Bugzilla – Bug 1047218
trackerbug: packages do not build reproducibly from including build time
Last modified: 2024-07-04 06:48:38 UTC
See also https://reproducible-builds.org/ and https://reproducible-builds.org/specs/source-date-epoch/ When packages include the current time of build it results in binaries that differ on every build and thus trigger rebuilds of depending packages and are published to mirrors and users when actually nothing really changed.
https://build.opensuse.org/request/show/508953 libkcapi
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/519673 42.3 / shorewall
openSUSE-RU-2017:2435-1: An update that has two recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1053650 CVE References: Sources used: openSUSE Leap 42.3 (src): shorewall-5.1.5.2-3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/532698 Factory / openpgm
SUSE-RU-2017:3333-1: An update that has four recommended fixes can now be installed. Category: recommended (low) Bug References: 1041090,1047218,1051076,1062562 CVE References: Sources used: SUSE Linux Enterprise Software Development Kit 12-SP3 (src): hwinfo-21.50-2.3.5 SUSE Linux Enterprise Server 12-SP3 (src): hwinfo-21.50-2.3.5 SUSE Linux Enterprise Desktop 12-SP3 (src): hwinfo-21.50-2.3.5
openSUSE-RU-2017:3348-1: An update that has four recommended fixes can now be installed. Category: recommended (low) Bug References: 1041090,1047218,1051076,1062562 CVE References: Sources used: openSUSE Leap 42.3 (src): hwinfo-21.50-3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/585850 Factory / nautilus-dropbox
SUSE-SU-2018:1853-1: An update that fixes 41 vulnerabilities is now available. Category: security (important) Bug References: 1012075,1019948,1039034,1041891,1042632,1043328,1047218,1055165,1055268,1058374,1058729,1060110,1062583,1067443,1068906,1069401,1080891,1082318,1083087,1088681,1092544,1093130 CVE References: CVE-2017-10268,CVE-2017-10286,CVE-2017-10320,CVE-2017-10365,CVE-2017-10378,CVE-2017-10379,CVE-2017-10384,CVE-2017-15365,CVE-2017-3257,CVE-2017-3302,CVE-2017-3308,CVE-2017-3309,CVE-2017-3313,CVE-2017-3453,CVE-2017-3456,CVE-2017-3464,CVE-2017-3636,CVE-2017-3641,CVE-2017-3653,CVE-2018-2562,CVE-2018-2612,CVE-2018-2622,CVE-2018-2640,CVE-2018-2665,CVE-2018-2668,CVE-2018-2755,CVE-2018-2759,CVE-2018-2761,CVE-2018-2766,CVE-2018-2767,CVE-2018-2771,CVE-2018-2777,CVE-2018-2781,CVE-2018-2782,CVE-2018-2784,CVE-2018-2786,CVE-2018-2787,CVE-2018-2810,CVE-2018-2813,CVE-2018-2817,CVE-2018-2819 Sources used: SUSE OpenStack Cloud 7 (src): galera-3-25.3.23-8.3, mariadb-10.2.15-7.1, mariadb-connector-c-3.0.3-1.3.3, rubygem-mysql2-0.4.10-7.2, xtrabackup-2.4.10-5.3
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/623110 Factory / a2ps
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/627965 42.3 / libheimdal https://build.opensuse.org/request/show/627966 15.0 / libheimdal
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/628018 42.3 / libheimdal
openSUSE-SU-2018:2376-1: An update that solves one vulnerability and has two fixes is now available. Category: security (important) Bug References: 1047218,1071675,1084909 CVE References: CVE-2017-17439 Sources used: openSUSE Leap 42.3 (src): libheimdal-7.5.0-9.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/634094 Factory / openmpi3
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/634942 Factory / openmpi3
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/636132 Factory / openmpi3
SUSE-RU-2018:3320-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1041090,1047218,1084909,1094689,1098653 CVE References: Sources used: SUSE Linux Enterprise Module for Legacy Software 15 (src): openmpi-1.10.7-13.3.1
openSUSE-RU-2018:3418-1: An update that has 5 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1041090,1047218,1084909,1094689,1098653 CVE References: Sources used: openSUSE Leap 15.0 (src): openmpi-1.10.7-lp150.9.3.1, openmpi-testsuite-1.10.7-lp150.9.3.1, openmpi_1_10_7-gnu-hpc-1.10.7-lp150.9.3.1, openmpi_1_10_7-gnu-hpc-testsuite-1.10.7-lp150.9.3.1
SUSE-RU-2018:3960-1: An update that has 10 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1080978,1086185,1094680,1095817,1102522,1104821,1105000,1108038,1113313 CVE References: Sources used: SUSE Linux Enterprise Module for Containers 12 (src): containerd-1.1.2-16.11.1, docker-18.06.1_ce-98.21.1, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-1.6.1, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-13.1 OpenStack Cloud Magnum Orchestration 7 (src): containerd-1.1.2-16.11.1, docker-18.06.1_ce-98.21.1, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-1.6.1, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-13.1
openSUSE-RU-2018:4052-1: An update that has 6 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1086185,1094680,1095817,1102522,1108038 CVE References: Sources used: openSUSE Leap 42.3 (src): containerd-1.1.2-19.2, docker-18.06.1_ce-48.2, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-5.2, go-1.10.4-40.1, go1.10-1.10.4-2.2, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-8.1, golang-packaging-15.0.11-17.1
SUSE-SU-2018:4297-1: An update that solves four vulnerabilities and has 17 fixes is now available. Category: security (important) Bug References: 1047218,1074971,1080978,1081495,1084533,1086185,1094680,1095817,1098017,1102522,1104821,1105000,1108038,1113313,1113978,1114209,1118897,1118898,1118899,1119634,1119706 CVE References: CVE-2018-16873,CVE-2018-16874,CVE-2018-16875,CVE-2018-7187 Sources used: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src): containerd-1.1.2-5.3.4, docker-18.06.1_ce-6.8.2, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-6.3.4, go-1.10.4-3.6.2, go1.10-1.10.7-1.5.3, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-4.3.5, golang-packaging-15.0.11-3.3.2 SUSE Linux Enterprise Module for Containers 15 (src): containerd-1.1.2-5.3.4, docker-18.06.1_ce-6.8.2, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-6.3.4, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-4.3.5
openSUSE-SU-2018:4306-1: An update that solves four vulnerabilities and has 17 fixes is now available. Category: security (important) Bug References: 1047218,1074971,1080978,1081495,1084533,1086185,1094680,1095817,1098017,1102522,1104821,1105000,1108038,1113313,1113978,1114209,1118897,1118898,1118899,1119634,1119706 CVE References: CVE-2018-16873,CVE-2018-16874,CVE-2018-16875,CVE-2018-7187 Sources used: openSUSE Leap 15.0 (src): containerd-1.1.2-lp150.4.3.1, containerd-kubic-1.1.2-lp150.4.3.1, docker-18.06.1_ce-lp150.5.6.1, docker-kubic-18.06.1_ce-lp150.5.6.1, docker-runc-1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.3.1, docker-runc-kubic-1.0.0rc5+gitr3562_69663f0bd4b6-lp150.5.3.1, go-1.10.4-lp150.2.7.1, go1.10-1.10.7-lp150.2.1, golang-github-docker-libnetwork-0.7.0.1+gitr2664_3ac297bc7fd0-lp150.3.3.1, golang-github-docker-libnetwork-kubic-0.7.0.1+gitr2664_3ac297bc7fd0-lp150.3.3.1, golang-packaging-15.0.11-lp150.2.3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/663360 Factory / libqt5-qtbase
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/667732 Factory / libqt5-qtwebengine
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/683607 Factory / pcp
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/683832 Factory / pcp
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/685573 15.1 / sigil
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/698198 Backports:SLE-12 / inotify-tools
openSUSE-RU-2019:1329-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: Sources used: SUSE Package Hub for SUSE Linux Enterprise 12 (src): inotify-tools-3.20.1-2.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/711483 15.0 / libheimdal https://build.opensuse.org/request/show/711484 15.1 / libheimdal
openSUSE-SU-2019:1682-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1047218,1084909 CVE References: CVE-2018-16860,CVE-2019-12098 Sources used: openSUSE Leap 42.3 (src): libheimdal-7.7.0-12.1 openSUSE Leap 15.1 (src): libheimdal-7.7.0-lp151.3.3.1 openSUSE Leap 15.0 (src): libheimdal-7.7.0-lp150.2.3.1
openSUSE-SU-2019:1688-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1047218,1084909 CVE References: CVE-2018-16860,CVE-2019-12098 Sources used: openSUSE Backports SLE-15 (src): libheimdal-7.7.0-bp150.2.3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/720992 Backports:SLE-12-SP2 / exo+libgarcon+libxfce4ui+libxfce4util+perl-ExtUtils-Depends+perl-ExtUtils-PkgConfig+perl-Glib+thunar+xfce4-dev-tools+xfce4-panel+xfconf
openSUSE-SU-2019:1888-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1047218,1084909 CVE References: CVE-2018-16860,CVE-2019-12098 Sources used: openSUSE Backports SLE-15-SP1 (src): libheimdal-7.7.0-bp151.4.3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/733319 Factory / latex2html
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/734018 Factory / latex2html
openSUSE-RU-2019:2305-1: An update that solves one vulnerability and has 10 fixes is now available. Category: recommended (moderate) Bug References: 1011518,1047218,1135362,637694,687874,760492,764310,767145,829113,860479,952324 CVE References: CVE-2011-1588 Sources used: SUSE Package Hub for SUSE Linux Enterprise 12 (src): exo-0.12.0-2.1, libgarcon-0.6.1-2.1, libxfce4ui-4.12.1-2.1, libxfce4util-4.12.1-2.1, perl-ExtUtils-Depends-0.405-2.1, perl-ExtUtils-PkgConfig-1.160000-2.1, perl-Glib-1.326-2.1, thunar-1.6.14-2.1, xfce4-dev-tools-4.12.0-2.1, xfce4-panel-4.12.2-2.1, xfconf-4.12.1-2.1
SUSE-RU-2020:0425-1: An update that has 12 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1074890,1078364,1080259,1084909,1086821,1091714,1098653,1116458,1125651,1132949,1155863 CVE References: Sources used: SUSE Linux Enterprise Module for HPC 15-SP1 (src): openmpi_3_1_4-gnu-hpc-3.1.4-3.3.8 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/788201 Factory / pmix
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/795321 Backports:SLE-12 / redis
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/795331 15.1+Backports:SLE-12+Backports:SLE-15-SP1 / redis
openSUSE-RU-2020:0546-1: An update that has two recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1169810 CVE References: Sources used: SUSE Package Hub for SUSE Linux Enterprise 12 (src): redis-4.0.14-21.1
openSUSE-RU-2020:0546-1: An update that has two recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1169810 CVE References: Sources used: openSUSE Leap 15.1 (src): redis-4.0.14-lp151.2.3.1 openSUSE Backports SLE-15-SP1 (src): redis-4.0.14-bp151.3.3.1 SUSE Package Hub for SUSE Linux Enterprise 12 (src): redis-4.0.14-21.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/800294 15.2 / openmpi3
openSUSE-RU-2020:0695-1: An update that has three recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1166114,833999 CVE References: Sources used: openSUSE Leap 15.1 (src): shorewall-5.2.4.4-lp151.3.3.1
openSUSE-RU-2020:0762-1: An update that has three recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1166114,833999 CVE References: Sources used: openSUSE Backports SLE-15-SP1 (src): shorewall-5.2.4.4-bp151.4.3.1
SUSE-SU-2020:1573-1: An update that solves four vulnerabilities and has 16 fixes is now available. Category: security (moderate) Bug References: 1041090,1047218,1048688,1086909,1094448,1095603,1102920,1121353,1129568,1138908,1144068,1151876,1156450,1159002,1159003,1159004,1159539,1162651,1167073,1169506 CVE References: CVE-2019-18801,CVE-2019-18802,CVE-2019-18836,CVE-2019-18838 Sources used: SUSE CaaS Platform 4.0 (src): caasp-release-4.2.1-24.23.4, skuba-1.3.5-3.39.1, terraform-provider-vsphere-1.17.3-3.3.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/829761 15.1+15.2 / fossil
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/829799 15.1 / fossil
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/829809 15.1+15.2+Backports:SLE-15-SP1+Backports:SLE-15-SP2 / fossil
openSUSE-SU-2020:1478-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1047218,1175760 CVE References: CVE-2020-24614 JIRA References: Sources used: openSUSE Leap 15.2 (src): fossil-2.12.1-lp152.2.3.1 openSUSE Leap 15.1 (src): fossil-2.12.1-lp151.3.6.1 openSUSE Backports SLE-15-SP2 (src): fossil-2.12.1-bp152.2.3.1 openSUSE Backports SLE-15-SP1 (src): fossil-2.12.1-bp151.4.6.1
SUSE-OU-2020:3291-1: An update that solves 7 vulnerabilities, contains four features and has two fixes is now available. Category: optional (moderate) Bug References: 1002351,1047218,1061967,1064980,1097430,1131555,798455,835815,991250 CVE References: CVE-2013-7458,CVE-2015-8080,CVE-2016-10517,CVE-2016-8339,CVE-2017-15047,CVE-2018-11218,CVE-2018-11219 JIRA References: ECO-2417,ECO-2867,SLE-11578,SLE-12821 Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): redis-6.0.8-1.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/857923 Factory / minikube
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/858976 Factory / rabbitmq-c
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/875986 Factory / kismet
SUSE-RU-2021:0984-1: An update that has two recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1047218,1177104 CVE References: JIRA References: ECO-2779 Sources used: SUSE Manager Server 4.0 (src): x3270-3.6-3.3.5 SUSE Manager Retail Branch Server 4.0 (src): x3270-3.6-3.3.5 SUSE Manager Proxy 4.0 (src): x3270-3.6-3.3.5 SUSE Linux Enterprise Server for SAP 15-SP1 (src): x3270-3.6-3.3.5 SUSE Linux Enterprise Server 15-SP1-LTSS (src): x3270-3.6-3.3.5 SUSE Linux Enterprise Server 15-SP1-BCL (src): x3270-3.6-3.3.5 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): x3270-3.6-3.3.5 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): x3270-3.6-3.3.5 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): x3270-3.6-3.3.5 SUSE Enterprise Storage 6 (src): x3270-3.6-3.3.5 SUSE CaaS Platform 4.0 (src): x3270-3.6-3.3.5 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:0499-1: An update that has two recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1177104 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): x3270-3.6-lp152.4.3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/885505 Backports:SLE-15-SP3 / multus https://build.opensuse.org/request/show/885507 Backports:SLE-15-SP3 / nmh https://build.opensuse.org/request/show/885508 Backports:SLE-15-SP3 / plowshare https://build.opensuse.org/request/show/885509 Backports:SLE-15-SP3 / pythia https://build.opensuse.org/request/show/885513 Backports:SLE-15-SP3 / stressapptest https://build.opensuse.org/request/show/885514 Backports:SLE-15-SP3 / surfraw https://build.opensuse.org/request/show/885515 Backports:SLE-15-SP3 / uperf https://build.opensuse.org/request/show/885516 Backports:SLE-15-SP3 / vboot https://build.opensuse.org/request/show/885539 Backports:SLE-15-SP3 / enblend-enfuse
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/885554 Backports:SLE-15-SP3 / kismet
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/886022 Backports:SLE-15-SP3 / pythia
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/900044 Factory / ipxe
SUSE-RU-2021:2173-1: An update that has 5 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1040589,1047218,1182604,1185540,1186049 CVE References: JIRA References: SLE-17848 Sources used: SUSE MicroOS 5.0 (src): pcre-8.41-6.4.2 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): brp-check-suse-84.87+git20181106.224b37d-3.18.2 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): brp-check-suse-84.87+git20181106.224b37d-3.18.2 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): automake-1.15.1-4.10.2, pcre-8.41-6.4.2 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): automake-1.15.1-4.10.2, pcre-8.41-6.4.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:0963-1: An update that has 5 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1040589,1047218,1182604,1185540,1186049 CVE References: JIRA References: SLE-17848 Sources used: openSUSE Leap 15.2 (src): automake-1.15.1-lp152.5.3.1, automake-testsuite-1.15.1-lp152.5.3.1, brp-check-suse-84.87+git20181106.224b37d-lp152.2.12.1, pcre-8.41-lp152.7.3.1
