SUSE-RU-2023:4128-1: moderate: Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report
maint-coord at suse.de
maint-coord at suse.de
Thu Oct 19 08:54:50 UTC 2023
# Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-
sle12, sca-patterns-sle15, sca-server-report
Announcement ID: SUSE-RU-2023:4128-1
Rating: moderate
References:
* bsc#1186148
* bsc#1188137
* bsc#1188138
* bsc#1192315
* bsc#1201011
* bsc#1201522
* bsc#1201523
* bsc#1204721
* bsc#1204723
* bsc#1204724
* bsc#1204772
* bsc#1204776
* bsc#1205826
* bsc#1210908
* bsc#1214837
Affected Products:
* Server Applications Module 15-SP4
* Server Applications Module 15-SP5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3
An update that has 15 fixes can now be installed.
## Description:
This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-
patterns-sle15, sca-server-report fixes the following issues:
sca-patterns-base was updated to version 1.5.2:
* Fixed scatool email failure with python3 (bsc#1192315)
* Allow batch mode that does not have progress bar issue#13 (pr#14)
* Added quiet and debug modes issue#11
sca-patterns-sle11 was updated to version 1.5.2
* Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
* Changes to python/SUSE.py version 1.0.1
* Changed name from getScInfo to getSCInfo
* Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
* Updated SLES version constants
Changes to version 1.5.1
* Fixed UnicodeDecodeError when reading files (bsc#1204723)
Changes in version 1.5.5
* New patterns (2) (bsc#1214837):
* sle15sp4/kabi-000021148.py: Pattern for TID000021148
* sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151
* New security announcement patterns as of Aug 2023 (140).
* New security announcement patterns as of May 2023 (881).
Changes in version 1.5.3
* New regular patterns (3)
* sle15sp2/freeused-000020894.py: Pattern for TID000020894
* sle15sp3/freeused-000020894.py: Pattern for TID000020894
* sle15sp4/freeused-000020894.py: Pattern for TID000020894
Changes in version 1.5.3
* Updated category in btrfsmaster-000018779.py (bsc#1188138)
* sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
* sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
* New regular patterns (7)
* sle15all/vimerr-000020735.py: Pattern for TID000020735
* sle15all/nmiconfig-000020754.py: Pattern for TID000020754
* sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
* sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
* sle15sp3/sssdad-000020793.py: Pattern for TID000020793
* sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
* sle15sp4/sssdad-000020793.py: Pattern for TID000020793
* New security announcement patterns (1426)
Additional patterns in version 1.5.2
* sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
(bsc#1201522)
* sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs
(bsc#1201523)
Changes in version 1.5.2
* Check setup-sca php version mismatch (bsc#1201011)
* SCA schema pattern check (tid#000020689)
* kernel crashes at nfs4_get_valid_delegation (tid#000020688)
Changes in version 1.5.1
* IRQ vectory affinity issue
* TID000020653 NFS mount attempt with vers=n returns invalid argument or
incorrect mount option
Changes in version 1.5.5
* New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
* New security announcement patterns as of May 2023 (543).
Changes in version 1.5.3
* Updated category in btrfsmaster-000018779.py (bsc#1188138)
* Fixed invalid link in lvm-00003.pl (bsc#1186148)
* Removed invalid pattern dst-00001.pl (bsc#1188137)
* Removed or fixed patterns with no valid solution links (bsc#1204772)
* New regular patterns (1)
* sle12all/nmiconfig-000020754.py: Pattern for TID000020754
* New security announcement patterns (831)
Additional patterns in version 1.5.2
* sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
(bsc#1201522)
* sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs
(bsc#1201523)
Changes in version 1.5.2
* SCA schema pattern check
Changes in version 1.5.3
* New security announcement patterns as of Aug 2023 (12) (bsc#1214837)
Changes in version 1.5.2
* New security announcement patterns (14)
Changes in version 1.5.2
* Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Server Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128=1
* Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128=1
* SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128=1
* SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-4128=1
* SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128=1
## Package List:
* Server Applications Module 15-SP4 (noarch)
* sca-patterns-sle11-1.5.3-150400.3.3.1
* sca-patterns-sle12-1.5.5-150400.3.3.1
* sca-patterns-base-1.5.2-150400.3.3.1
* sca-patterns-sle15-1.5.5-150400.3.3.1
* sca-server-report-1.5.2-150400.3.3.1
* Server Applications Module 15-SP5 (noarch)
* sca-patterns-sle11-1.5.3-150400.3.3.1
* sca-patterns-sle12-1.5.5-150400.3.3.1
* sca-patterns-base-1.5.2-150400.3.3.1
* sca-patterns-sle15-1.5.5-150400.3.3.1
* sca-server-report-1.5.2-150400.3.3.1
* SUSE Manager Proxy 4.2 (noarch)
* sca-patterns-sle12-1.5.5-150300.3.6.1
* sca-patterns-base-1.5.2-150300.10.6.1
* sca-patterns-sle11-1.5.3-150300.18.6.1
* sca-patterns-sle15-1.5.5-150300.14.6.1
* sca-server-report-1.5.2-150300.11.6.1
* SUSE Manager Retail Branch Server 4.2 (noarch)
* sca-patterns-sle12-1.5.5-150300.3.6.1
* sca-patterns-base-1.5.2-150300.10.6.1
* sca-patterns-sle11-1.5.3-150300.18.6.1
* sca-patterns-sle15-1.5.5-150300.14.6.1
* sca-server-report-1.5.2-150300.11.6.1
* SUSE Manager Server 4.2 (noarch)
* sca-patterns-sle12-1.5.5-150300.3.6.1
* sca-patterns-base-1.5.2-150300.10.6.1
* sca-patterns-sle11-1.5.3-150300.18.6.1
* sca-patterns-sle15-1.5.5-150300.14.6.1
* sca-server-report-1.5.2-150300.11.6.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1186148
* https://bugzilla.suse.com/show_bug.cgi?id=1188137
* https://bugzilla.suse.com/show_bug.cgi?id=1188138
* https://bugzilla.suse.com/show_bug.cgi?id=1192315
* https://bugzilla.suse.com/show_bug.cgi?id=1201011
* https://bugzilla.suse.com/show_bug.cgi?id=1201522
* https://bugzilla.suse.com/show_bug.cgi?id=1201523
* https://bugzilla.suse.com/show_bug.cgi?id=1204721
* https://bugzilla.suse.com/show_bug.cgi?id=1204723
* https://bugzilla.suse.com/show_bug.cgi?id=1204724
* https://bugzilla.suse.com/show_bug.cgi?id=1204772
* https://bugzilla.suse.com/show_bug.cgi?id=1204776
* https://bugzilla.suse.com/show_bug.cgi?id=1205826
* https://bugzilla.suse.com/show_bug.cgi?id=1210908
* https://bugzilla.suse.com/show_bug.cgi?id=1214837
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/suma-updates/attachments/20231019/6805fdb2/attachment-0001.htm>
More information about the suma-updates
mailing list