixed WebGL performance issues on NVIDIA binary drivers via DMA-Buf on Linux. - Fixed an issue in which Firefox startup could be significantly slowed down by the processing of Web content local storage. This had the greatest impact on users with platter hard drives and significant local storage. - Removed a configuration option to allow SHA-1 signatures in certificates: SHA-1 signatures in certificates—long since determined to no longer be secure enough—are now not supported. - Highlight color is preserved correctly after typing `Enter` in the mail composer of Yahoo Mail and Outlook. After bypassing the https only error page navigating back would take you to the error page that was previously dismissed. Back now takes you to the previous site that was visited. - Paste unformatted shortcut (shift+ctrl/cmd+v) now works in plain text contexts, such as input and text area. - Added an option to print only the current page from the print preview dialog. - Swipe to navigate (two fingers on a touchpad swiped left or right to perform history back or forward) on Windows is now enabled. - Stability on Windows is significantly improved as Firefox handles low-memory situations much better. - Touchpad scrolling on macOS was made more accessible by reducing unintended diagonal scrolling opposite of the intended scroll axis. - Firefox is less likely to run out of memory on Linux and performs more efficiently for the rest of the system when memory runs low. - It is now possible to edit PDFs: including writing text, drawing, and adding signatures. - Setting Firefox as your default browser now also makes it the default PDF application on Windows systems. - Swipe-to-navigate (two fingers on a touchpad swiped left or right to perform history back or forward) now works for Linux users on Wayland. - Text Recognition in images allows users on macOS 10.15 and higher to extract text from the selected image (such as a meme or screenshot). - Firefox View helps you get back to content you previously discovered. A pinned tab allows you to find and open recently closed tabs on your current device and access tabs from other devices (via our “Tab Pickup” feature). - Import maps, which allow web pages to control the behavior of JavaScript imports, are now enabled by default. - Processes used for background tabs now use efficiency mode on Windows 11 to limit resource use. - The shift+esc keyboard shortcut now opens the Process Manager, offering a way to quickly identify processes that are using too many resources. - Firefox now supports properly color correcting images tagged with ICCv4 profiles. - Support for non-English characters when saving and printing PDF forms. - The bookmarks toolbar's default "Only show on New Tab" state works correctly for blank new tabs. As before, you can change the bookmark toolbar's behavior using the toolbar context menu. - Manifest Version 3 (MV3) extension support is now enabled by default (MV2 remains enabled/supported). This major update also ushers an exciting user interface change in the form of the new extensions button. - The Arbitrary Code Guard exploit protection has been enabled in the media playback utility processes, improving security for Windows users. - The native HTML date picker for date and datetime inputs can now be used with a keyboard alone, improving its accessibility for screen reader users. Users with limited mobility can also now use common keyboard shortcuts to navigate the calendar grid and month selection spinners. - Firefox builds in the Spanish from Spain (es-ES) and Spanish from Argentina (es-AR) locales now come with a built- in dictionary for the Firefox spellchecker. - On macOS, Ctrl or Cmd + trackpad or mouse wheel now scrolls the page instead of zooming. This avoids accidental zooming and matches the behavior of other web browsers on macOS. - It's now possible to import bookmarks, history and passwords not only from Edge, Chrome or Safari but also from Opera, Opera GX, and Vivaldi. - GPU sandboxing has been enabled on Windows. - On Windows, third-party modules can now be blocked from injecting themselves into Firefox, which can be helpful if they are causing crashes or other undesirable behavior. - Date, time, and datetime-local input fields can now be cleared with `Cmd+Backspace` and `Cmd+Delete` shortcut on macOS and `Ctrl+Backspace` and `Ctrl+Delete` on Windows and Linux. - GPU-accelerated Canvas2D is enabled by default on macOS and Linux. - WebGL performance improvement on Windows, MacOS and Linux. - Enables overlay of hardware-decoded video with non-Intel GPUs on Windows 10/11, improving video playback performance and video scaling quality. - Windows native notifications are now enabled. - Firefox Relay users can now opt-in to create Relay email masks directly from the Firefox credential manager. You must be signed in with your Firefox Account. - We’ve added two new locales: Silhe Friulian (fur) and Sardinian (sc). - Right-clicking on password fields now shows an option to reveal the password. - Private windows and ETP set to strict will now include email tracking protection. This will make it harder for email trackers to learn the browsing habits of Firefox users. You can check the Tracking Content in the sub-panel on the shield icon panel. - The deprecated U2F Javascript API is now disabled by default. The U2F protocol remains usable through the WebAuthn API. The U2F API can be re-enabled using the `security.webauth.u2f` preference. - Say hello to enhanced Picture-in-Picture! Rewind, check video duration, and effortlessly switch to full-screen mode on the web's most popular video websites. - Firefox's address bar is already a great place to search for what you're looking for. Now you'll always be able to see your web search terms and refine them while viewing your search's results - no additional scrolling needed! Also, a new result menu has been added making it easier to remove history results and dismiss sponsored Firefox Suggest entries. - Private windows now protect users even better by blocking third-party cookies and storage of content trackers. - Passwords automatically generated by Firefox now include special characters, giving users more secure passwords by default. - Firefox 115 introduces a redesigned accessibility engine which significantly improves the speed, responsiveness, and stability of Firefox when used with: - Screen readers, as well as certain other accessibility software; - East Asian input methods; - Enterprise single sign-on software; and - Other applications which use accessibility frameworks to access information. - Firefox 115 now supports AV1 Image Format files containing animations (AVIS), improving support for AVIF images across the web. - The Windows GPU sandbox first shipped in the Firefox 110 release has been tightened to enhance the security benefits it provides. - A 13-year-old feature request was fulfilled and Firefox now supports files being drag-and-dropped directly from Microsoft Outlook. A special thanks to volunteer contributor Marco Spiess for helping to get this across the finish line! - Users on macOS can now access the Services sub-menu directly from Firefox context menus. - On Windows, the elastic overscroll effect has been enabled by default. When two-finger scrolling on the touchpad or scrolling on the touchscreen, you will now see a bouncing animation when scrolling past the edge of a scroll container. - Firefox is now available in the Tajik (tg) language. - Added UI to manage the DNS over HTTPS exception list. - Bookmarks can now be searched from the Bookmarks menu. The Bookmarks menu is accessible by adding the Bookmarks menu button to the toolbar. - Restrict searches to your local browsing history by selecting Search history from the History, Library or Application menu buttons. - Mac users can now capture video from their cameras in all supported native resolutions. This enables resolutions higher than 1280x720. - It is now possible to reorder the extensions listed in the extensions panel. - Users on macOS, Linux, and Windows 7 can now use FIDO2 / WebAuthn authenticators over USB. Some advanced features, such as fully passwordless logins, require a PIN to be set on the authenticator. - Pocket Recommended content can now be seen in France, Italy, and Spain. - DNS over HTTPS settings are now part of the Privacy & Security section of the Settings page and allow the user to choose from all the supported modes. - Migrating from another browser? Now you can bring over payment methods you've saved in Chrome-based browsers to Firefox. - Hardware video decoding enabled for Intel GPUs on Linux. - The Tab Manager dropdown now features close buttons, so you can close tabs more quickly. - Windows Magnifier now follows the text cursor correctly when the Firefox title bar is visible. - Undo and redo are now available in Password fields. [1]:https://support.mozilla.org/kb/access-toolbar-functions- using-keyboard?