SUSE-CU-2023:2047-1: Security update of suse/manager/4.3/proxy-httpd

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Jun 21 15:35:50 UTC 2023


SUSE Container Update Advisory: suse/manager/4.3/proxy-httpd
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:2047-1
Container Tags        : suse/manager/4.3/proxy-httpd:4.3.6 , suse/manager/4.3/proxy-httpd:4.3.6.9.31.1 , suse/manager/4.3/proxy-httpd:latest
Container Release     : 9.31.1
Severity              : important
Type                  : security
References            : 1127591 1186870 1191112 1194715 1195633 1198097 1199020 1199282
                        1201063 1201063 1202234 1203141 1203355 1203537 1203599 1203599
                        1203750 1204089 1204089 1204270 1204270 1204549 1204900 1204900
                        1205529 1205600 1205600 1206060 1206060 1206191 1206191 1206423
                        1206423 1206513 1206725 1206725 1206783 1206783 1207063 1207063
                        1207327 1207410 1207571 1207595 1207595 1207814 1207814 1207829
                        1207829 1207830 1207830 1207957 1207975 1208046 1208288 1208288
                        1208321 1208321 1208329 1208358 1208427 1208427 1208432 1208471
                        1208522 1208522 1208529 1208536 1208536 1208540 1208540 1208540
                        1208550 1208550 1208586 1208586 1208661 1208661 1208687 1208687
                        1208708 1208719 1208719 1208772 1208772 1208772 1208965 1209047
                        1209049 1209094 1209119 1209122 1209140 1209143 1209143 1209149
                        1209149 1209209 1209210 1209211 1209212 1209214 1209215 1209215
                        1209220 1209220 1209231 1209231 1209253 1209253 1209277 1209277
                        1209386 1209386 1209395 1209395 1209406 1209434 1209434 1209508
                        1209508 1209533 1209557 1209557 1209565 1209624 1209713 1209714
                        1209873 1209878 1209918 1209926 1209926 1209938 1209938 1209993
                        1209993 1210086 1210086 1210094 1210094 1210101 1210101 1210107
                        1210107 1210135 1210154 1210154 1210162 1210162 1210164 1210349
                        1210349 1210411 1210412 1210434 1210437 1210437 1210458 1210458
                        1210507 1210591 1210593 1210702 1210776 1210776 1210835 1210835
                        1210870 1211158 1211230 1211231 1211232 1211233 1211354 1211430
                        1211661 1211795 1211956 1211958 1211958 1212096 1212187 1212187
                        1212189 1212363 1212363 1212516 CVE-2007-4559 CVE-2022-46146
                        CVE-2022-4899 CVE-2023-0464 CVE-2023-0465 CVE-2023-0466 CVE-2023-0687
                        CVE-2023-22644 CVE-2023-22644 CVE-2023-24329 CVE-2023-24593 CVE-2023-25180
                        CVE-2023-25690 CVE-2023-2650 CVE-2023-27522 CVE-2023-27533 CVE-2023-27534
                        CVE-2023-27535 CVE-2023-27536 CVE-2023-27538 CVE-2023-28319 CVE-2023-28320
                        CVE-2023-28321 CVE-2023-28322 CVE-2023-28484 CVE-2023-29383 CVE-2023-29469
                        CVE-2023-29491 CVE-2023-2953 
-----------------------------------------------------------------

The container suse/manager/4.3/proxy-httpd was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:868-1
Released:    Wed Mar 22 09:41:01 2023
Summary:     Security update for python3
Type:        security
Severity:    important
References:  1203355,1208471,CVE-2023-24329
This update for python3 fixes the following issues:

- CVE-2023-24329: Fixed a blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).

