Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in unbound
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in unbound
ID: SUSE-SU-2024:1991-1
Distribution: SUSE
Plattformen: SUSE Manager Proxy 4.3, SUSE Enterprise Storage 7.1, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP2, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP2, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise High Performance Computing LTSS 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP2, SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Desktop 15 SP5, SUSE Package Hub 15 15-SP5, SUSE Linux Enterprise Micro 5.5, SUSE Basesystem Module 15-SP5, SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3, SUSE openSUSE Leap 15.5, SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
Datum: Di, 11. Juni 2024, 15:47
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699
Applikationen: Unbound

Originalnachricht

--===============8132089033115888892==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for unbound

Announcement ID: SUSE-SU-2024:1991-1
Rating: important
References:

* bsc#1202031
* bsc#1202033
* bsc#1203643
* bsc#1219823
* bsc#1219826
* jsc#PED-8333


Cross-References:

* CVE-2022-30698
* CVE-2022-30699
* CVE-2022-3204
* CVE-2023-50387
* CVE-2023-50868


CVSS scores:

* CVE-2022-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-30698 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-30699 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-30699 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-3204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50387 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50387 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-50868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* Basesystem Module 15-SP5
* openSUSE Leap 15.5
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Package Hub 15 15-SP5



An update that solves five vulnerabilities and contains one feature can now be
installed.

## Description:

This update for unbound fixes the following issues:

unbound was updated to 1.20.0:

* A lot of bugfixes and added features. For a complete list take a look at
the
changelog located at: /usr/share/doc/packages/unbound/Changelog or
https://www.nlnetlabs.nl/projects/unbound/download/

Some Noteworthy Changes:

* Removed DLV. The DLV has been decommisioned since unbound 1.5.4 and has
been
advised to stop using it since. The use of dlv options displays a warning.
* Remove EDNS lame procedure, do not re-query without EDNS after timeout.
* Add DNS over HTTPS
* libunbound has been upgraded to major version 8

Security Fixes: * CVE-2023-50387: DNSSEC verification complexity can be
exploited to exhaust CPU resources and stall DNS resolvers. [bsc#1219823] *
CVE-2023-50868: NSEC3 closest encloser proof can exhaust CPU. [bsc#1219826] *
CVE-2022-30698: Novel "ghost domain names" attack by introducing
subdomain
delegations. [bsc#1202033] * CVE-2022-30699: Novel "ghost domain names"
attack
by updating almost expired delegation information. [bsc#1202031] *
CVE-2022-3204: NRDelegation attack leads to uncontrolled resource consumption
(Non-Responsive Delegation Attack). [bsc#1203643]

Packaging Changes:

* Use prefixes instead of sudo in unbound.service
* Remove no longer necessary BuildRequires: libfstrm-devel and libprotobuf-c-
devel

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1991=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1991=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1991=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1991=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1991=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1991=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1991=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1991=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1991=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1991=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1991=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2024-1991=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1991=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1991=1

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1991=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2024-1991=1

* Basesystem Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1991=1

* SUSE Package Hub 15 15-SP5
zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1991=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1991=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Manager Proxy 4.3 (x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* unbound-python-debuginfo-1.20.0-150100.10.13.1
* unbound-1.20.0-150100.10.13.1
* unbound-python-1.20.0-150100.10.13.1
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* openSUSE Leap 15.5 (noarch)
* unbound-munin-1.20.0-150100.10.13.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1
* SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
* unbound-python-debuginfo-1.20.0-150100.10.13.1
* unbound-1.20.0-150100.10.13.1
* unbound-python-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(aarch64
x86_64)
* libunbound8-1.20.0-150100.10.13.1
* unbound-devel-1.20.0-150100.10.13.1
* unbound-debugsource-1.20.0-150100.10.13.1
* unbound-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-debuginfo-1.20.0-150100.10.13.1
* unbound-anchor-1.20.0-150100.10.13.1
* libunbound8-debuginfo-1.20.0-150100.10.13.1

## References:

* https://www.suse.com/security/cve/CVE-2022-30698.html
* https://www.suse.com/security/cve/CVE-2022-30699.html
* https://www.suse.com/security/cve/CVE-2022-3204.html
* https://www.suse.com/security/cve/CVE-2023-50387.html
* https://www.suse.com/security/cve/CVE-2023-50868.html
* https://bugzilla.suse.com/show_bug.cgi?id=1202031
* https://bugzilla.suse.com/show_bug.cgi?id=1202033
* https://bugzilla.suse.com/show_bug.cgi?id=1203643
* https://bugzilla.suse.com/show_bug.cgi?id=1219823
* https://bugzilla.suse.com/show_bug.cgi?id=1219826
* https://jira.suse.com/browse/PED-8333


--===============8132089033115888892==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for unbound</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1991-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202031">bsc#1202031</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202033">bsc#1202033</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203643">bsc#1203643</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219823">bsc#1219823</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219826">bsc#1219826</a>
</li>