_gl=1*16it7nj*_ga*MTEzNjg4MjY5NC4xNjQ1MjAxMDU3 *_ga_MQ7767QQQW*MTY1Njk2MzExMS43LjEuMTY1Njk2MzIzMy4w [2]:https://support.mozilla.org/kb/how-set-tab-pickup-firefox-view [3]:https://support.mozilla.org/kb/task-manager-tabs-or-extensions-are-slowing-firefox [4]:https://blog.mozilla.org/addons/2022/11/17/manifest-v3-signing-available-november-21-on-firefox-nightly/ [5]:https://blog.mozilla.org/addons/2022/05/18/manifest-v3-in-firefox-recap-next-steps/ [6]:https://support.mozilla.org/kb/unified-extensions [7]:https://support.mozilla.org/kb/import-data-another-browser [8]:https://support.mozilla.org/kb/identify-problems-third-party-modules-firefox-windows [9]:https://support.mozilla.org/kb/how-generate-secure-password-firefox [10]:https://blog.mozilla.org/accessibility/firefox-113-accessibility-performance/ * Fixed: Various security fixes. MFSA 2023-22 (bsc#1212438) * CVE-2023-3482 (bmo#1839464) Block all cookies bypass for localstorage * CVE-2023-37201 (bmo#1826002) Use-after-free in WebRTC certificate generation * CVE-2023-37202 (bmo#1834711) Potential use-after-free from compartment mismatch in SpiderMonkey * CVE-2023-37203 (bmo#291640) Drag and Drop API may provide access to local system files * CVE-2023-37204 (bmo#1832195) Fullscreen notification obscured via option element * CVE-2023-37205 (bmo#1704420) URL spoofing in address bar using RTL characters * CVE-2023-37206 (bmo#1813299) Insufficient validation of symlinks in the FileSystem API * CVE-2023-37207 (bmo#1816287) Fullscreen notification obscured * CVE-2023-37208 (bmo#1837675) Lack of warning when opening Diagcab files * CVE-2023-37209 (bmo#1837993) Use-after-free in `NotifyOnHistoryReload` * CVE-2023-37210 (bmo#1821886) Full-screen mode exit prevention * CVE-2023-37211 (bmo#1832306, bmo#1834862, bmo#1835886, bmo#1836550, bmo#1837450) Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and Thunderbird 102.13 * CVE-2023-37212 (bmo#1750870, bmo#1825552, bmo#1826206, bmo#1827076, bmo#1828690, bmo#1833503, bmo#1835710, bmo#1838587) Memory safety bugs fixed in Firefox 115 - Fixed potential SIGILL on older CPUs (bsc#1212101) * Fixed: Various security fixes and other quality MozillaFirefox-115.0-150200.152.93.1.src.rpm MozillaFirefox-115.0-150200.152.93.1.x86_64.rpm MozillaFirefox-branding-SLE-115-150200.9.13.1.src.rpm MozillaFirefox-branding-SLE-115-150200.9.13.1.x86_64.rpm MozillaFirefox-devel-115.0-150200.152.93.1.noarch.rpm MozillaFirefox-translations-common-115.0-150200.152.93.1.x86_64.rpm MozillaFirefox-translations-other-115.0-150200.152.93.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3148 Recommended update for firewalld moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for firewalld fixes the following issues: - Firewalld does not accept IPv4 network mask in full form (bsc#1212974) firewall-applet-0.9.3-150400.8.12.1.noarch.rpm firewall-config-0.9.3-150400.8.12.1.noarch.rpm firewalld-0.9.3-150400.8.12.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2958 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox was updated to version 115.0.2 ESR (bsc#1213230): - CVE-2023-3600: Fixed Use-after-free in workers (bmo#1839703). Bugfixes: - Fixed a startup crash experienced by some Windows users by blocking instances of a malicious injected DLL (bmo#1841751). - Fixed a bug with displaying a caret in the text editor on some websites (bmo#1840804). - Fixed a bug with broken audio rendering on some websites (bmo#1841982). - Fixed a bug with patternTransform translate using the wrong units (bmo#1840746). - Fixed a crash affecting Windows 7 users related to the DLL blocklist. - Fixed a startup crash for Windows users with Kingsoft Antivirus software installed (bmo#1837242). MozillaFirefox-115.0.2-150200.152.96.1.src.rpm MozillaFirefox-115.0.2-150200.152.96.1.x86_64.rpm MozillaFirefox-devel-115.0.2-150200.152.96.1.noarch.rpm MozillaFirefox-translations-common-115.0.2-150200.152.96.1.x86_64.rpm MozillaFirefox-translations-other-115.0.2-150200.152.96.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2945 Security update for openssh important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openssh fixes the following issues: - CVE-2023-38408: Fixed a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if those libraries were present on the victim's system and if the agent was forwarded to an attacker-controlled system. [bsc#1213504, CVE-2023-38408] - Close the right filedescriptor and also close fdh in read_hmac to avoid file descriptor leaks. [bsc#1209536] - Attempts to mitigate instances of secrets lingering in memory after a session exits. [bsc#1186673, bsc#1213004, bsc#1213008] openssh-askpass-gnome-8.4p1-150300.3.22.1.src.rpm openssh-askpass-gnome-8.4p1-150300.3.22.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2981 Security update for libqt5-qtsvg moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libqt5-qtsvg fixes the following issues: - CVE-2021-45930: Fixed an out-of-bounds write that may have lead to a denial-of-service (bsc#1196654). - CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm variable (bsc#1211298). libqt5-qtsvg-5.15.2+kde16-150400.3.3.1.src.rpm libqt5-qtsvg-private-headers-devel-5.15.2+kde16-150400.3.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-2982 Security update for libqt5-qtbase important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libqt5-qtbase fixes the following issues: - CVE-2023-24607: Fixed Qt SQL ODBC driver plugin DOS (bsc#1209616). - CVE-2023-32762: Fixed Qt Network incorrectly parses the strict-transport-security (HSTS) header (bsc#1211797). - CVE-2023-32763: Fixed buffer overflow when rendering an SVG file with an image inside it (bsc#1211798). - CVE-2023-33285: Fixed buffer overflow in QDnsLookup (bsc#1211642). - CVE-2023-34410: Fixed certificate validation does not always consider whether the root of a chain is a configured CA certificate (bsc#1211994). - CVE-2023-38197: Fixed infinite loops in QXmlStreamReader(bsc#1213326). libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.6.1.x86_64.rpm libQt5Sql5-mysql-5.15.2+kde294-150400.6.6.1.x86_64.rpm libQt5Sql5-postgresql-5.15.2+kde294-150400.6.6.1.x86_64.rpm libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.6.1.x86_64.rpm libqt5-qtbase-5.15.2+kde294-150400.6.6.1.src.rpm libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3021 Security update for librsvg important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for librsvg fixes the following issues: librsvg was updated to version 2.52.10: - CVE-2023-38633: Fixed directory traversal in URI decoder (bsc#1213502). librsvg-2.52.10-150400.3.6.1.src.rpm librsvg-devel-2.52.10-150400.3.6.1.x86_64.rpm typelib-1_0-Rsvg-2_0-2.52.10-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3162 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following security issues: Firefox was updated to Extended Support Release 115.1.0 ESR (bsc#1213746): - CVE-2023-4045: Fixed cross-origin restrictions bypass with Offscreen Canvas (bmo#1833876). - CVE-2023-4046: Fixed incorrect value used during WASM compilation (bmo#1837686). - CVE-2023-4047: Fixed potential permissions request bypass via clickjacking (bmo#1839073). - CVE-2023-4048: Fixed crash in DOMParser due to out-of-memory conditions (bmo#1841368). - CVE-2023-4049: Fixed potential race conditions when releasing platform objects (bmo#1842658). - CVE-2023-4050: Fixed stack buffer overflow in StorageManager (bmo#1843038). - CVE-2023-4052: Fixed file deletion and privilege escalation through Firefox uninstaller (bmo#1824420). - CVE-2023-4054: Fixed lack of warning when opening appref-ms files (bmo#1840777). - CVE-2023-4055: Fixed cookie jar overflow caused unexpected cookie jar state (bmo#1782561). - CVE-2023-4056: Fixed memory safety bugs (bmo#1820587, bmo#1824634, bmo#1839235, bmo#1842325, bmo#1843847). - CVE-2023-4057: Fixed memory safety bugs (bmo#1841682). Bugfixes: - Remove bashisms from startup-script (bsc#1213657) MozillaFirefox-115.1.0-150200.152.99.1.src.rpm MozillaFirefox-115.1.0-150200.152.99.1.x86_64.rpm MozillaFirefox-devel-115.1.0-150200.152.99.1.noarch.rpm MozillaFirefox-translations-common-115.1.0-150200.152.99.1.x86_64.rpm MozillaFirefox-translations-other-115.1.0-150200.152.99.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3256 Security update for pipewire moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for pipewire fixes the following security issues: - Fixed issue where an app which only has permission to access one stream can also access other streams (bsc#1213682). Bugfixes: - Fixed division by 0 and other issues with invalid values (glfo#pipewire/pipewire#2953) - Fixed an overflow resulting in choppy sound in some cases (glfo#pipewire/pipewire#2680) gstreamer-plugin-pipewire-0.3.49-150400.3.3.1.x86_64.rpm libpipewire-0_3-0-0.3.49-150400.3.3.1.x86_64.rpm pipewire-0.3.49-150400.3.3.1.src.rpm pipewire-0.3.49-150400.3.3.1.x86_64.rpm pipewire-lang-0.3.49-150400.3.3.1.noarch.rpm pipewire-modules-0_3-0.3.49-150400.3.3.1.x86_64.rpm pipewire-spa-plugins-0_2-0.3.49-150400.3.3.1.x86_64.rpm pipewire-spa-tools-0.3.49-150400.3.3.1.x86_64.rpm pipewire-tools-0.3.49-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3611 Recommended update for sysuser-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for sysuser-tools fixes the following issues: - Update to version 3.2 - Always create a system group of the same name as the system user (bsc#1205161, bsc#1207778, bsc#1213240) - Add "quilt setup" friendly hint to %sysusers_requires usage - Use append so if a pre file already exists it isn't overridden - Invoke bash for bash scripts (bsc#1195391) - Remove all systemd requires not supported on SLE15 (bsc#1214140) brltty-6.4-150400.4.3.3.src.rpm brltty-6.4-150400.4.3.3.x86_64.rpm brltty-driver-at-spi2-6.4-150400.4.3.3.x86_64.rpm brltty-driver-brlapi-6.4-150400.4.3.3.x86_64.rpm brltty-driver-speech-dispatcher-6.4-150400.4.3.3.x86_64.rpm brltty-lang-6.4-150400.4.3.3.noarch.rpm pulseaudio-15.0-150400.4.2.2.src.rpm pulseaudio-15.0-150400.4.2.2.x86_64.rpm pulseaudio-bash-completion-15.0-150400.4.2.2.x86_64.rpm pulseaudio-gdm-hooks-15.0-150400.4.2.2.x86_64.rpm pulseaudio-lang-15.0-150400.4.2.2.noarch.rpm pulseaudio-module-gsettings-15.0-150400.4.2.2.x86_64.rpm pulseaudio-module-x11-15.0-150400.4.2.2.x86_64.rpm pulseaudio-module-zeroconf-15.0-150400.4.2.2.x86_64.rpm pulseaudio-setup-15.0-150400.4.2.2.x86_64.rpm pulseaudio-utils-15.0-150400.4.2.2.x86_64.rpm pulseaudio-zsh-completion-15.0-150400.4.2.2.x86_64.rpm system-user-brltty-6.4-150400.4.3.3.noarch.rpm system-user-pulse-15.0-150400.4.2.2.