The following non-security bug was fixed:

- Eliminate unnecessary and dangerous calls to PyThread_exit_thread() (bsc#1203355).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1582-1
Released:    Mon Mar 27 10:31:52 2023
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1209209,1209210,1209211,1209212,1209214,CVE-2023-27533,CVE-2023-27534,CVE-2023-27535,CVE-2023-27536,CVE-2023-27538
This update for curl fixes the following issues:
  
- CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209).
- CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210).
- CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211).
- CVE-2023-27536: Fixed GSS delegation too eager connection reuse (bsc#1209212).
- CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1585-1
Released:    Mon Mar 27 11:03:32 2023
Summary:     Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server
Type:        recommended
Severity:    moderate
References:  1208540,1208772
Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server

This is a codestream only update
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1658-1
Released:    Wed Mar 29 09:44:07 2023
Summary:     Security update for apache2
Type:        security
Severity:    important
References:  1207327,1208708,1209047,1209049,CVE-2023-25690,CVE-2023-27522
This update for apache2 fixes the following issues:

- CVE-2023-27522: Fixed HTTP response splitting in mod_proxy_uwsgi (bsc#1209049).
- CVE-2023-25690: Fixed HTTP request splitting with mod_rewrite and mod_proxy (bsc#1209047).

The following non-security bugs were fixed:

- Fixed mod_proxy handling of very long urls (bsc#1207327)
- Fixed passing health check does not recover worker from its error state (bsc#1208708).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1662-1
Released:    Wed Mar 29 10:36:23 2023
Summary:     Recommended update for patterns-base
Type:        recommended
Severity:    moderate
References:  1203537
This update for patterns-base fixes the following issues:

- change label of FIPS 140-2 to 140-3 to reflect our current certifications (bsc#1203537)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1688-1
Released:    Wed Mar 29 18:19:10 2023
Summary:     Security update for zstd
Type:        security
Severity:    moderate
References:  1209533,CVE-2022-4899
This update for zstd fixes the following issues:

- CVE-2022-4899: Fixed buffer overrun in util.c (bsc#1209533).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1718-1
Released:    Fri Mar 31 15:47:34 2023
Summary:     Security update for glibc
Type:        security
Severity:    moderate
References:  1207571,1207957,1207975,1208358,CVE-2023-0687
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

Other issues fixed:

- Fix avx2 strncmp offset compare condition check (bsc#1208358)
- elf: Allow dlopen of filter object to work (bsc#1207571)
- powerpc: Fix unrecognized instruction errors with recent GCC
- x86: Cache computation for AMD architecture (bsc#1207957)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1745-1
Released:    Tue Apr  4 09:05:23 2023
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1209624,CVE-2023-0464
This update for openssl-1_1 fixes the following issues:

- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1753-1
Released:    Tue Apr  4 11:55:00 2023
Summary:     Recommended update for systemd-presets-common-SUSE
Type:        recommended
Severity:    moderate
References:  
This update for systemd-presets-common-SUSE fixes the following issue:

- Enable systemd-pstore.service by default (jsc#PED-2663)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1779-1
Released:    Thu Apr  6 08:16:58 2023
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1208432
This update for systemd fixes the following issues:

- Fix return non-zero value when disabling SysVinit service (bsc#1208432)
- Drop build requirement on libpci, it's not no longer needed
- Move systemd-boot and all components managing (secure) UEFI boot into udev
  sub-package, so they aren't installed in systemd based containers

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1805-1
Released:    Tue Apr 11 10:12:41 2023
Summary:     Recommended update for timezone
Type:        recommended
Severity:    important
References:  
This update for timezone fixes the following issues:

- Version update from 2022g to 2023c:
  * Egypt now uses DST again, from April through October.
  * This year Morocco springs forward April 23, not April 30.
  * Palestine delays the start of DST this year.
  * Much of Greenland still uses DST from 2024 on.
  * America/Yellowknife now links to America/Edmonton.
  * tzselect can now use current time to help infer timezone.
  * The code now defaults to C99 or later.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1911-1
Released:    Wed Apr 19 13:02:33 2023
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1209873,1209878,CVE-2023-0465,CVE-2023-0466
This update for openssl-1_1 fixes the following issues:

- CVE-2023-0465: Invalid certificate policies in leaf certificates were silently ignored (bsc#1209878).
- CVE-2023-0466: Certificate policy check were not enabled (bsc#1209873).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1916-1
Released:    Wed Apr 19 16:17:58 2023
Summary:     Recommended update for sles-release
Type:        recommended
Severity:    low
References:  1208529
This update for sles-release fixes the following issue:
    