SUSE-OU-2021:2249-1: An update that has two optional fixes can now be installed. Category: optional (low) Bug References: 1047218,1186579 CVE References: JIRA References: Sources used: SUSE MicroOS 5.0 (src): gnutls-3.6.7-14.13.5 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): gnutls-3.6.7-14.13.5 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): gnutls-3.6.7-14.13.5 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/904341 Backports:SLE-12-SP4 / xdotool
openSUSE-OU-2021:1007-1: An update that has two optional fixes can now be installed. Category: optional (low) Bug References: 1047218,1186579 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): gnutls-3.6.7-lp152.9.12.1
openSUSE-RU-2021:2173-1: An update that has 5 recommended fixes and contains one feature can now be installed. Category: recommended (moderate) Bug References: 1040589,1047218,1182604,1185540,1186049 CVE References: JIRA References: SLE-17848 Sources used: openSUSE Leap 15.3 (src): automake-1.15.1-4.10.2, brp-check-suse-84.87+git20181106.224b37d-3.18.2, pcre-8.41-6.4.2
openSUSE-OU-2021:2249-1: An update that has two optional fixes can now be installed. Category: optional (low) Bug References: 1047218,1186579 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): gnutls-3.6.7-14.13.5
openSUSE-SU-2021:1070-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1047218,1175760 CVE References: CVE-2020-24614 JIRA References: Sources used: openSUSE Backports SLE-15-SP2 (src): fossil-2.12.1-bp152.2.9.1
openSUSE-RU-2021:2444-1: An update that has one recommended fix can now be installed. Category: recommended (low) Bug References: 1047218 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): autogen-5.18.12-3.3.1
SUSE-RU-2021:2444-1: An update that has one recommended fix can now be installed. Category: recommended (low) Bug References: 1047218 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): autogen-5.18.12-3.3.1 SUSE Linux Enterprise Module for Development Tools 15-SP2 (src): autogen-5.18.12-3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): autogen-5.18.12-3.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): autogen-5.18.12-3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2021:1090-1: An update that has one recommended fix can now be installed. Category: recommended (low) Bug References: 1047218 CVE References: JIRA References: Sources used: openSUSE Leap 15.2 (src): autogen-5.18.12-lp152.4.3.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/913034 Factory / python-PyQt6-3D https://build.opensuse.org/request/show/913035 Factory / python-PyQt6-Charts https://build.opensuse.org/request/show/913036 Factory / python-PyQt6-NetworkAuth https://build.opensuse.org/request/show/913037 Factory / python-pyqt-builder
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/913886 Factory / python-PyQt6-DataVisualization
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/922815 Backports:SLE-15-SP4 / ipxe
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/927815 15.2 / mailman
openSUSE-SU-2021:1436-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1047218,1191959,1191960 CVE References: CVE-2021-42096,CVE-2021-42097 JIRA References: Sources used: openSUSE Leap 15.2 (src): mailman-2.1.35-lp152.7.6.1
openSUSE-SU-2021:1452-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (important) Bug References: 1047218,1191959,1191960 CVE References: CVE-2021-42096,CVE-2021-42097 JIRA References: Sources used: openSUSE Backports SLE-15-SP2 (src): mailman-2.1.35-bp152.7.6.1
SUSE-RU-2022:0047-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): wsmancli-2.6.0-7.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): wsmancli-2.6.0-7.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/948953 Factory / rekor https://build.opensuse.org/request/show/948970 Factory / cosign
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/950709 Factory / complexity
openSUSE-RU-2022:0313-1: An update that has three recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1133133,1160270 CVE References: JIRA References: Sources used: openSUSE Leap 15.3 (src): infinipath-psm-3.3-5.3.1
SUSE-RU-2022:0313-1: An update that has three recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1133133,1160270 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Realtime Extension 15-SP2 (src): infinipath-psm-3.3-5.3.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): infinipath-psm-3.3-5.3.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): infinipath-psm-3.3-5.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/952042 Factory / micro-editor
openSUSE-RU-2022:0546-1: An update that has three recommended fixes and contains one feature can now be installed. Category: recommended (important) Bug References: 1047218,1114483,1191011 CVE References: JIRA References: SLE-23324 Sources used: openSUSE Leap 15.4 (src): freeradius-client-1.1.7-3.2.1, monitoring-plugins-2.3.1-3.9.2, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 openSUSE Leap 15.3 (src): freeradius-client-1.1.7-3.2.1, monitoring-plugins-2.3.1-3.9.2, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1
SUSE-RU-2022:0546-1: An update that has three recommended fixes and contains one feature can now be installed. Category: recommended (important) Bug References: 1047218,1114483,1191011 CVE References: JIRA References: SLE-23324 Sources used: SUSE Manager Server 4.1 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Manager Retail Branch Server 4.1 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Manager Proxy 4.1 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server for SAP 15 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Server 15-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Realtime Extension 15-SP2 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Module for Server Applications 15-SP4 (src): freeradius-client-1.1.7-3.2.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): freeradius-client-1.1.7-3.2.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): freeradius-client-1.1.7-3.2.1, monitoring-plugins-2.3.1-3.9.2, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Module for Development Tools 15-SP4 (src): perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise Module for Development Tools 15-SP3 (src): perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Linux Enterprise High Availability 15-SP4 (src): monitoring-plugins-2.3.1-3.9.2 SUSE Linux Enterprise High Availability 15-SP3 (src): monitoring-plugins-2.3.1-3.9.2 SUSE Linux Enterprise High Availability 15-SP2 (src): monitoring-plugins-2.3.1-3.9.2 SUSE Linux Enterprise High Availability 15-SP1 (src): monitoring-plugins-2.3.1-3.9.2 SUSE Linux Enterprise High Availability 15 (src): monitoring-plugins-2.3.1-3.9.2 SUSE Enterprise Storage 7 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE Enterprise Storage 6 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 SUSE CaaS Platform 4.0 (src): freeradius-client-1.1.7-3.2.1, perl-Crypt-DES-2.07-3.2.1, perl-Crypt-Rijndael-1.13-3.2.1, perl-Net-SNMP-6.0.1-3.2.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2022:0688-1: An update that has 7 recommended fixes can now be installed. Category: recommended (moderate) Bug References: 1047218,1114483,1132350,1132903,1133107,1191011,914486 CVE References: JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): monitoring-plugins-2.3.1-4.6.1 SUSE OpenStack Cloud Crowbar 8 (src): monitoring-plugins-2.3.1-4.6.1 SUSE OpenStack Cloud 9 (src): monitoring-plugins-2.3.1-4.6.1 SUSE OpenStack Cloud 8 (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server 12-SP5 (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): monitoring-plugins-2.3.1-4.6.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): monitoring-plugins-2.3.1-4.6.1 HPE Helion Openstack 8 (src): monitoring-plugins-2.3.1-4.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2022:0947-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: JIRA References: Sources used: SUSE Linux Enterprise Realtime Extension 15-SP2 (src): dapl-2.1.10-3.6.1, dapl-debug-2.1.10-3.6.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): dapl-2.1.10-3.6.1, dapl-debug-2.1.10-3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-RU-2022:0947-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: JIRA References: Sources used: openSUSE Leap 15.4 (src): dapl-2.1.10-3.6.1, dapl-debug-2.1.10-3.6.1 openSUSE Leap 15.3 (src): dapl-2.1.10-3.6.1, dapl-debug-2.1.10-3.6.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/976465 Factory / golang-github-prometheus-promu
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1073670 Factory / golangci-lint
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1073723 Micro:5.4 / cockpit
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1077873 Factory / openvas-smb
SUSE-SU-2023:2183-1: An update that solves four vulnerabilities, contains four features and has eight fixes can now be installed. Category: security (important) Bug References: 1047218, 1197284, 1203185, 1203599, 1204023, 1208049, 1208051, 1208060, 1208062, 1208064, 1208965, 1209113 CVE References: CVE-2022-27191, CVE-2022-27664, CVE-2022-41715, CVE-2022-46146 Jira References: MSQA-663, MSQA-665, PED-3576, PED-3578 Sources used: SUSE OpenStack Cloud 9 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE OpenStack Cloud Crowbar 9 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Manager Client Tools for SLE 12 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4, golang-github-prometheus-prometheus-2.37.6-1.44.3, prometheus-postgres_exporter-0.10.1-1.11.5, golang-github-prometheus-promu-0.14.0-1.12.1, golang-github-prometheus-alertmanager-0.23.0-1.18.3, prometheus-blackbox_exporter-0.19.0-1.17.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Linux Enterprise Server 12 SP5 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): golang-github-prometheus-node_exporter-1.5.0-1.24.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2579-1: An update that solves 16 vulnerabilities, contains four features and has one fix can now be installed. Category: security (moderate) Bug References: 1047218, 1192154, 1192696, 1200480, 1201535, 1201539, 1203185, 1203596, 1203597, 1203599, 1204501, 1207830, 1208719, 1208965, 1209645, 1210458, 1210907 CVE References: CVE-2020-7753, CVE-2021-3807, CVE-2021-3918, CVE-2021-43138, CVE-2022-0155, CVE-2022-27191, CVE-2022-27664, CVE-2022-31097, CVE-2022-31107, CVE-2022-32149, CVE-2022-35957, CVE-2022-36062, CVE-2022-41715, CVE-2022-46146, CVE-2023-1387, CVE-2023-1410 Jira References: MSQA-666, PED-3576, PED-3578, PED-3694 Sources used: SUSE Manager Client Tools for SLE 12 (src): mgr-daemon-4.3.7-1.41.1, uyuni-common-libs-4.3.8-1.33.1, zypp-plugin-spacewalk-1.0.14-30.42.1, spacecmd-4.3.21-38.121.1, grafana-9.5.1-1.48.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1108146 Backports:SLE-15-SP5 / ipxe