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3270 Recommended update for vim moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - Calling vim on xterm leads to missing first character of the command prompt (bsc#1211461) gvim-9.0.1572-150000.5.49.1.x86_64.rpm vim-9.0.1572-150000.5.49.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3550 Optional update for ibus moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ibus fixes the following issues: - Fix ibus not started automatically by KDE Plasma in openSUSE Leap (bsc#1211977) ibus-1.5.25-150400.3.3.1.src.rpm ibus-1.5.25-150400.3.3.1.x86_64.rpm ibus-devel-1.5.25-150400.3.3.1.x86_64.rpm ibus-dict-emoji-1.5.25-150400.3.3.1.noarch.rpm ibus-gtk-1.5.25-150400.3.3.1.x86_64.rpm ibus-gtk3-1.5.25-150400.3.3.1.x86_64.rpm ibus-lang-1.5.25-150400.3.3.1.noarch.rpm libibus-1_0-5-1.5.25-150400.3.3.1.x86_64.rpm typelib-1_0-IBus-1_0-1.5.25-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3220 Security update for gstreamer-plugins-bad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gstreamer-plugins-bad fixes the following issues: - CVE-2023-37329: Fixed GStreamer SRT File Parsing Heap-based Buffer Overflow (bsc#1213126). gstreamer-plugins-bad-1.20.1-150400.3.3.1.src.rpm gstreamer-plugins-bad-1.20.1-150400.3.3.1.x86_64.rpm gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.3.1.x86_64.rpm gstreamer-plugins-bad-devel-1.20.1-150400.3.3.1.x86_64.rpm gstreamer-plugins-bad-lang-1.20.1-150400.3.3.1.noarch.rpm libgstadaptivedemux-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstbadaudio-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstcodecparsers-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstcodecs-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstinsertbin-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstisoff-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstmpegts-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstsctp-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgsturidownloader-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstva-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstvulkan-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstwayland-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm libgstwebrtc-1_0-0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstPlay-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.3.1.x86_64.rpm typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3238 Security update for bluez moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for bluez fixes the following issues: - CVE-2021-41229: Fix leaking buffers stored in cstates cache. (bsc#1192760) bluez-5.62-150400.4.16.1.src.rpm bluez-devel-5.62-150400.4.16.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3551 Recommended update for rtkit low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for rtkit fixes the following issues: - Change rtkit-daemon to no longer log debug messages by default (bsc#1206745) rtkit-0.11+git.20130926-150000.3.3.1.src.rpm rtkit-0.11+git.20130926-150000.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3482 Feature update for gtk4 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gtk4 fixes the following issues: Version update from 4.6.0 to 4.6.9 (jsc#PED-2645, jsc#PED-2423): - Changes in 4.6.9: * GtkText: Prevent unexpected notify::direction emissions * Wayland: Fix button masks * X11: Fix some ordering problems with surface destruction * Translation updates - Changes in 4.6.8: * Input: Fix problems with input method interactions that caused dead keys not to work * GtkText: Respect the no-emoji input hint fully * GtkNotebook: + Fix an infinite loop in accessibility code + Event handling fixes * GtkFileChooser: Restore ~ and .functionality * GtkTreeView: Event handling fixes * GtkTreeListModel: Prevent possible crashes with collapsed nodes * GtkGridView: Fix issues with rubberband selection * GtkEmojiChooser: Fix navigation with arrow keys when filtered * GtkPopover: + Fix problems with focus when dismissing popovers + Fix problems with focusing editable labels in popovers * GtkStackSidebar: Improve accessible presentation * Wayland: + Make gtk_launch_uri more robust + Make monitor bounds handling more robust + Prevent shrinking clients due to wrong toplevel bounds * Flatpak: Fix file DND with the FileTransfer portal - Changes in 4.6.7: * Miscellaneous memory leak fixes * GtkTreeView: + Fix a problem with DND + Fix a problem with row selection * GtkTreePopover: Support scrolling * GtkGridView: Fix issues with rubberband selection * GtkSnapshot: Make GtkSnapshot work from bindings * X11: Fix preferred action for DND * Windows: Fix DND - Changes in 4.6.6: * Fix translations in GTKs own ui files * Wayland: + Fix a problem with the activation protocol + Don't force the HighContrast icontheme * Windows: Fix a problem with builtin icons if the hicolor icontheme is not installed - Changes in 4.6.5: * GtkFileChooser: Fix pasting text into the name field. * GtkText: Remove an assertion that is sometimes hit. * Wayland: Ensure that our cursor surfaces don't violate protocol constraints. * Accssibility: Fix a problem in the accessibility tree. - Changes in 4.6.4: * GtkFileChooser: + Fix select button sensitivity in select_folder mode. + Fix some fallout from list model porting. * GtkListView, GtkColumnView: Optimize scrolling. * print-to-file: Handle nonexisting files better in the dialog. * Avoid infinite loops in size allocation. * CSS: Optimize a case of reparenting that is important in GtkListView. * GSK: Check for half-float support before using it. * Wayland: + Ignore empty preedit updates This fixes a problem with textview scrolling. + Freeze popups when hidden. This addresses a frame rate drop- - Changes in 4.6.3: * GtkOverlay: Bring back positional style classes. * GtkFileChooser: + Prevent unwanted completion popups. + Fix small problems in save mode. + Fix buildable suport of GtkFileFilter. * GtkPopover: Fix button positions in right-to-left locales. * GtkLabel: Fix small issues with link handling. * Tooltips: Don't restrict the minimum tooltip length. * Theme: + Don't use opacity for overlay scrollbars. + Fix selection text color in vertical spin buttons. * GSK: + Accept textures that are generated by webkit. + Align offscreen rendering to the pixel grid. * Accessibility: Fix a crash in startup when orca is running. * Input: + Fix display changes in GtkIMMultiContext. + Fix activating on-screen keyboards. + Always propagate hold events in GtkEventControllerScroll. * Windows: + Fix a critical warning in clipboard handling. + Report serial numbers for events. - Changes in 4.6.2: * GtkScrolledWindow: + Set scroll-to-focus on viewports + Avoid doubly triggering deceleration * GtkEntry: Stop cursor blinking on focus-out * Emoji: + Update Emoji data to CLDR 40 and Unicode 14 + Add more locales for Emoji data * GDK: + Optimize texture conversions on x86 and ARM + Use EGK_KHR_swap_buffers_with_damage if available * GSK: + Avoid clearing opaque regions + Support using a non-default framebuffer + Handle large viewports by tiling * Wayland: + Prefer xdg-activation over gtk-shell + text protocol: Fix text caret location + text protocol: Use serials to control outbound messages * Inspector: Show app ID and resource path * Demos: widget-factory: Handle F11 to toggle fullscreen * Tools: gtk-builder-tool: Allow use without display - Changes in 4.6.1: * GtkFontChooser: + Stop using PangoFc api + Fix a crash + Use new HarfBuzz api * GtkMenuButton: Update accessible description * GtkTextView: Fix intra-widget dnd * Printing: Fix an fd leak * Input: + Make sure input methods get focus-in events + Always flush events to avoid scroll event pileup + Support hold events + Update keysyms from libxkbcommon * Theme: Improve text selection legibility * Introspection: Add missing nullable annotations everywhere * Build: + Make stack noexec again + Avoid symbol leaks + Drop unneeded script data * Wayland: + Fix support for the new high-contrast setting + Avoid redundant scale changes + Fix DND hotspot handling + Don't always restore the saved size when floating gtk4-4.6.9-150400.3.6.2.src.rpm gtk4-devel-4.6.9-150400.3.6.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3419 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.40.5 (bsc#1213905): - CVE-2023-38133: Fixed information disclosure. - CVE-2023-38572: Fixed Same-Origin-Policy bypass. - CVE-2023-38592: Fixed arbitrary code execution. - CVE-2023-38594: Fixed arbitrary code execution. - CVE-2023-38595: Fixed arbitrary code execution. - CVE-2023-38597: Fixed arbitrary code execution. - CVE-2023-38599: Fixed sensitive user information tracking. - CVE-2023-38600: Fixed arbitrary code execution. - CVE-2023-38611: Fixed arbitrary code execution. Update to version 2.40.3 (bsc#1212863): - CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863) - CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863) - CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863) libjavascriptcoregtk-4_1-0-2.40.5-150400.4.45.3.x86_64.rpm libwebkit2gtk-4_1-0-2.40.5-150400.4.45.3.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.45.3.x86_64.rpm typelib-1_0-WebKit2-4_1-2.40.5-150400.4.45.3.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.45.3.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.45.3.x86_64.rpm webkit2gtk3-2.40.5-150400.4.45.3.src.rpm webkit2gtk3-devel-2.40.5-150400.4.45.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3850 Recommended update for evolution moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for evolution and its dependencies fixes the following issues: evolution: - Handle frame flattening change in WebKitGTK 2.40 (bsc#1213858) bogofilter, evolution-data-server, gcr, geocode-glib, gjs, glade, gnome-autoar, gnome-desktop, gnome-online-accounts, gsl, gspell, gtkspell3, libcanberra, libgdata, libgweather, libical, liboauth, libphonenumber, librest, libxkbcommon, mozjs78: - Deliver missing direct and indirect dependencies of evolution to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le and s390x - There are NO code changes canberra-gtk-play-0.30-150400.15.2.2.x86_64.rpm gcr-3.41.1-150400.3.5.2.src.rpm gcr-data-3.41.1-150400.3.5.2.x86_64.rpm gcr-lang-3.41.1-150400.3.5.2.noarch.rpm gcr-prompter-3.41.1-150400.3.5.2.x86_64.rpm gcr-ssh-agent-3.41.1-150400.3.5.2.x86_64.rpm gcr-ssh-askpass-3.41.1-150400.3.5.2.x86_64.rpm gcr-viewer-3.41.1-150400.3.5.2.x86_64.rpm geocode-glib-3.26.4-150400.3.5.2.src.rpm geocode-glib-3.26.4-150400.3.5.2.x86_64.rpm geocode-glib-devel-3.26.4-150400.3.5.2.x86_64.rpm gjs-1.70.2-150400.3.5.4.src.rpm gjs-1.70.2-150400.3.5.4.x86_64.rpm gnome-autoar-0.4.1-150400.3.2.2.src.rpm gnome-autoar-devel-0.4.1-150400.3.2.2.x86_64.rpm gnome-desktop-41.8-150400.3.5.2.src.rpm gnome-desktop-lang-41.8-150400.3.5.2.noarch.rpm gnome-online-accounts-3.40.1-150400.3.2.2.src.rpm gnome-online-accounts-devel-3.40.1-150400.3.2.2.x86_64.rpm gnome-version-41.8-150400.3.5.2.x86_64.rpm gspell-1.10.0-150400.3.5.3.src.rpm gspell-devel-1.10.0-150400.3.5.3.x86_64.rpm gspell-lang-1.10.0-150400.3.5.3.noarch.rpm gtkspell3-3.0.10-150400.11.2.2.src.rpm gtkspell3-devel-3.0.10-150400.11.2.2.x86_64.rpm gtkspell3-lang-3.0.10-150400.11.2.2.noarch.rpm gweather-data-40.0-150400.3.2.2.x86_64.rpm libcanberra-0.30-150400.15.2.2.src.rpm libcanberra-devel-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk-devel-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk-module-common-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk0-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk2-module-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk3-0-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk3-devel-0.30-150400.15.2.2.x86_64.rpm libcanberra-gtk3-module-0.30-150400.15.2.2.x86_64.rpm libgck-1-0-3.41.1-150400.3.5.2.x86_64.rpm libgck-devel-3.41.1-150400.3.5.2.x86_64.rpm libgcr-3-1-3.41.1-150400.3.5.2.x86_64.rpm libgcr-devel-3.41.1-150400.3.5.2.x86_64.rpm libgdata-0.18.1-150400.4.2.2.src.rpm libgdata-devel-0.18.1-150400.4.2.2.x86_64.rpm libgdata22-0.18.1-150400.4.2.2.x86_64.rpm libgeocode-glib0-3.26.4-150400.3.5.2.x86_64.rpm libgjs-devel-1.70.2-150400.3.5.4.x86_64.rpm libgjs0-1.70.2-150400.3.5.4.x86_64.rpm libgnome-autoar-0-0-0.4.1-150400.3.2.2.x86_64.rpm libgnome-autoar-gtk-0-0-0.4.1-150400.3.2.2.x86_64.rpm libgnome-desktop-3-19-41.8-150400.3.5.2.x86_64.rpm libgnome-desktop-3-devel-41.8-150400.3.5.2.x86_64.rpm libgnome-desktop-3_0-common-41.8-150400.3.5.2.x86_64.rpm libgoa-1_0-0-3.40.1-150400.3.2.2.x86_64.rpm libgoa-backend-1_0-1-3.40.1-150400.3.2.2.x86_64.rpm libgspell-1-2-1.10.0-150400.3.5.3.x86_64.rpm libgtkspell3-3-0-3.0.10-150400.11.2.2.x86_64.rpm libgweather-3-16-40.0-150400.3.2.2.x86_64.rpm libgweather-40.0-150400.3.2.2.src.rpm libgweather-devel-40.0-150400.3.2.2.x86_64.rpm libical-3.0.10-150400.3.2.4.src.rpm libical-devel-3.0.10-150400.3.2.4.x86_64.rpm libmozjs-78-0-78.15.0-150400.3.2.4.x86_64.rpm liboauth-1.0.3-150000.5.2.3.src.rpm liboauth-devel-1.0.3-150000.5.2.3.x86_64.rpm liboauth0-1.0.3-150000.5.2.3.x86_64.rpm librest-0.8.1-150000.3.4.3.src.rpm librest-0_7-0-0.8.1-150000.3.4.3.x86_64.rpm librest-devel-0.8.1-150000.3.4.3.x86_64.rpm libxkbcommon-1.3.0-150400.3.2.2.src.rpm libxkbregistry-devel-1.3.0-150400.3.2.2.x86_64.rpm libxkbregistry0-1.3.0-150400.3.2.2.x86_64.rpm mozjs78-78.15.0-150400.3.2.4.src.rpm mozjs78-devel-78.15.0-150400.3.2.4.x86_64.rpm typelib-1_0-GData-0_0-0.18.1-150400.4.2.2.x86_64.rpm typelib-1_0-GWeather-3_0-40.0-150400.3.2.2.x86_64.rpm typelib-1_0-Gck-1-3.41.1-150400.3.5.2.x86_64.rpm typelib-1_0-Gcr-3-3.41.1-150400.3.5.2.x86_64.rpm typelib-1_0-GcrUi-3-3.41.1-150400.3.5.2.x86_64.rpm typelib-1_0-GeocodeGlib-1_0-3.26.4-150400.3.5.2.x86_64.rpm typelib-1_0-GjsPrivate-1_0-1.70.2-150400.3.5.4.x86_64.rpm typelib-1_0-GnomeAutoar-0_1-0.4.1-150400.3.2.2.x86_64.rpm typelib-1_0-GnomeAutoarGtk-0_1-0.4.1-150400.3.2.2.x86_64.rpm typelib-1_0-GnomeDesktop-3_0-41.8-150400.3.5.2.x86_64.rpm typelib-1_0-Goa-1_0-3.40.1-150400.3.2.2.x86_64.rpm typelib-1_0-Gspell-1-1.10.0-150400.3.5.3.x86_64.rpm typelib-1_0-GtkSpell-3_0-3.0.10-150400.11.2.2.x86_64.rpm typelib-1_0-Rest-0_7-0.8.1-150000.3.4.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3955 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: Security fixes: - CVE-2023-4733: Fixed use-after-free in function buflist_altfpos (bsc#1215004). - CVE-2023-4734: Fixed segmentation fault in function f_fullcommand (bsc#1214925). - CVE-2023-4735: Fixed out of bounds write in ops.c (bsc#1214924). - CVE-2023-4738: Fixed heap buffer overflow in vim_regsub_both (bsc#1214922). - CVE-2023-4752: Fixed heap use-after-free in function ins_compl_get_exp (bsc#1215006). - CVE-2023-4781: Fixed heap buffer overflow in function vim_regsub_both (bsc#1215033). Other fixes: - Update to version 9.0 with patch level 1894, for the complete list of changes see https://github.com/vim/vim/compare/v9.0.1443...v9.0.1894 - Use app icons generated from vimlogo.eps in the source tarball; add higher resolution icons of sizes 128x128, 256x256, and 512x512 as png sources gvim-9.0.1894-150000.5.54.1.x86_64.rpm vim-9.0.1894-150000.5.54.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3461 Security update for freetype2 moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for freetype2 fixes the following issues: - CVE-2023-2004: Fixed integer overflow in tt_hvadvance_adjust (bsc#1210419). ft2demos-2.10.4-150000.4.15.1.nosrc.rpm ftdump-2.10.4-150000.4.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3518 Security update for exempi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for exempi fixes the following issues: - CVE-2020-18652: Fixed buffer overflow vulnerability in WEBP_Support.cpp (bsc#1214488). exempi-2.4.5-150000.3.6.1.src.rpm libexempi-devel-2.4.5-150000.3.6.1.x86_64.rpm libexempi3-2.4.5-150000.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3778 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: - Wireshark update to v3.6.16. - CVE-2023-4512: Fixed a bug in CBOR dissector which could lead to crash. (bsc#1214561) - CVE-2023-4511: Fixed a bug in BT SDP dissector which could lead to an infinite loop. (bsc#1214560) - CVE-2023-4513: Fixed a bug in BT SDP dissector which could lead to a memory leak. (bsc#1214562) - CVE-2023-2906: Fixed a bug in CP2179 dissector which could lead to crash. (bsc#1214652) wireshark-3.6.16-150000.3.100.1.src.rpm wireshark-devel-3.6.16-150000.3.100.1.x86_64.rpm wireshark-ui-qt-3.6.16-150000.3.100.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3858 Security update for gsl moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gsl fixes the following issues: - CVE-2020-35357: Fixed a stack out of bounds read in gsl_stats_quantile_from_sorted_data(). (bsc#1214681) gsl-2.6-150200.3.4.3.src.rpm gsl-devel-2.6-150200.3.4.3.x86_64.rpm libgsl25-2.6-150200.3.4.3.x86_64.rpm libgslcblas0-2.6-150200.3.4.3.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3507 Security update for open-vm-tools important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - CVE-2023-20900: Fixed SAML token signature bypass vulnerability (bsc#1214566). This update also ships a open-vm-tools-containerinfo plugin. (jsc#PED-3421) open-vm-tools-12.2.0-150300.33.1.src.rpm open-vm-tools-desktop-12.2.0-150300.33.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3852 Recommended update for libostree moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libostree fixes the following issues: - Cherry-pick an upstream patch to fix corrupted files when using a large fs with 64-bit inodes (bsc#1214708) libostree-2021.6-150400.3.6.1.src.rpm libostree-2021.6-150400.3.6.1.x86_64.rpm libostree-devel-2021.6-150400.3.6.1.x86_64.rpm typelib-1_0-OSTree-1_0-2021.6-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3520 Security update for djvulibre low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for djvulibre fixes the following issues: - CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670). - CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672). djvulibre-3.5.27-150200.11.14.1.src.rpm libdjvulibre-devel-3.5.27-150200.11.14.1.x86_64.rpm libdjvulibre21-3.5.27-150200.11.14.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3556 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - Provide/obsolete WebKit2GTK-%{_apiver}-lang (bsc#1214093) - Have the lang package provide libwebkit2gtk3-lang (bsc#1214093) - Adjustments of update version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581): + Added missing CVE references: CVE-2023-32393, CVE-2023-37450 libjavascriptcoregtk-4_1-0-2.40.5-150400.4.48.1.x86_64.rpm libwebkit2gtk-4_1-0-2.40.5-150400.4.48.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.48.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.40.5-150400.4.48.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.48.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.48.1.x86_64.rpm webkit2gtk3-2.40.5-150400.4.48.1.src.rpm webkit2gtk3-devel-2.40.5-150400.4.48.