- Filter libhogweed4 and libnettle6 so they dont get orphaned on system upgrades. (bsc#1208529)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1920-1
Released:    Wed Apr 19 16:22:58 2023
Summary:     Recommended update for hwdata
Type:        recommended
Severity:    moderate
References:  
This update for hwdata fixes the following issues:

- Update pci, usb and vendor ids

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1938-1
Released:    Thu Apr 20 18:44:53 2023
Summary:     Recommended update for NetworkManager
Type:        recommended
Severity:    low
References:  1194715,1204549,1205529
This update for NetworkManager fixes the following issue:

- Adds missing NetworkManager and dependencies to Micro 5.3 (bsc#1204549, bsc#1205529)
- rp-pppoe: replace deprecated ifconfig dependency with iproute2. (bsc#1194715, jsc#SLE-24004)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2053-1
Released:    Thu Apr 27 11:31:08 2023
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1209918,1210411,1210412,CVE-2023-28484,CVE-2023-29469
This update for libxml2 fixes the following issues:

- CVE-2023-29469: Fixed inconsistent result when hashing empty strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType (bsc#1210411).

The following non-security bug was fixed:

- Remove unneeded dependency (bsc#1209918). 

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2060-1
Released:    Thu Apr 27 17:04:25 2023
Summary:     Security update for glib2
Type:        security
Severity:    moderate
References:  1209713,1209714,1210135,CVE-2023-24593,CVE-2023-25180
This update for glib2 fixes the following issues:

- CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714).
- CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713).

The following non-security bug was fixed:

- Fixed regression on s390x (bsc#1210135, glgo#GNOME/glib!2978).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2066-1
Released:    Fri Apr 28 13:54:17 2023
Summary:     Security update for shadow
Type:        security
Severity:    moderate
References:  1210507,CVE-2023-29383
This update for shadow fixes the following issues:

- CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2104-1
Released:    Thu May  4 21:05:30 2023
Summary:     Recommended update for procps
Type:        recommended
Severity:    moderate
References:  1209122
This update for procps fixes the following issue:

- Allow - as leading character to ignore possible errors on systctl entries (bsc#1209122)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2111-1
Released:    Fri May  5 14:34:00 2023
Summary:     Security update for ncurses
Type:        security
Severity:    moderate
References:  1210434,CVE-2023-29491
This update for ncurses fixes the following issues:

- CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2133-1
Released:    Tue May  9 13:37:10 2023
Summary:     Recommended update for zlib
Type:        recommended
Severity:    moderate
References:  1206513
This update for zlib fixes the following issues:

- Add DFLTCC support for using inflate() with a small window (bsc#1206513)

-----------------------------------------------------------------
Advisory ID: SUSE-feature-2023:2192-1
Released:    Fri May 12 12:49:02 2023
Summary:     Feature update for python311, python311-pip, python311-setuptools
Type:        feature
Severity:    moderate
References:  
This release of python311, python311-pip, python311-setuptools adds the following feature:

- Add Python-3.11 to SLE-15-SP4 Python Module (jsc#PED-68, jsc#PED-2634)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2216-1
Released:    Tue May 16 11:27:50 2023
Summary:     Recommended update for python-packaging
Type:        recommended
Severity:    important
References:  1186870,1199282
This update for python-packaging fixes the following issues:

- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)

- Add patch to fix testsuite on big-endian targets
- Ignore python3.6.2 since the test doesn't support it. 
- update to 21.3:
  * Add a pp3-none-any tag
  * Replace the blank pyparsing 3 exclusion with a 3.0.5 exclusion
  * Fix a spelling mistake

- update to 21.2:
  * Update documentation entry for 21.1.
  * Update pin to pyparsing to exclude 3.0.0.
  * PEP 656: musllinux support
  * Drop support for Python 2.7, Python 3.4 and Python 3.5
  * Replace distutils usage with sysconfig
  * Add support for zip files
  * Use cached hash attribute to short-circuit tag equality comparisons
  * Specify the default value for the 'specifier' argument to 'SpecifierSet'
  * Proper keyword-only 'warn' argument in packaging.tags
  * Correctly remove prerelease suffixes from ~= check
  * Fix type hints for 'Version.post' and 'Version.dev'
  * Use typing alias 'UnparsedVersion'
  * Improve type inference
  * Tighten the return typeo