SUSE-RU-2023:3956-1: An update that solves 221 vulnerabilities and contains three features can now be installed. Category: recommended (moderate) Bug References: 1001367, 1005555, 1005558, 1005562, 1005564, 1005566, 1005569, 1005581, 1005582, 1006539, 1008253, 1012075, 1013882, 1019948, 1020873, 1020875, 1020877, 1020878, 1020882, 1020884, 1020885, 1020890, 1020891, 1020894, 1020896, 1020976, 1022428, 1038740, 1039034, 1041525, 1041891, 1042632, 1043328, 1047218, 1055165, 1055268, 1058374, 1058729, 1060110, 1062583, 1067443, 1068906, 1069401, 1080891, 1083087, 1088681, 1092544, 1098683, 1101676, 1101677, 1101678, 1103342, 1111858, 1111859, 1112368, 1112377, 1112384, 1112386, 1112391, 1112397, 1112404, 1112415, 1112417, 1112421, 1112432, 1112767, 1116686, 1118754, 1120041, 1122198, 1122475, 1127027, 1132666, 1136035, 1142909, 1143215, 1144314, 1156669, 1160285, 1160868, 1160878, 1160883, 1160895, 1160912, 1166781, 1168380, 1170204, 1173028, 1173516, 1174559, 1175596, 1177472, 1178428, 1180014, 1182218, 1182255, 1182739, 1183770, 1185870, 1185872, 1186031, 1189320, 1192497, 1195325, 1195334, 1195339, 1196016, 1197459, 1198603, 1198604, 1198605, 1198606, 1198607, 1198609, 1198610, 1198611, 1198612, 1198613, 1198628, 1198629, 1198630, 1198631, 1198632, 1198633, 1198634, 1198635, 1198636, 1198637, 1198638, 1198639, 1198640, 1199928, 1200105, 1201161, 1201163, 1201164, 1201165, 1201166, 1201167, 1201168, 1201169, 1201170, 1202863, 332530, 353120, 357634, 359522, 366820, 371000, 387746, 420313, 425079, 427384, 429618, 435519, 437293, 463586, 520876, 525065, 525325, 539243, 539249, 557669, 635645, 747811, 763150, 779476, 789263, 792444, 796164, 829430, 841709, 859345, 889126, 894479, 902396, 914370, 921955, 934789, 937754, 937767, 937787, 942908, 943096, 957174, 963810, 971456, 979524, 983938, 984858, 986251, 989913, 989919, 989922, 989926, 990890, 998309 CVE References: CVE-2006-0903, CVE-2006-4226, CVE-2006-4227, CVE-2007-5969, CVE-2007-5970, CVE-2007-6303, CVE-2007-6304, CVE-2008-2079, CVE-2008-7247, CVE-2009-4019, CVE-2009-4028, CVE-2009-4030, CVE-2012-4414, CVE-2012-5611, CVE-2012-5612, CVE-2012-5615, CVE-2012-5627, CVE-2013-1976, CVE-2015-4792, CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4895, CVE-2015-4913, CVE-2015-5969, CVE-2015-7744, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0610, CVE-2016-0616, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0644, CVE-2016-0646, CVE-2016-0649, CVE-2016-0650, CVE-2016-0651, CVE-2016-0668, CVE-2016-2047, CVE-2016-3477, CVE-2016-3492, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440, CVE-2016-5584, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6662, CVE-2016-6663, CVE-2016-6664, CVE-2016-7440, CVE-2016-8283, CVE-2016-9843, CVE-2017-10268, CVE-2017-10286, CVE-2017-10320, CVE-2017-10365, CVE-2017-10378, CVE-2017-10379, CVE-2017-10384, CVE-2017-15365, CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3257, CVE-2017-3258, CVE-2017-3265, CVE-2017-3291, CVE-2017-3302, CVE-2017-3308, CVE-2017-3309, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3453, CVE-2017-3456, CVE-2017-3464, CVE-2017-3636, CVE-2017-3641, CVE-2017-3653, CVE-2018-25032, CVE-2018-2562, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2665, CVE-2018-2668, CVE-2018-2755, CVE-2018-2759, CVE-2018-2761, CVE-2018-2766, CVE-2018-2767, CVE-2018-2771, CVE-2018-2777, CVE-2018-2781, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2813, CVE-2018-2817, CVE-2018-2819, CVE-2018-3058, CVE-2018-3060, CVE-2018-3063, CVE-2018-3064, CVE-2018-3066, CVE-2018-3143, CVE-2018-3156, CVE-2018-3162, CVE-2018-3173, CVE-2018-3174, CVE-2018-3185, CVE-2018-3200, CVE-2018-3251, CVE-2018-3277, CVE-2018-3282, CVE-2018-3284, CVE-2019-18901, CVE-2019-2510, CVE-2019-2537, CVE-2019-2614, CVE-2019-2627, CVE-2019-2628, CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2758, CVE-2019-2805, CVE-2019-2938, CVE-2019-2974, CVE-2020-13249, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789, CVE-2020-14812, CVE-2020-15180, CVE-2020-2574, CVE-2020-2752, CVE-2020-2760, CVE-2020-2812, CVE-2020-2814, CVE-2020-7221, CVE-2021-2154, CVE-2021-2166, CVE-2021-2372, CVE-2021-2389, CVE-2021-27928, CVE-2021-35604, CVE-2021-46657, CVE-2021-46658, CVE-2021-46659, CVE-2021-46661, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46668, CVE-2021-46669, CVE-2022-21427, CVE-2022-21595, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-27376, CVE-2022-27377, CVE-2022-27378, CVE-2022-27379, CVE-2022-27380, CVE-2022-27381, CVE-2022-27382, CVE-2022-27383, CVE-2022-27384, CVE-2022-27386, CVE-2022-27387, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-27458, CVE-2022-32081, CVE-2022-32083, CVE-2022-32084, CVE-2022-32085, CVE-2022-32086, CVE-2022-32087, CVE-2022-32088, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015 Jira References: PED-2455, SLE-12253, SLE-8269 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): mariadb104-10.4.30-150100.3.5.10, python-mysqlclient-1.4.6-150100.3.3.7 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): mariadb104-10.4.30-150100.3.5.10, python-mysqlclient-1.4.6-150100.3.3.7 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): mariadb104-10.4.30-150100.3.5.10, python-mysqlclient-1.4.6-150100.3.3.7 SUSE CaaS Platform 4.0 (src): mariadb104-10.4.30-150100.3.5.10, python-mysqlclient-1.4.6-150100.3.3.7 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1115613 Backports:SLE-15-SP4 / seamonkey https://build.opensuse.org/request/show/1115614 Backports:SLE-15-SP5 / seamonkey
openSUSE-RU-2023:0294-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): seamonkey-2.53.17.1-bp154.2.14.1
openSUSE-RU-2023:0296-1: An update that has one recommended fix can now be installed. Category: recommended (moderate) Bug References: 1047218 CVE References: JIRA References: Sources used: openSUSE Backports SLE-15-SP5 (src): seamonkey-2.53.17.1-bp155.2.6.1
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1117995 Factory / python-quantities
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1125194 Factory / amber-cli
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1127168 15.6 / seamonkey
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1134213 Factory / metamail
SUSE-RU-2023:4991-1: An update that solves 221 vulnerabilities and contains three features can now be installed. Category: recommended (moderate) Bug References: 1001367, 1005555, 1005558, 1005562, 1005564, 1005566, 1005569, 1005581, 1005582, 1006539, 1008253, 1012075, 1013882, 1019948, 1020873, 1020875, 1020877, 1020878, 1020882, 1020884, 1020885, 1020890, 1020891, 1020894, 1020896, 1020976, 1022428, 1038740, 1039034, 1041525, 1041891, 1042632, 1043328, 1047218, 1055165, 1055268, 1058374, 1058729, 1060110, 1062583, 1067443, 1068906, 1069401, 1080891, 1083087, 1088681, 1092544, 1098683, 1101676, 1101677, 1101678, 1103342, 1111858, 1111859, 1112368, 1112377, 1112384, 1112386, 1112391, 1112397, 1112404, 1112415, 1112417, 1112421, 1112432, 1112767, 1116686, 1118754, 1120041, 1122198, 1122475, 1127027, 1132666, 1136035, 1142909, 1143215, 1144314, 1156669, 1160285, 1160868, 1160878, 1160883, 1160895, 1160912, 1166781, 1168380, 1170204, 1173028, 1173516, 1174559, 1175596, 1177472, 1178428, 1180014, 1182218, 1182255, 1182739, 1183770, 1185870, 1185872, 1186031, 1189320, 1192497, 1195325, 1195334, 1195339, 1196016, 1197459, 1198603, 1198604, 1198605, 1198606, 1198607, 1198609, 1198610, 1198611, 1198612, 1198613, 1198628, 1198629, 1198630, 1198631, 1198632, 1198633, 1198634, 1198635, 1198636, 1198637, 1198638, 1198639, 1198640, 1199928, 1200105, 1201161, 1201163, 1201164, 1201165, 1201166, 1201167, 1201168, 1201169, 1201170, 1202863, 332530, 353120, 357634, 359522, 366820, 371000, 387746, 420313, 425079, 427384, 429618, 435519, 437293, 463586, 520876, 525065, 525325, 539243, 539249, 557669, 635645, 747811, 763150, 779476, 789263, 792444, 796164, 829430, 841709, 859345, 889126, 894479, 902396, 914370, 921955, 934789, 937754, 937767, 937787, 942908, 943096, 957174, 963810, 971456, 979524, 983938, 984858, 986251, 989913, 989919, 989922, 989926, 990890, 998309 CVE References: CVE-2006-0903, CVE-2006-4226, CVE-2006-4227, CVE-2007-5969, CVE-2007-5970, CVE-2007-6303, CVE-2007-6304, CVE-2008-2079, CVE-2008-7247, CVE-2009-4019, CVE-2009-4028, CVE-2009-4030, CVE-2012-4414, CVE-2012-5611, CVE-2012-5612, CVE-2012-5615, CVE-2012-5627, CVE-2013-1976, CVE-2015-4792, CVE-2015-4802, CVE-2015-4807, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4864, CVE-2015-4866, CVE-2015-4870, CVE-2015-4879, CVE-2015-4895, CVE-2015-4913, CVE-2015-5969, CVE-2015-7744, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0610, CVE-2016-0616, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0644, CVE-2016-0646, CVE-2016-0649, CVE-2016-0650, CVE-2016-0651, CVE-2016-0668, CVE-2016-2047, CVE-2016-3477, CVE-2016-3492, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440, CVE-2016-5584, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6662, CVE-2016-6663, CVE-2016-6664, CVE-2016-7440, CVE-2016-8283, CVE-2016-9843, CVE-2017-10268, CVE-2017-10286, CVE-2017-10320, CVE-2017-10365, CVE-2017-10378, CVE-2017-10379, CVE-2017-10384, CVE-2017-15365, CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3257, CVE-2017-3258, CVE-2017-3265, CVE-2017-3291, CVE-2017-3302, CVE-2017-3308, CVE-2017-3309, CVE-2017-3312, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3453, CVE-2017-3456, CVE-2017-3464, CVE-2017-3636, CVE-2017-3641, CVE-2017-3653, CVE-2018-25032, CVE-2018-2562, CVE-2018-2612, CVE-2018-2622, CVE-2018-2640, CVE-2018-2665, CVE-2018-2668, CVE-2018-2755, CVE-2018-2759, CVE-2018-2761, CVE-2018-2766, CVE-2018-2767, CVE-2018-2771, CVE-2018-2777, CVE-2018-2781, CVE-2018-2782, CVE-2018-2784, CVE-2018-2786, CVE-2018-2787, CVE-2018-2810, CVE-2018-2813, CVE-2018-2817, CVE-2018-2819, CVE-2018-3058, CVE-2018-3060, CVE-2018-3063, CVE-2018-3064, CVE-2018-3066, CVE-2018-3143, CVE-2018-3156, CVE-2018-3162, CVE-2018-3173, CVE-2018-3174, CVE-2018-3185, CVE-2018-3200, CVE-2018-3251, CVE-2018-3277, CVE-2018-3282, CVE-2018-3284, CVE-2019-18901, CVE-2019-2510, CVE-2019-2537, CVE-2019-2614, CVE-2019-2627, CVE-2019-2628, CVE-2019-2737, CVE-2019-2739, CVE-2019-2740, CVE-2019-2758, CVE-2019-2805, CVE-2019-2938, CVE-2019-2974, CVE-2020-13249, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