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3519 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox was updated to Extended Support Release 115.2.0 ESR (MFSA 2023-36) (bsc#1214606). - CVE-2023-4574: Fixed memory corruption in IPC ColorPickerShownCallback (bmo#1846688) - CVE-2023-4575: Fixed memory corruption in IPC FilePickerShownCallback (bmo#1846689) - CVE-2023-4576: Fixed integer Overflow in RecordedSourceSurfaceCreation (bmo#1846694) - CVE-2023-4577: Fixed memory corruption in JIT UpdateRegExpStatics (bmo#1847397) - CVE-2023-4051: Fixed full screen notification obscured by file open dialog (bmo#1821884) - CVE-2023-4578: Fixed Out of Memory Exception in SpiderMonkey could have triggered an (bmo#1839007) - CVE-2023-4053: Fixed full screen notification obscured by external program (bmo#1839079) - CVE-2023-4580: Fixed push notifications saved to disk unencrypted (bmo#1843046) - CVE-2023-4581: Fixed XLL file extensions downloadable without warnings (bmo#1843758) - CVE-2023-4582: Fixed buffer Overflow in WebGL glGetProgramiv (bmo#1773874) - CVE-2023-4583: Fixed browsing Context potentially not cleared when closing Private Window (bmo#1842030) - CVE-2023-4584: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529) - CVE-2023-4585: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2(bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999). MozillaFirefox-115.2.0-150200.152.102.1.src.rpm MozillaFirefox-115.2.0-150200.152.102.1.x86_64.rpm MozillaFirefox-devel-115.2.0-150200.152.102.1.noarch.rpm MozillaFirefox-translations-common-115.2.0-150200.152.102.1.x86_64.rpm MozillaFirefox-translations-other-115.2.0-150200.152.102.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3818 Security update for ffmpeg moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ffmpeg fixes the following issues: - CVE-2021-28429: Fixed Integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c (bsc#1214246). ffmpeg-3.4.2-150200.11.31.1.src.rpm libavcodec57-3.4.2-150200.11.31.1.x86_64.rpm libavformat57-3.4.2-150200.11.31.1.x86_64.rpm libavresample3-3.4.2-150200.11.31.1.x86_64.rpm libavutil-devel-3.4.2-150200.11.31.1.x86_64.rpm libavutil55-3.4.2-150200.11.31.1.x86_64.rpm libpostproc-devel-3.4.2-150200.11.31.1.x86_64.rpm libpostproc54-3.4.2-150200.11.31.1.x86_64.rpm libswresample-devel-3.4.2-150200.11.31.1.x86_64.rpm libswresample2-3.4.2-150200.11.31.1.x86_64.rpm libswscale-devel-3.4.2-150200.11.31.1.x86_64.rpm libswscale4-3.4.2-150200.11.31.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3610 Security update for MozillaFirefox critical SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Firefox Extended Support Release 115.2.1 ESR (bsc#1215245). - CVE-2023-4863: Fixed heap buffer overflow in libwebp (MFSA 2023-40) (bsc#1215231). The following non-security bug was fixed: - Fix i586 build by reducing debug info to -g1 (bsc#1210168). MozillaFirefox-115.2.1-150200.152.105.1.src.rpm MozillaFirefox-115.2.1-150200.152.105.1.x86_64.rpm MozillaFirefox-devel-115.2.1-150200.152.105.1.noarch.rpm MozillaFirefox-translations-common-115.2.1-150200.152.105.1.x86_64.rpm MozillaFirefox-translations-other-115.2.1-150200.152.105.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3753 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - Expand lang sub-package in spec file unconditionally to handle previous name change from WebKit2GTK-lang to WebKitGTK-lang. This change affected the automatic generated Requires tag on WebKit2GTK-%{_apiver}, then getting out of sync of what's being required and what's being provided. Now, any sub-package that was providing WebKit2GTK-%{_apiver} will provide WebKitGTK-%{_apiver} instead (bsc#1214835, bsc#1214640, bsc#1214093). - Require libwaylandclient0 >= 1.20. 15.4 originally had 1.19.0, but webkitgtk uses a function added in 1.20.0, so we need to ensure that the wayland update is pulled in (bsc#1215072). - Update to version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581 bsc#1215230): CVE-2023-38594, CVE-2023-38595, CVE-2023-38597, CVE-2023-38599, CVE-2023-38600, CVE-2023-38611, CVE-2023-40397, CVE-2023-37450, CVE-2023-28198, CVE-2023-32370 libjavascriptcoregtk-4_1-0-2.40.5-150400.4.51.1.x86_64.rpm libwebkit2gtk-4_1-0-2.40.5-150400.4.51.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.51.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.40.5-150400.4.51.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.51.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.51.1.x86_64.rpm webkit2gtk3-2.40.5-150400.4.51.1.src.rpm webkit2gtk3-devel-2.40.5-150400.4.51.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3968 Security update for libraw moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libraw fixes the following issues: - CVE-2020-22628: Fixed buffer overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. (bsc#1215308) libraw-0.20.2-150400.3.9.1.src.rpm libraw20-0.20.2-150400.3.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3833 Security update for exempi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for exempi fixes the following issues: - CVE-2020-18651: Fixed a buffer overflow in ID3 support (bsc#1214486). exempi-2.4.5-150000.3.9.1.src.rpm libexempi-devel-2.4.5-150000.3.9.1.x86_64.rpm libexempi3-2.4.5-150000.3.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4111 Recommended update for lame moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for lame fixes the following issues: - Add a pkg-config file for libmp3lame lame-3.100-150000.3.5.1.src.rpm libmp3lame-devel-3.100-150000.3.5.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3835 Securitys update for open-vm-tools important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: Update to 12.3.0 (build 22234872) (bsc#1214850) - There are no new features in the open-vm-tools 12.3.0 release. This is primarily a maintenance release that addresses a few critical problems, including: - This release integrates CVE-2023-20900 without the need for a patch. For more information on this vulnerability and its impact on VMware products, see https://www.vmware.com/security/advisories/VMSA-2023-0019.html. - A tools.conf configuration setting is available to temporaily direct Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior of ignoring file systems already frozen. - Building of the VMware Guest Authentication Service (VGAuth) using "xml-security-c" and "xerces-c" is being deprecated. - A number of Coverity reported issues have been addressed. - A number of GitHub issues and pull requests have been handled. Please see the Resolves Issues section of the Release Notes. - For issues resolved in this release, see the Resolved Issues section of the Release Notes. - For complete details, see: https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0 - Release Notes are available at https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/ReleaseNotes.md - The granular changes that have gone into the 12.3.0 release are in the ChangeLog at https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/open-vm-tools/ChangeLog - Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests - jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4. open-vm-tools-12.3.0-150300.37.1.src.rpm open-vm-tools-desktop-12.3.0-150300.37.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3898 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575): Security fixes: - CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683). - CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685). - CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599). - CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454). - CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195). Other fixes: - Fix broken build with newer binutils (bsc#1215309) MozillaFirefox-115.3.0-150200.152.108.1.src.rpm MozillaFirefox-115.3.0-150200.152.108.1.x86_64.rpm MozillaFirefox-devel-115.3.0-150200.152.108.1.noarch.rpm MozillaFirefox-translations-common-115.3.0-150200.152.108.1.x86_64.rpm MozillaFirefox-translations-other-115.3.0-150200.152.108.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4197 Recommended update for tracker moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for tracker fixes the following issues: - use pkgconfig(icu-i18n) to use the current libicu (jsc#PED-6193) tracker-3.2.1-150400.3.3.1.src.rpm tracker-data-files-3.2.1-150400.3.3.1.x86_64.rpm tracker-devel-3.2.1-150400.3.3.1.x86_64.rpm typelib-1_0-Tracker-3_0-3.2.1-150400.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4143 Recommended update for brltty, harfbuzz, libcdr, libmspub, libreoffice, libzmf, tepl, vte moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update provides rebuilds of various packages against the newer icu73 to support GB18030-2023. This set contains libreoffice, various libraries used by libreoffice and GNOME, and brltty. brltty-6.4-150400.4.5.1.src.rpm brltty-6.4-150400.4.5.1.x86_64.rpm brltty-driver-at-spi2-6.4-150400.4.5.1.x86_64.rpm brltty-driver-brlapi-6.4-150400.4.5.1.x86_64.rpm brltty-driver-speech-dispatcher-6.4-150400.4.5.1.x86_64.rpm brltty-lang-6.4-150400.4.5.1.noarch.rpm libtepl-6-0-6.00.0-150400.3.2.1.x86_64.rpm system-user-brltty-6.4-150400.4.5.1.noarch.rpm tepl-6.00.0-150400.3.2.1.src.rpm tepl-devel-6.00.0-150400.3.2.1.x86_64.rpm typelib-1_0-Tepl-6-6.00.0-150400.3.2.1.x86_64.rpm vte-0.66.2-150400.3.2.1.src.rpm vte-devel-0.66.2-150400.3.2.1.x86_64.rpm vte-lang-0.66.2-150400.3.2.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3948 Security update for libvpx important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libvpx fixes the following issues: - CVE-2023-5217: Fixed a heap buffer overflow (bsc#1215778). libvpx-1.6.1-150000.6.11.1.src.rpm libvpx4-1.6.1-150000.6.11.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-3949 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: Mozilla Firefox was updated to 115.3.1 ESR, fixing a security issue: MFSA 2023-44 (bsc#1215814) * CVE-2023-5217: Fixed a heap buffer overflow in libvpx MozillaFirefox-115.3.1-150200.152.111.1.src.rpm MozillaFirefox-115.3.1-150200.152.111.1.x86_64.rpm MozillaFirefox-devel-115.3.1-150200.152.111.1.noarch.rpm MozillaFirefox-translations-common-115.3.1-150200.152.111.1.x86_64.rpm MozillaFirefox-translations-other-115.3.1-150200.152.111.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4112 Recommended update for open-vm-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issue: - Ship correct open-vm-tools version to 15-SP4 (bsc#1205927) open-vm-tools-12.3.0-150300.40.1.src.rpm open-vm-tools-desktop-12.3.0-150300.40.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4090 Security update for libcue important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libcue fixes the following issues: - CVE-2023-43641: Fixed a buffer overflow while parsing a malicious file (bsc#1215728). libcue-2.1.0-150000.3.3.1.src.rpm libcue2-2.1.0-150000.3.3.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4050 Security update for ImageMagick moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for ImageMagick fixes the following issues: - CVE-2023-5341: Fixed a heap use-after-free in coders/bmp.c. (bsc#1215939) ImageMagick-7.1.0.9-150400.6.27.1.src.rpm ImageMagick-7.1.0.9-150400.6.27.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.27.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.27.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.27.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.27.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.27.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.27.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.27.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4083 Security update for wireshark low SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Updated to version 3.6.17: - CVE-2023-5371: Fixed a memory leak issue in the RTPS dissector (bsc#1215959). wireshark-3.6.17-150000.3.103.1.src.rpm wireshark-devel-3.6.17-150000.3.103.1.x86_64.rpm wireshark-ui-qt-3.6.17-150000.3.103.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-98 Recommended update for gegl moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gegl and its dependencies fixes the following issues: gegl: - Allow building against a newer libraw (0.21) (jsc#PED-6351) celt, fdk-aac-free, ffmpeg-4, ilmbase, ldacBT, lensfun, libass, libbluray, libbs2b, libcdio-paranoia, libcdio, libdc1394, libgsm, libmfx, libopenmpt, libraw1394, libraw, libspiro, libva, libvdpau, lilv, metis, openexr, pipewire, pulseaudio, rtkit, SDL2, serd, sord, sratom, suitesparse, webrtc-audio-processing, wireplumber: - Deliver missing direct and indirect dependencies of gegl to SUSE Package Hub 15 SP{4,5} for aarch64, ppc64le, s390x and x86_64 - There are NO code changes SDL2-2.0.8-150200.11.11.1.src.rpm celt-0.11.3-150000.3.5.1.src.rpm celt-0.11.3-150000.3.5.1.x86_64.rpm fdk-aac-free-2.0.0-150400.3.2.1.src.rpm ffmpeg-4-4.4-150400.3.19.1.src.rpm gstreamer-plugin-pipewire-0.3.49-150400.3.5.2.x86_64.rpm ilmbase-2.2.1-150000.3.3.1.src.rpm ilmbase-devel-2.2.1-150000.3.3.1.x86_64.rpm ldacBT-2.0.2.3-150300.3.2.1.src.rpm libHalf23-2.2.1-150000.3.3.1.x86_64.rpm libIex-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm libIexMath-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm libIlmImf-2_2-23-2.2.1-150000.3.43.1.x86_64.rpm libIlmImfUtil-2_2-23-2.2.1-150000.3.43.1.x86_64.rpm libIlmThread-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm libImath-2_2-23-2.2.1-150000.3.3.1.x86_64.rpm libSDL2-2_0-0-2.0.8-150200.11.11.1.x86_64.rpm libSDL2-devel-2.0.8-150200.11.11.1.x86_64.rpm libamd2-2.4.6-150100.9.2.3.x86_64.rpm libass-0.14.0-150000.3.13.1.src.rpm libass-devel-0.14.0-150000.3.13.1.x86_64.rpm libass9-0.14.0-150000.3.13.1.x86_64.rpm libavcodec58_134-4.4-150400.3.19.1.x86_64.rpm libavformat58_76-4.4-150400.3.19.1.x86_64.rpm libavutil56_70-4.4-150400.3.19.1.x86_64.rpm libbluray-1.3.0-150300.10.9.1.src.rpm libbluray-devel-1.3.0-150300.10.9.1.x86_64.rpm libbluray2-1.3.0-150300.10.9.1.x86_64.rpm libbs2b-3.1.0-150400.3.2.1.src.rpm libbs2b0-3.1.0-150400.3.2.1.x86_64.rpm libcamd2-2.4.6-150100.9.2.3.x86_64.rpm libccolamd2-2.9.6-150100.9.2.3.x86_64.rpm libcdio-0.94-150000.6.13.1.src.rpm libcdio-paranoia-10.2+0.93+1-150000.3.4.1.src.rpm libcdio-paranoia-devel-10.2+0.93+1-150000.3.4.1.x86_64.rpm libcdio16-0.94-150000.6.13.1.x86_64.rpm libcdio_cdda2-10.2+0.93+1-150000.3.4.1.x86_64.rpm libcdio_paranoia2-10.2+0.93+1-150000.3.4.1.x86_64.rpm libcelt-devel-0.11.3-150000.3.5.1.x86_64.rpm libcelt0-2-0.11.3-150000.3.5.1.x86_64.rpm libcholmod3-3.0.12-150100.9.2.3.x86_64.rpm libcolamd2-2.9.6-150100.9.2.3.x86_64.rpm libdc1394-2.2.5-150000.3.4.1.src.rpm libdc1394-22-2.2.5-150000.3.4.1.x86_64.rpm libdc1394-devel-2.2.5-150000.3.4.1.x86_64.rpm libdc1394-tools-2.2.5-150000.3.4.1.x86_64.rpm libfdk-aac2-2.0.0-150400.3.2.1.x86_64.rpm libgsm-1.0.14-150000.3.6.1.src.rpm libgsm-devel-1.0.14-150000.3.6.1.x86_64.rpm libgsm1-1.0.14-150000.3.6.1.x86_64.rpm libldac2-2.0.2.3-150300.3.2.1.x86_64.rpm liblilv-0-0-0.24.10-150300.3.2.1.x86_64.rpm liblilv-0-devel-0.24.10-150300.3.2.1.x86_64.rpm libmetis5-5.1.0-150100.9.5.2.x86_64.rpm libmfx-21.3.4-150400.3.2.2.src.rpm libmfx1-21.3.4-150400.3.2.2.x86_64.rpm libmodplug-devel-0.3.28-150000.2.15.1.x86_64.rpm libmodplug1-0.3.28-150000.2.15.1.x86_64.rpm libopenmpt-0.3.28-150000.2.15.1.src.rpm libopenmpt-devel-0.3.28-150000.2.15.1.x86_64.rpm libopenmpt0-0.3.28-150000.2.15.1.x86_64.rpm libopenmpt_modplug1-0.3.28-150000.2.15.1.x86_64.rpm libpipewire-0_3-0-0.3.49-150400.3.5.2.x86_64.rpm libpostproc55_9-4.4-150400.3.19.1.x86_64.rpm libraw-0.20.2-150400.3.11.3.src.rpm libraw1394-11-2.1.1-150000.3.4.1.x86_64.rpm libraw1394-2.1.1-150000.3.4.1.src.rpm libraw1394-devel-2.1.1-150000.3.4.1.x86_64.rpm libraw20-0.20.2-150400.3.11.3.x86_64.rpm libserd-0-0-0.30.6-150300.3.2.1.x86_64.rpm libsord-0-0-0.16.0-150000.3.2.1.x86_64.rpm libspiro-0.5.20150702-150000.3.2.1.src.rpm libspiro0-0.5.20150702-150000.3.2.1.x86_64.rpm libsratom-0-0-0.6.0-150000.3.2.1.x86_64.rpm libsuitesparseconfig5-5.2.0-150100.9.2.3.x86_64.rpm libswresample3_9-4.4-150400.3.19.1.x86_64.rpm libumfpack5-5.7.6-150100.9.2.3.x86_64.rpm libva-2.13.0-150400.3.2.1.src.rpm libva-devel-2.13.0-150400.3.2.1.x86_64.rpm libva-drm2-2.13.0-150400.3.2.1.x86_64.rpm libva-x11-2-2.13.0-150400.3.2.1.x86_64.rpm libva2-2.13.0-150400.3.2.1.x86_64.rpm libvdpau-1.1.1-150000.3.4.1.src.rpm libvdpau-devel-1.1.1-150000.3.4.1.x86_64.rpm libvdpau1-1.1.1-150000.3.4.1.x86_64.rpm libwebrtc_audio_processing-devel-0.3-150000.3.2.1.x86_64.rpm libwebrtc_audio_processing1-0.3-150000.3.2.1.x86_64.rpm libwireplumber-0_4-0-0.4.9-150400.3.5.2.x86_64.rpm lilv-0.24.10-150300.3.2.1.src.rpm metis-5.1.0-150100.9.5.2.src.rpm openexr-2.2.1-150000.3.43.1.src.rpm openexr-devel-2.2.1-150000.3.43.1.x86_64.rpm pipewire-0.3.49-150400.3.5.2.src.rpm pipewire-0.3.49-150400.3.5.2.x86_64.rpm pipewire-lang-0.3.49-150400.3.5.2.noarch.rpm pipewire-modules-0_3-0.3.49-150400.3.5.2.x86_64.rpm pipewire-spa-plugins-0_2-0.3.49-150400.3.5.2.x86_64.rpm pipewire-spa-tools-0.3.49-150400.3.5.2.x86_64.rpm pipewire-tools-0.3.49-150400.3.5.2.x86_64.rpm pulseaudio-15.0-150400.4.4.1.src.rpm pulseaudio-15.0-150400.4.4.1.x86_64.rpm pulseaudio-bash-completion-15.0-150400.4.4.1.x86_64.rpm pulseaudio-gdm-hooks-15.0-150400.4.4.1.x86_64.rpm pulseaudio-lang-15.0-150400.4.4.1.noarch.rpm pulseaudio-module-gsettings-15.0-150400.4.4.1.x86_64.rpm pulseaudio-module-x11-15.0-150400.4.4.1.x86_64.rpm pulseaudio-module-zeroconf-15.0-150400.4.4.1.x86_64.rpm pulseaudio-setup-15.0-150400.4.4.1.x86_64.rpm pulseaudio-utils-15.0-150400.4.4.1.x86_64.rpm pulseaudio-zsh-completion-15.0-150400.4.4.1.x86_64.rpm rtkit-0.11+git.20130926-150000.3.5.1.src.rpm rtkit-0.11+git.20130926-150000.3.5.1.x86_64.rpm serd-0.30.6-150300.3.2.1.src.rpm serd-devel-0.30.6-150300.3.2.1.x86_64.rpm sord-0.16.0-150000.3.2.1.src.rpm sord-devel-0.16.0-150000.3.2.1.x86_64.rpm sratom-0.6.0-150000.3.2.1.src.rpm sratom-devel-0.6.0-150000.3.2.1.x86_64.rpm suitesparse-5.2.0-150100.9.2.3.src.rpm system-user-pulse-15.0-150400.4.4.1.noarch.rpm webrtc-audio-processing-0.3-150000.3.2.1.src.rpm wireplumber-0.4.9-150400.3.5.2.src.rpm wireplumber-0.4.9-150400.3.5.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4294 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 ships missing Lang packages to SUSE Linux Enterprise 15 SP4 and SP5. Security fixes: - CVE-2023-41993: Fixed an issue where processing malicious web content could have lead to arbitrary code execution (bsc#1215661). - CVE-2023-39928: Fixed a use-after-free that could be exploited to execute arbitrary code when visiting a malicious webpage (bsc#1215868). - CVE-2023-41074: Fixed an issue where processing malicious web content could have lead to arbitrary code execution (bsc#1215870). Other fixes: - Fixed missing package dependencies (bsc#1215072). WebKitGTK-4.1-lang-2.42.1-150400.4.57.2.noarch.rpm libjavascriptcoregtk-4_1-0-2.42.1-150400.4.57.2.x86_64.rpm libwebkit2gtk-4_1-0-2.42.1-150400.4.57.2.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.42.1-150400.4.57.2.x86_64.rpm typelib-1_0-WebKit2-4_1-2.42.1-150400.4.57.2.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.42.1-150400.4.57.2.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.42.1-150400.4.57.2.x86_64.rpm webkit2gtk3-2.42.1-150400.4.57.2.src.rpm webkit2gtk3-devel-2.42.1-150400.4.57.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4214 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Updated to version 115.4.0 ESR (bsc#1216338): - CVE-2023-5721: Fixed a potential clickjack via queued up rendering. - CVE-2023-5722: Fixed a cross-Origin size and header leakage. - CVE-2023-5723: Fixed unexpected errors when handling invalid cookie characters. - CVE-2023-5724: Fixed a crash due to a large WebGL draw. - CVE-2023-5725: Fixed an issue where WebExtensions could open arbitrary URLs. - CVE-2023-5726: Fixed an issue where fullscreen notifications would be obscured by file the open dialog on macOS. - CVE-2023-5727: Fixed a download protection bypass on on Windows. - CVE-2023-5728: Fixed a crash caused by improper object tracking during GC in the JavaScript engine. - CVE-2023-5729: Fixed an issue where fullscreen notifications would be obscured by WebAuthn prompts. - CVE-2023-5730: Fixed multiple memory safety issues. - CVE-2023-5731: Fixed multiple memory safety issues. MozillaFirefox-115.4.0-150200.152.114.1.src.rpm MozillaFirefox-115.4.0-150200.152.114.1.x86_64.rpm MozillaFirefox-devel-115.4.0-150200.152.114.1.noarch.rpm MozillaFirefox-translations-common-115.4.0-150200.152.114.1.x86_64.rpm MozillaFirefox-translations-other-115.4.0-150200.152.114.