- Add Provides: for python*dist(packaging). (bsc#1186870)

- add no-legacyversion-warning.patch to restore compatibility with 20.4 

- update to 20.9:
  * Add support for the ``macosx_10_*_universal2`` platform tags 
  * Introduce ``packaging.utils.parse_wheel_filename()`` and ``parse_sdist_filename()``

- update to 20.8:
  * Revert back to setuptools for compatibility purposes for some Linux distros
  * Do not insert an underscore in wheel tags when the interpreter version number is more than 2 digits 
  * Fix flit configuration, to include LICENSE files
  * Make `intel` a recognized CPU architecture for the `universal` macOS platform tag
  * Add some missing type hints to `packaging.requirements`
  * Officially support Python 3.9
  * Deprecate the ``LegacyVersion`` and ``LegacySpecifier`` classes
  * Handle ``OSError`` on non-dynamic executables when attempting to resolve the glibc version string.

- update to 20.4:
  * Canonicalize version before comparing specifiers.
  * Change type hint for ``canonicalize_name`` to return ``packaging.utils.NormalizedName``.
  This enables the use of static typing tools (like mypy) to detect mixing of normalized and un-normalized names.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2224-1
Released:    Wed May 17 09:53:54 2023
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1211230,1211231,1211232,1211233,CVE-2023-28319,CVE-2023-28320,CVE-2023-28321,CVE-2023-28322
This update for curl adds the following feature:

Update to version 8.0.1 (jsc#PED-2580)

- CVE-2023-28319: use-after-free in SSH sha256 fingerprint check (bsc#1211230).
- CVE-2023-28320: siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: POST-after-PUT confusion (bsc#1211233).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2240-1
Released:    Wed May 17 19:56:54 2023
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1203141,1207410
This update for systemd fixes the following issues:

- udev-rules: fix nvme symlink creation on namespace changes (bsc#1207410)
- Optimize when hundred workers claim the same symlink with the same priority (bsc#1203141)
- Add nss-resolve and systemd-network to Packagehub-Subpackages (MSC-626)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2245-1
Released:    Thu May 18 17:01:47 2023
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    moderate
References:  1127591,1195633,1208329,1209406,1210870
This update for libzypp, zypper fixes the following issues:

- Installing local RPM packages fails if /usr/bin/find is not installed (bsc#1195633)
- multicurl: propagate ssl settings stored in repo url (bsc#1127591)
- MediaCurl: Fix endless loop if wrong credentials are stored in credentials.cat (bsc#1210870)
- zypp.conf: Introduce 'download.connect_timeout' [60 sec.] (bsc#1208329)
- Teach MediaNetwork to retry on HTTP2 errors.
- Fix selecting installed patterns from picklist (bsc#1209406)
- man: better explanation of --priority

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2307-1
Released:    Mon May 29 10:29:49 2023
Summary:     Recommended update for kbd
Type:        recommended
Severity:    low
References:  1210702
This update for kbd fixes the following issue:

- Add 'ara' vc keymap, 'ara' is slightly better than 'arabic' as it matches the name of its X11 layout counterpart. (bsc#1210702)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2317-1
Released:    Tue May 30 14:01:22 2023
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1210164
This update for util-linux fixes the following issue:

- Add upstream patch to prevent possible performance degradation of libuuid (bsc#1210164)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2333-1
Released:    Wed May 31 09:01:28 2023
Summary:     Recommended update for zlib
Type:        recommended
Severity:    moderate
References:  1210593
This update for zlib fixes the following issue:

- Fix function calling order to avoid crashes (bsc#1210593)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2341-1
Released:    Thu Jun  1 11:31:27 2023
Summary:     Recommended update for libsigc++2
Type:        recommended
Severity:    moderate
References:  1209094,1209140
This update for libsigc++2 fixes the following issues:

