SUSE-RU-2023:4128-1: moderate: Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report

sle-updates at lists.suse.com sle-updates at lists.suse.com
Thu Oct 19 08:54:49 UTC 2023



# Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-
sle12, sca-patterns-sle15, sca-server-report

Announcement ID: SUSE-RU-2023:4128-1  
Rating: moderate  
References:

  * bsc#1186148
  * bsc#1188137
  * bsc#1188138
  * bsc#1192315
  * bsc#1201011
  * bsc#1201522
  * bsc#1201523
  * bsc#1204721
  * bsc#1204723
  * bsc#1204724
  * bsc#1204772
  * bsc#1204776
  * bsc#1205826
  * bsc#1210908
  * bsc#1214837

  
Affected Products:

  * Server Applications Module 15-SP4
  * Server Applications Module 15-SP5
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Manager Proxy 4.2
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.2
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.2
  * SUSE Manager Server 4.3

  
  
An update that has 15 fixes can now be installed.

## Description:

This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-
patterns-sle15, sca-server-report fixes the following issues:

sca-patterns-base was updated to version 1.5.2:

  * Fixed scatool email failure with python3 (bsc#1192315)
  * Allow batch mode that does not have progress bar issue#13 (pr#14)
  * Added quiet and debug modes issue#11

sca-patterns-sle11 was updated to version 1.5.2

  * Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
  * Changes to python/SUSE.py version 1.0.1

  * Changed name from getScInfo to getSCInfo

  * Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
  * Updated SLES version constants

Changes to version 1.5.1

  * Fixed UnicodeDecodeError when reading files (bsc#1204723)

Changes in version 1.5.5

  * New patterns (2) (bsc#1214837):

  * sle15sp4/kabi-000021148.py: Pattern for TID000021148

  * sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151

  * New security announcement patterns as of Aug 2023 (140).

  * New security announcement patterns as of May 2023 (881).

Changes in version 1.5.3

  * New regular patterns (3)

  * sle15sp2/freeused-000020894.py: Pattern for TID000020894

  * sle15sp3/freeused-000020894.py: Pattern for TID000020894
  * sle15sp4/freeused-000020894.py: Pattern for TID000020894

Changes in version 1.5.3

  * Updated category in btrfsmaster-000018779.py (bsc#1188138)
  * sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
  * sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
  * New regular patterns (7)

  * sle15all/vimerr-000020735.py: Pattern for TID000020735

  * sle15all/nmiconfig-000020754.py: Pattern for TID000020754
  * sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
  * sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
  * sle15sp3/sssdad-000020793.py: Pattern for TID000020793
  * sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
  * sle15sp4/sssdad-000020793.py: Pattern for TID000020793
  * New security announcement patterns (1426)

Additional patterns in version 1.5.2

  * sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
    (bsc#1201522)
  * sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs
    (bsc#1201523)

Changes in version 1.5.2

  * Check setup-sca php version mismatch (bsc#1201011)
  * SCA schema pattern check (tid#000020689)
  * kernel crashes at nfs4_get_valid_delegation (tid#000020688)

Changes in version 1.5.1

  * IRQ vectory affinity issue
  * TID000020653 NFS mount attempt with vers=n returns invalid argument or
    incorrect mount option

Changes in version 1.5.5

  * New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
  * New security announcement patterns as of May 2023 (543).

Changes in version 1.5.3

  * Updated category in btrfsmaster-000018779.py (bsc#1188138)
  * Fixed invalid link in lvm-00003.pl (bsc#1186148)
  * Removed invalid pattern dst-00001.pl (bsc#1188137)
  * Removed or fixed patterns with no valid solution links (bsc#1204772)
  * New regular patterns (1)
  * sle12all/nmiconfig-000020754.py: Pattern for TID000020754
  * New security announcement patterns (831)

Additional patterns in version 1.5.2

  * sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
    (bsc#1201522)
  * sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs
    (bsc#1201523)

Changes in version 1.5.2

  * SCA schema pattern check

Changes in version 1.5.3

  * New security announcement patterns as of Aug 2023 (12) (bsc#1214837)

Changes in version 1.5.2

  * New security announcement patterns (14)

Changes in version 1.5.2

  * Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * Server Applications Module 15-SP4  
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128=1

  * Server Applications Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128=1

  * SUSE Manager Proxy 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128=1

  * SUSE Manager Retail Branch Server 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-4128=1

  * SUSE Manager Server 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128=1

## Package List:

  * Server Applications Module 15-SP4 (noarch)
    * sca-patterns-sle11-1.5.3-150400.3.3.1
    * sca-patterns-sle12-1.5.5-150400.3.3.1
    * sca-patterns-base-1.5.2-150400.3.3.1
    * sca-patterns-sle15-1.5.5-150400.3.3.1
    * sca-server-report-1.5.2-150400.3.3.1
  * Server Applications Module 15-SP5 (noarch)
    * sca-patterns-sle11-1.5.3-150400.3.3.1
    * sca-patterns-sle12-1.5.5-150400.3.3.1
    * sca-patterns-base-1.5.2-150400.3.3.1
    * sca-patterns-sle15-1.5.5-150400.3.3.1
    * sca-server-report-1.5.2-150400.3.3.1
  * SUSE Manager Proxy 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1
  * SUSE Manager Retail Branch Server 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1
  * SUSE Manager Server 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1

## References:

  * https://bugzilla.suse.com/show_bug.cgi?id=1186148
  * https://bugzilla.suse.com/show_bug.cgi?id=1188137
  * https://bugzilla.suse.com/show_bug.cgi?id=1188138
  * https://bugzilla.suse.com/show_bug.cgi?id=1192315
  * https://bugzilla.suse.com/show_bug.cgi?id=1201011
  * https://bugzilla.suse.com/show_bug.cgi?id=1201522
  * https://bugzilla.suse.com/show_bug.cgi?id=1201523
  * https://bugzilla.suse.com/show_bug.cgi?id=1204721
  * https://bugzilla.suse.com/show_bug.cgi?id=1204723
  * https://bugzilla.suse.com/show_bug.cgi?id=1204724
  * https://bugzilla.suse.com/show_bug.cgi?id=1204772
  * https://bugzilla.suse.com/show_bug.cgi?id=1204776
  * https://bugzilla.suse.com/show_bug.cgi?id=1205826
  * https://bugzilla.suse.com/show_bug.cgi?id=1210908
  * https://bugzilla.suse.com/show_bug.cgi?id=1214837

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20231019/356c91e1/attachment.htm>


More information about the sle-updates mailing list