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4227 Security update for open-vm-tools important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - CVE-2023-34058: Fixed a SAML token signature bypass issue (bsc#1216432). - CVE-2023-34059: Fixed a privilege escalation issue through vmware-user-suid-wrapper (bsc#1216433). open-vm-tools-12.3.0-150300.43.1.src.rpm open-vm-tools-desktop-12.3.0-150300.43.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4251 Security update for vorbis-tools important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vorbis-tools fixes the following issues: - CVE-2023-43361: Fixed a buffer overflow vulnerability during the conversion of wav files to ogg files. (bsc#1215942) vorbis-tools-1.4.0-150000.3.3.1.src.rpm vorbis-tools-1.4.0-150000.3.3.1.x86_64.rpm vorbis-tools-lang-1.4.0-150000.3.3.1.noarch.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4503 Security update for avahi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for avahi fixes the following issues: - CVE-2023-38470: Ensure each label is at least one byte long (bsc#1215947). - CVE-2023-38473: Fixed a reachable assertion when parsing a host name (bsc#1216419). avahi-0.8-150400.7.10.1.src.rpm avahi-autoipd-0.8-150400.7.10.1.x86_64.rpm avahi-glib2-0.8-150400.7.10.1.src.rpm avahi-utils-gtk-0.8-150400.7.10.1.x86_64.rpm libavahi-gobject-devel-0.8-150400.7.10.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4446 Recommended update for open-vm-tools moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for open-vm-tools fixes the following issues: - Update to 12.3.5 (bsc#1216670) open-vm-tools-12.3.5-150300.46.1.src.rpm open-vm-tools-desktop-12.3.5-150300.46.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4360 Security update for gstreamer-plugins-bad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gstreamer-plugins-bad fixes the following issues: - CVE-2023-40474: Fixed a remote code execution issue due to improper parsing of H265 encoded video files (bsc#1215793). gstreamer-plugins-bad-1.20.1-150400.3.6.1.src.rpm gstreamer-plugins-bad-1.20.1-150400.3.6.1.x86_64.rpm gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.6.1.x86_64.rpm gstreamer-plugins-bad-devel-1.20.1-150400.3.6.1.x86_64.rpm gstreamer-plugins-bad-lang-1.20.1-150400.3.6.1.noarch.rpm libgstadaptivedemux-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstbadaudio-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstcodecparsers-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstcodecs-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstinsertbin-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstisoff-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstmpegts-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstsctp-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgsturidownloader-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstva-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstvulkan-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstwayland-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm libgstwebrtc-1_0-0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstPlay-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.6.1.x86_64.rpm typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.6.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4474 Recommended update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - Rendering of e-mails in Evolution is blank when using the proprietary NVIDIA driver (bsc#1216778) WebKitGTK-4.1-lang-2.42.1-150400.4.60.1.noarch.rpm libjavascriptcoregtk-4_1-0-2.42.1-150400.4.60.1.x86_64.rpm libwebkit2gtk-4_1-0-2.42.1-150400.4.60.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.42.1-150400.4.60.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.42.1-150400.4.60.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.42.1-150400.4.60.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.42.1-150400.4.60.1.x86_64.rpm webkit2gtk3-2.42.1-150400.4.60.1.src.rpm webkit2gtk3-devel-2.42.1-150400.4.60.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4551 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Firefox Extended Support Release 115.5.0 ESR Placeholder changelog-entry (bsc#1217230) * Fixed: Various security fixes and other quality improvements. MFSA 2023-46 (bsc#1216338) * CVE-2023-5721: Queued up rendering could have allowed websites to clickjack * CVE-2023-5732: Address bar spoofing via bidirectional characters * CVE-2023-5724: Large WebGL draw could have led to a crash * CVE-2023-5725: WebExtensions could open arbitrary URLs * CVE-2023-5726: Full screen notification obscured by file open dialog on macOS * CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows * CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash. * CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4.1 MozillaFirefox-115.5.0-150200.152.117.1.src.rpm MozillaFirefox-115.5.0-150200.152.117.1.x86_64.rpm MozillaFirefox-devel-115.5.0-150200.152.117.1.noarch.rpm MozillaFirefox-translations-common-115.5.0-150200.152.117.1.x86_64.rpm MozillaFirefox-translations-other-115.5.0-150200.152.117.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4710 Security update for hplip moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for hplip fixes the following issues: - Fixed insecure /tmp file paths inside hppsfilter booklet printing (bsc#1214399) hplip-3.21.10-150400.3.11.1.src.rpm hplip-3.21.10-150400.3.11.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4575 Security update for gstreamer-plugins-bad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gstreamer-plugins-bad fixes the following issues: - CVE-2023-40474: Fixed integer overflow causing out of bounds writes when handling invalid uncompressed video (bsc#1215796). - CVE-2023-40476: Fixed possible overflow using max_sub_layers_minus1 (bsc#1215793). gstreamer-plugins-bad-1.20.1-150400.3.9.1.src.rpm gstreamer-plugins-bad-1.20.1-150400.3.9.1.x86_64.rpm gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.9.1.x86_64.rpm gstreamer-plugins-bad-devel-1.20.1-150400.3.9.1.x86_64.rpm gstreamer-plugins-bad-lang-1.20.1-150400.3.9.1.noarch.rpm libgstadaptivedemux-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstbadaudio-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstcodecparsers-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstcodecs-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstinsertbin-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstisoff-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstmpegts-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstsctp-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgsturidownloader-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstva-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstvulkan-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstwayland-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm libgstwebrtc-1_0-0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstPlay-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.9.1.x86_64.rpm typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.9.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4561 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.42.2 (bsc#1217210): - CVE-2023-41983: Processing web content may lead to a denial-of-service. - CVE-2023-42852: Processing web content may lead to arbitrary code execution. Already previously fixed: - CVE-2022-32919: Visiting a website that frames malicious content may lead to UI spoofing (fixed already in 2.38.4). - CVE-2022-32933: A website may be able to track the websites a user visited in private browsing mode (fixed already in 2.38.0). - CVE-2022-46705: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4). - CVE-2022-46725: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4). - CVE-2023-32359: A user’s password may be read aloud by a text-to-speech accessibility feature (fixed already in 2.42.0). WebKitGTK-4.1-lang-2.42.2-150400.4.64.2.noarch.rpm libjavascriptcoregtk-4_1-0-2.42.2-150400.4.64.2.x86_64.rpm libwebkit2gtk-4_1-0-2.42.2-150400.4.64.2.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.42.2-150400.4.64.2.x86_64.rpm typelib-1_0-WebKit2-4_1-2.42.2-150400.4.64.2.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.42.2-150400.4.64.2.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.42.2-150400.4.64.2.x86_64.rpm webkit2gtk3-2.42.2-150400.4.64.2.src.rpm webkit2gtk3-devel-2.42.2-150400.4.64.2.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4587 Security update for vim important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for vim fixes the following issues: - CVE-2023-5344: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940) - CVE-2023-5441: segfault in exmode when redrawing (bsc#1216001) - CVE-2023-5535: use-after-free from buf_contents_changed() (bsc#1216167) - CVE-2023-46246: Integer Overflow in :history command (bsc#1216696) gvim-9.0.2103-150000.5.57.1.x86_64.rpm vim-9.0.2103-150000.5.57.1.src.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4938 Security update for wireshark moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for wireshark fixes the following issues: Update to 3.6.19: - CVE-2023-6175: NetScreen file parser crash (bsc#1217272). wireshark-3.6.19-150000.3.106.1.src.rpm wireshark-devel-3.6.19-150000.3.106.1.x86_64.rpm wireshark-ui-qt-3.6.19-150000.3.106.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4950 Security update for libqt5-qtbase moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for libqt5-qtbase fixes the following issues: - CVE-2023-37369: Fixed buffer overflow in QXmlStreamReader (bsc#1214327). - libq5-qtbase was rebuild against icu 73. jsc#PED-6193 libQt5OpenGLExtensions-devel-static-5.15.2+kde294-150400.6.10.1.x86_64.rpm libQt5Sql5-mysql-5.15.2+kde294-150400.6.10.1.x86_64.rpm libQt5Sql5-postgresql-5.15.2+kde294-150400.6.10.1.x86_64.rpm libQt5Sql5-unixODBC-5.15.2+kde294-150400.6.10.1.x86_64.rpm libqt5-qtbase-5.15.2+kde294-150400.6.10.1.src.rpm libqt5-qtbase-platformtheme-gtk3-5.15.2+kde294-150400.6.10.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4902 Security update for openssh important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for openssh fixes the following issues: - CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950). the following non-security bug was fixed: - Fix the 'no route to host' error when connecting via ProxyJump openssh-askpass-gnome-8.4p1-150300.3.27.1.src.rpm openssh-askpass-gnome-8.4p1-150300.3.27.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4901 Security update for avahi moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for avahi fixes the following issues: - CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853). avahi-0.8-150400.7.13.1.src.rpm avahi-autoipd-0.8-150400.7.13.1.x86_64.rpm avahi-glib2-0.8-150400.7.13.1.src.rpm avahi-utils-gtk-0.8-150400.7.13.1.x86_64.rpm libavahi-gobject-devel-0.8-150400.7.13.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4868 Security update for tracker-miners important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for tracker-miners fixes the following issues: - CVE-2023-5557: Fixed a sandbox escape by adding seccomp rules and applying it to the whole process (bsc#1216199) - rebuild against current ICU 73. tracker-miner-files-3.2.2-150400.3.7.1.x86_64.rpm tracker-miners-3.2.2-150400.3.7.1.src.rpm tracker-miners-3.2.2-150400.3.7.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-36 Recommended update for raptor moderate SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for raptor fixes the following issues: - rebuild to use ICU 73 (jsc#PED-6193) libraptor-devel-2.0.15-150200.9.15.1.x86_64.rpm libraptor2-0-2.0.15-150200.9.15.1.x86_64.rpm raptor-2.0.15-150200.9.15.1.src.rpm raptor-2.0.15-150200.9.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4828 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: Update to version 2.42.3 (bsc#1217844): - Fix flickering while playing videos with DMA-BUF sink. - Fix color picker being triggered in the inspector when typing "tan". - Do not special case the "sans" font family name. - Fix build failure with libxml2 version 2.12.0 due to an API change. - Fix several crashes and rendering issues. - Security fixes: CVE-2023-42916, CVE-2023-42917. WebKitGTK-4.1-lang-2.42.3-150400.4.67.1.noarch.rpm libjavascriptcoregtk-4_1-0-2.42.3-150400.4.67.1.x86_64.rpm libwebkit2gtk-4_1-0-2.42.3-150400.4.67.1.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.42.3-150400.4.67.1.x86_64.rpm typelib-1_0-WebKit2-4_1-2.42.3-150400.4.67.1.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.42.3-150400.4.67.1.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.42.3-150400.4.67.1.x86_64.rpm webkit2gtk3-2.42.3-150400.4.67.1.src.rpm webkit2gtk3-devel-2.42.3-150400.4.67.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4875 Security update for gstreamer-plugins-bad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gstreamer-plugins-bad fixes the following issues: - CVE-2023-44429: Fixed GStreamer AV1 Codec Parsing Heap-based Buffer Overflow (bsc#1217211). gstreamer-plugins-bad-1.20.1-150400.3.12.1.src.rpm gstreamer-plugins-bad-1.20.1-150400.3.12.1.x86_64.rpm gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.12.1.x86_64.rpm gstreamer-plugins-bad-devel-1.20.1-150400.3.12.1.x86_64.rpm gstreamer-plugins-bad-lang-1.20.1-150400.3.12.1.noarch.rpm libgstadaptivedemux-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstbadaudio-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstcodecparsers-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstcodecs-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstinsertbin-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstisoff-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstmpegts-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstsctp-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgsturidownloader-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstva-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstvulkan-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstwayland-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm libgstwebrtc-1_0-0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstPlay-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.12.1.x86_64.rpm typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.12.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2023-4928 Security update for MozillaFirefox important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for MozillaFirefox fixes the following issues: - Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974). * CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver (bmo#1843782). * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023). * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791). * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144). * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669). * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118). * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042). * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901). * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. * CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123). * CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863). - Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230) * CVE-2023-6204 (bmo#1841050) Out-of-bound memory access in WebGL2 blitFramebuffer * CVE-2023-6205 (bmo#1854076) Use-after-free in MessagePort::Entangled * CVE-2023-6206 (bmo#1857430) Clickjacking permission prompts using the fullscreen transition * CVE-2023-6207 (bmo#1861344) Use-after-free in ReadableByteStreamQueueEntry::Buffer * CVE-2023-6208 (bmo#1855345) Using Selection API would copy contents into X11 primary selection. * CVE-2023-6209 (bmo#1858570) Incorrect parsing of relative URLs starting with "///" * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252, bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943, bmo#1862782) Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 MozillaFirefox-115.6.0-150200.152.120.1.src.rpm MozillaFirefox-115.6.0-150200.152.120.1.x86_64.rpm MozillaFirefox-devel-115.6.0-150200.152.120.1.noarch.rpm MozillaFirefox-translations-common-115.6.0-150200.152.120.1.x86_64.rpm MozillaFirefox-translations-other-115.6.0-150200.152.120.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-5 Security update for gstreamer-plugins-bad important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for gstreamer-plugins-bad fixes the following issues: - CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free (bsc#1217213). - CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792). gstreamer-plugins-bad-1.20.1-150400.3.15.1.src.rpm gstreamer-plugins-bad-1.20.1-150400.3.15.1.x86_64.rpm gstreamer-plugins-bad-chromaprint-1.20.1-150400.3.15.1.x86_64.rpm gstreamer-plugins-bad-devel-1.20.1-150400.3.15.1.x86_64.rpm gstreamer-plugins-bad-lang-1.20.1-150400.3.15.1.noarch.rpm libgstadaptivedemux-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstbadaudio-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstbasecamerabinsrc-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstcodecparsers-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstcodecs-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstinsertbin-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstisoff-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstmpegts-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstsctp-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgsturidownloader-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstva-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstvulkan-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstwayland-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm libgstwebrtc-1_0-0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstBadAudio-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstCodecs-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstInsertBin-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstMpegts-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstPlay-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstPlayer-1_0-1.20.1-150400.3.15.1.x86_64.rpm typelib-1_0-GstWebRTC-1_0-1.20.1-150400.3.15.1.x86_64.rpm SUSE-SLE-Module-Desktop-Applications-15-SP4-2024-4 Security update for webkit2gtk3 important SUSE Updates SLE-Module-Desktop-Applications 15-SP4 x86 64 This update for webkit2gtk3 fixes the following issues: - CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033). - CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of-service (bsc#1218032). - CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870). - CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1218032, bsc#1215868). WebKitGTK-4.1-lang-2.42.4-150400.4.70.3.noarch.rpm libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3.x86_64.rpm libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3.x86_64.rpm typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3.x86_64.rpm typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3.x86_64.rpm typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3.x86_64.rpm webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3.x86_64.rpm webkit2gtk3-2.42.4-150400.4.70.3.src.rpm webkit2gtk3-devel-2.42.4-150400.4.70.3.x86_64.rpm