- Remove executable permission for file (bsc#1209094, bsc#1209140)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2342-1
Released:    Thu Jun  1 11:34:20 2023
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1211430,CVE-2023-2650
This update for openssl-1_1 fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2484-1
Released:    Mon Jun 12 08:49:58 2023
Summary:     Security update for openldap2
Type:        security
Severity:    moderate
References:  1211795,CVE-2023-2953
This update for openldap2 fixes the following issues:

- CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2495-1
Released:    Tue Jun 13 15:05:27 2023
Summary:     Recommended update for libzypp
Type:        recommended
Severity:    important
References:  1211661,1212187
This update for libzypp fixes the following issues:

- Fix 'Curl error 92' when synchronizing SUSE Manager repositories. [bsc#1212187]
- Do not unconditionally release a medium if provideFile failed. [bsc#1211661]

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:2517-1
Released:    Thu Jun 15 07:09:52 2023
Summary:     Security update for python3
Type:        security
Severity:    moderate
References:  1203750,1211158,CVE-2007-4559
This update for python3 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).

- Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2550-1
Released:    Mon Jun 19 17:51:21 2023
Summary:     Recommended update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings
Type:        recommended
Severity:    moderate
References:  1191112,1198097,1199020,1202234,1209565,1210591,1211354,1212187,1212189

This update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings ships the update stack to
the INSTALLER self-update channel.

yast2-pkg-bindings:

- Added a new option for rebuilding the RPM database (--rebuilddb) (bsc#1209565)

autoyast2:

- Selected products are not installed after resetting the package manager internally (bsc#1202234)

libyui:

- Prevent buffer overflow when drawing very wide labels in ncurses (bsc#1211354)
- Fixed loading icons from an absolute path (bsc#1210591)
- Fix for main window stacking order to avoid unintentional transparency (bsc#1199020, bsc#1191112)
- Force messages from .ui file through our translation mechanism (bsc#1198097)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2566-1
Released:    Wed Jun 21 13:19:32 2023
Summary:     Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server
Type:        recommended
Severity:    moderate
References:  1201063,1203599,1204089,1204270,1204900,1205600,1206060,1206191,1206423,1206725,1206783,1207063,1207595,1207814,1207829,1207830,1208288,1208321,1208427,1208522,1208536,1208540,1208550,1208586,1208661,1208687,1208719,1208772,1208965,1209119,1209143,1209149,1209215,1209220,1209231,1209253,1209277,1209386,1209395,1209434,1209508,1209557,1209926,1209938,1209993,1210086,1210094,1210101,1210107,1210154,1210162,1210349,1210437,1210458,1210776,1210835,1211956,1211958,1212363,CVE-2023-22644
Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server
  
This is a codestream only update

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:2592-1
Released:    Wed Jun 21 14:33:51 2023
Summary:     Maintenance update for SUSE Manager 4.3.6 Release Notes
Type:        recommended
Severity:    important
References:  1201063,1203599,1204089,1204270,1204900,1205600,1206060,1206191,1206423,1206725,1206783,1207063,1207595,1207814,1207829,1207830,1208046,1208288,1208321,1208427,1208522,1208536,1208540,1208550,1208586,1208661,1208687,1208719,1208772,1209143,1209149,1209215,1209220,1209231,1209253,1209277,1209386,1209395,1209434,1209508,1209557,1209926,1209938,1209993,1210086,1210094,1210101,1210107,1210154,1210162,1210349,1210437,1210458,1210776,1210835,1211958,1212096,1212363,1212516,CVE-2022-46146,CVE-2023-22644
Maintenance update for SUSE Manager 4.3.6 Release Notes:

This is a codestream only update
  

The following package changes have been done:

- libldap-data-2.4.46-150200.14.14.1 updated
- glibc-2.31-150300.46.1 updated
- libzstd1-1.5.0-150400.3.3.1 updated
- libuuid1-2.37.2-150400.8.17.1 updated
- libudev1-249.16-150400.8.28.3 updated
- libsmartcols1-2.37.2-150400.8.17.1 updated
- libblkid1-2.37.2-150400.8.17.1 updated
- libfdisk1-2.37.2-150400.8.17.1 updated
- libz1-1.2.11-150000.3.45.1 updated
- libncurses6-6.1-150000.5.15.1 updated
- terminfo-base-6.1-150000.5.15.1 updated
- ncurses-utils-6.1-150000.5.15.1 updated
- libglib-2_0-0-2.70.5-150400.3.8.1 updated
- libxml2-2-2.9.14-150400.5.16.1 updated
- libsystemd0-249.16-150400.8.28.3 updated
- libopenssl1_1-1.1.1l-150400.7.37.1 updated
- libopenssl1_1-hmac-1.1.1l-150400.7.37.1 updated
- libsigc-2_0-0-2.10.7-150400.3.3.1 updated
- patterns-base-fips-20200124-150400.20.4.1 updated
- libzck1-1.1.16-150400.3.4.1 updated
- libldap-2_4-2-2.4.46-150200.14.14.1 updated
- libprocps7-3.3.15-150000.7.31.1 updated
- procps-3.3.15-150000.7.31.1 updated
- libmount1-2.37.2-150400.8.17.1 updated
- login_defs-4.8.1-150400.10.6.1 updated
- sles-release-15.4-150400.58.7.3 updated
- libcurl4-8.0.1-150400.5.23.1 updated
- libsolv-tools-0.7.24-150400.3.8.1 updated
- shadow-4.8.1-150400.10.6.1 updated
- libzypp-17.31.13-150400.3.32.1 updated
- zypper-1.14.60-150400.3.21.2 updated
- util-linux-2.37.2-150400.8.17.1 updated
- timezone-2023c-150000.75.23.1 updated
- curl-8.0.1-150400.5.23.1 updated
- kbd-legacy-2.4.0-150400.5.6.1 updated
- libgmodule-2_0-0-2.70.5-150400.3.8.1 updated
- libgobject-2_0-0-2.70.5-150400.3.8.1 updated
- libslang2-2.3.1a-150000.5.2.3 updated
- release-notes-susemanager-proxy-4.3.6-150400.3.55.4 updated
- systemd-presets-common-SUSE-15-150100.8.20.1 updated
- zstd-1.5.0-150400.3.3.1 updated
- kbd-2.4.0-150400.5.6.1 updated
- python3-base-3.6.15-150300.10.48.1 updated
- libpython3_6m1_0-3.6.15-150300.10.48.1 updated
- libnewt0_52-0.52.20-150000.7.2.3 updated
- python3-3.6.15-150300.10.48.1 updated
- hwdata-0.368-150000.3.57.1 updated
- apache2-utils-2.4.51-150400.6.11.1 updated
- newt-0.52.20-150000.7.2.3 updated
- systemd-249.16-150400.8.28.3 updated
- libgio-2_0-0-2.70.5-150400.3.8.1 updated
- glib2-tools-2.70.5-150400.3.8.1 updated
- python3-uyuni-common-libs-4.3.8-150400.3.12.5 updated
- python3-newt-0.52.20-150000.7.2.3 updated
- python3-packaging-21.3-150200.3.3.1 updated
- python3-libxml2-2.9.14-150400.5.16.1 updated
- apache2-2.4.51-150400.6.11.1 updated
- apache2-prefork-2.4.51-150400.6.11.1 updated
- python3-setuptools-44.1.1-150400.9.3.3 updated
- spacewalk-backend-4.3.21-150400.3.21.13 updated
- spacewalk-proxy-package-manager-4.3.16-150400.3.20.6 updated
- spacewalk-proxy-common-4.3.16-150400.3.20.6 updated
- spacewalk-proxy-broker-4.3.16-150400.3.20.6 updated
- spacewalk-proxy-redirect-4.3.16-150400.3.20.6 updated
- container:registry.suse.com-bci-bci-base-15.4-- added
- container:registry.suse.com_bci_bci-base:15.4-- removed
- python3-linecache2-1.0.0-1.25 removed
- python3-pbr-4.3.0-6.22 removed
- python3-python-mimeparse-1.6.0-4.22 removed
- python3-testtools-2.3.0-4.27 removed
- python3-traceback2-1.4.0-1.25 removed
- python3-unittest2-1.1.0-5.22 removed


More information about the sle-security-updates mailing list