789, CVE-2020-14812, CVE-2020-15180, CVE-2020-2574, CVE-2020-2752, CVE-2020-2760, CVE-2020-2812, CVE-2020-2814, CVE-2020-7221, CVE-2021-2154, CVE-2021-2166, CVE-2021-2372, CVE-2021-2389, CVE-2021-27928, CVE-2021-35604, CVE-2021-46657, CVE-2021-46658, CVE-2021-46659, CVE-2021-46661, CVE-2021-46663, CVE-2021-46664, CVE-2021-46665, CVE-2021-46668, CVE-2021-46669, CVE-2022-21427, CVE-2022-21595, CVE-2022-24048, CVE-2022-24050, CVE-2022-24051, CVE-2022-24052, CVE-2022-27376, CVE-2022-27377, CVE-2022-27378, CVE-2022-27379, CVE-2022-27380, CVE-2022-27381, CVE-2022-27382, CVE-2022-27383, CVE-2022-27384, CVE-2022-27386, CVE-2022-27387, CVE-2022-27444, CVE-2022-27445, CVE-2022-27446, CVE-2022-27447, CVE-2022-27448, CVE-2022-27449, CVE-2022-27451, CVE-2022-27452, CVE-2022-27455, CVE-2022-27456, CVE-2022-27457, CVE-2022-27458, CVE-2022-32081, CVE-2022-32083, CVE-2022-32084, CVE-2022-32085, CVE-2022-32086, CVE-2022-32087, CVE-2022-32088, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015 Jira References: PED-2455, SLE-12253, SLE-8269 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): mariadb-connector-c-3.1.22-2.35.1, lz4-1.8.0-3.5.2, python-mysqlclient-1.3.14-8.9.2, mariadb104-10.4.30-8.5.46 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): mariadb-connector-c-3.1.22-2.35.1, lz4-1.8.0-3.5.2, python-mysqlclient-1.3.14-8.9.2, mariadb104-10.4.30-8.5.46 SUSE Linux Enterprise Server 12 SP5 (src): mariadb-connector-c-3.1.22-2.35.1, lz4-1.8.0-3.5.2, python-mysqlclient-1.3.14-8.9.2, mariadb104-10.4.30-8.5.46 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): mariadb-connector-c-3.1.22-2.35.1, lz4-1.8.0-3.5.2, python-mysqlclient-1.3.14-8.9.2, mariadb104-10.4.30-8.5.46 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-RU-2024:0093-1: An update that has one fix can now be installed. Category: recommended (moderate) Bug References: 1047218 Sources used: openSUSE Leap 15.5 (src): stringtemplate4-4.3.3-150200.3.7.11, antlr3-3.5.3-150200.3.16.1, stringtemplate4-bootstrap-4.3.3-150200.3.7.11, antlr3-bootstrap-3.5.3-150200.3.16.1, antlr3-java-3.5.3-150200.3.16.1 SUSE Manager Server 4.3 Module 4.3 (src): antlr3-java-3.5.3-150200.3.16.1 openSUSE Leap 15.4 (src): stringtemplate4-4.3.3-150200.3.7.11, antlr3-3.5.3-150200.3.16.1, stringtemplate4-bootstrap-4.3.3-150200.3.7.11, antlr3-bootstrap-3.5.3-150200.3.16.1, antlr3-java-3.5.3-150200.3.16.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0191-1: An update that solves 45 vulnerabilities, contains 17 features and has 30 security fixes can now be installed. Category: security (moderate) Bug References: 1047218, 1172110, 1188571, 1189520, 1191454, 1192154, 1192383, 1192696, 1192763, 1193492, 1193686, 1193688, 1194873, 1195726, 1195727, 1195728, 1196338, 1196652, 1197507, 1198903, 1199810, 1200480, 1200591, 1200725, 1201003, 1201059, 1201535, 1201539, 1203283, 1203596, 1203597, 1203599, 1204032, 1204089, 1204126, 1204302, 1204303, 1204304, 1204305, 1204501, 1205207, 1205225, 1205227, 1205759, 1207352, 1207749, 1207750, 1207830, 1208046, 1208049, 1208051, 1208060, 1208062, 1208064, 1208065, 1208270, 1208293, 1208298, 1208612, 1208692, 1208719, 1208819, 1208821, 1208965, 1209113, 1209645, 1210458, 1210907, 1211525, 1212099, 1212100, 1212279, 1212641, 1218843, 1218844 CVE References: CVE-2020-7753, CVE-2021-36222, CVE-2021-3711, CVE-2021-3807, CVE-2021-3918, CVE-2021-39226, CVE-2021-41174, CVE-2021-41244, CVE-2021-43138, CVE-2021-43798, CVE-2021-43813, CVE-2021-43815, CVE-2022-0155, CVE-2022-21673, CVE-2022-21698, CVE-2022-21702, CVE-2022-21703, CVE-2022-21713, CVE-2022-23552, CVE-2022-27191, CVE-2022-27664, CVE-2022-29170, CVE-2022-31097, CVE-2022-31107, CVE-2022-31123, CVE-2022-31130, CVE-2022-32149, CVE-2022-35957, CVE-2022-36062, CVE-2022-39201, CVE-2022-39229, CVE-2022-39306, CVE-2022-39307, CVE-2022-39324, CVE-2022-41715, CVE-2022-41723, CVE-2022-46146, CVE-2023-0507, CVE-2023-0594, CVE-2023-1387, CVE-2023-1410, CVE-2023-2183, CVE-2023-2801, CVE-2023-3128, CVE-2023-40577 Jira References: MSQA-718, PED-2145, PED-2617, PED-3576, PED-3578, PED-3694, PED-4556, PED-5405, PED-5406, PED-7353, SLE-23422, SLE-23439, SLE-24238, SLE-24239, SLE-24565, SLE-24791, SUMA-114 Sources used: SUSE Manager Client Tools Beta for SLE 12 (src): rhnlib-5.0.1-24.30.3, spacecmd-5.0.1-41.42.3, grafana-9.5.8-4.21.2, prometheus-postgres_exporter-0.10.1-3.6.4, golang-github-prometheus-node_exporter-1.5.0-4.15.4, golang-github-QubitProducts-exporter_exporter-0.4.0-4.6.2, system-user-grafana-1.0.0-3.7.2, kiwi-desc-saltboot-0.1.1687520761.cefb248-4.15.2, golang-github-prometheus-prometheus-2.45.0-4.33.3, supportutils-plugin-susemanager-client-5.0.1-9.15.2, uyuni-common-libs-5.0.1-3.33.3, prometheus-blackbox_exporter-0.24.0-3.6.3, golang-github-lusitaniae-apache_exporter-1.0.0-4.12.4, golang-github-prometheus-alertmanager-0.26.0-4.12.4, system-user-prometheus-1.0.0-3.7.2, python-hwdata-2.3.5-15.12.2, golang-github-boynux-squid_exporter-1.6-4.9.2, supportutils-plugin-salt-1.2.2-9.9.2, golang-github-prometheus-promu-0.14.0-4.12.2, mgr-push-5.0.1-4.21.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1166135 Backports:SLE-15-SP6 / musique
This is an autogenerated message for OBS integration: This bug (1047218) was mentioned in https://build.opensuse.org/request/show/1174126 Factory / kvirc