<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-8333">jsc#PED-8333</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-30698.html">CVE-2022-30698</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-30699.html">CVE-2022-30699</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-3204.html">CVE-2022-3204</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-50387.html">CVE-2023-50387</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-50868.html">CVE-2023-50868</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-30698</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-30698</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-30699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-30699</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-3204</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-3204</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-50387</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-50387</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-50868</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">Basesystem
Module 15-SP5</li>

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">SUSE
Enterprise Storage 7.1</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3 LTSS 15-SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

<li class="list-group-item">SUSE Package
Hub 15 15-SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves five vulnerabilities and contains one
feature can now be installed.</p>





<h2>Description:</h2>

<p>This update for unbound fixes the following issues:</p>
<p>unbound was updated to 1.20.0:</p>
<ul>
<li>A lot of bugfixes and added features.
For a complete list take a look at the changelog located at:
/usr/share/doc/packages/unbound/Changelog or
https://www.nlnetlabs.nl/projects/unbound/download/</li>
</ul>
<p>Some Noteworthy Changes:</p>
<ul>
<li>Removed DLV. The DLV has been decommisioned since unbound
1.5.4 and has been advised to stop using it since. The use of
dlv options displays a warning.</li>
<li>Remove EDNS lame procedure, do not re-query without EDNS after
timeout.</li>
<li>Add DNS over HTTPS</li>
<li>libunbound has been upgraded to major version 8</li>
</ul>
<p>Security Fixes:
* CVE-2023-50387: DNSSEC verification complexity can be
exploited to exhaust CPU resources and stall DNS resolvers. [bsc#1219823]
* CVE-2023-50868: NSEC3 closest encloser proof can exhaust CPU.
[bsc#1219826]
* CVE-2022-30698: Novel &quot;ghost domain names&quot; attack by
introducing subdomain delegations. [bsc#1202033]
* CVE-2022-30699: Novel &quot;ghost domain names&quot; attack by
updating almost expired delegation information. [bsc#1202031]
* CVE-2022-3204: NRDelegation attack leads to uncontrolled
resource consumption (Non-Responsive Delegation Attack).
[bsc#1203643]</p>
<p>Packaging Changes:</p>
<ul>
<li>Use prefixes instead of sudo in unbound.service</li>
<li>Remove no longer necessary BuildRequires: libfstrm-devel and
libprotobuf-c-devel</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Manager Proxy 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Manager Retail Branch Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Manager Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Enterprise Storage 7.1


<br/>
<code>zypper in -t patch
SUSE-Storage-7.1-2024-1991=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.5-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.5


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.5-2024-1991=1</code>



</li>

<li class="list-group-item">
Basesystem Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Basesystem-15-SP5-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Package Hub 15 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1991=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1991=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP3 (aarch64 x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
ppc64le s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64
ppc64le s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(ppc64le x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3
(ppc64le x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(ppc64le x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Manager Proxy 4.3 (x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Manager Retail Branch Server 4.3 (x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Manager Server 4.3 (ppc64le s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>unbound-python-debuginfo-1.20.0-150100.10.13.1</li>

<li>unbound-1.20.0-150100.10.13.1</li>


<li>unbound-python-1.20.0-150100.10.13.1</li>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>unbound-munin-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>unbound-python-debuginfo-1.20.0-150100.10.13.1</li>

<li>unbound-1.20.0-150100.10.13.1</li>


<li>unbound-python-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (aarch64 x86_64)
<ul>


<li>libunbound8-1.20.0-150100.10.13.1</li>


<li>unbound-devel-1.20.0-150100.10.13.1</li>


<li>unbound-debugsource-1.20.0-150100.10.13.1</li>


<li>unbound-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-debuginfo-1.20.0-150100.10.13.1</li>


<li>unbound-anchor-1.20.0-150100.10.13.1</li>


<li>libunbound8-debuginfo-1.20.0-150100.10.13.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2022-30698.html">https://www.suse.com/security/cve/CVE-2022-30698.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-30699.html">https://www.suse.com/security/cve/CVE-2022-30699.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-3204.html">https://www.suse.com/security/cve/CVE-2022-3204.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-50387.html">https://www.suse.com/security/cve/CVE-2023-50387.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-50868.html">https://www.suse.com/security/cve/CVE-2023-50868.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202031">https://bugzilla.suse.com/show_bug.cgi?id=1202031</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1202033">https://bugzilla.suse.com/show_bug.cgi?id=1202033</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1203643">https://bugzilla.suse.com/show_bug.cgi?id=1203643</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219823">https://bugzilla.suse.com/show_bug.cgi?id=1219823</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1219826">https://bugzilla.suse.com/show_bug.cgi?id=1219826</a>
</li>



<li>
<a href="https://jira.suse.com/browse/PED-8333">https://jira.suse.com/browse/PED-8333</a>
</li>


</ul>

</div>

--===============8132089033115888892==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung