SUSE-RU-2023:4128-1: moderate: Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report
    maint-coord at suse.de 
    maint-coord at suse.de
       
    Thu Oct 19 08:54:50 UTC 2023
    
    
  
# Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-
sle12, sca-patterns-sle15, sca-server-report
Announcement ID: SUSE-RU-2023:4128-1  
Rating: moderate  
References:
  * bsc#1186148
  * bsc#1188137
  * bsc#1188138
  * bsc#1192315
  * bsc#1201011
  * bsc#1201522
  * bsc#1201523
  * bsc#1204721
  * bsc#1204723
  * bsc#1204724
  * bsc#1204772
  * bsc#1204776
  * bsc#1205826
  * bsc#1210908
  * bsc#1214837
  
Affected Products:
  * Server Applications Module 15-SP4
  * Server Applications Module 15-SP5
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Manager Proxy 4.2
  * SUSE Manager Proxy 4.3
  * SUSE Manager Retail Branch Server 4.2
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.2
  * SUSE Manager Server 4.3
  
  
An update that has 15 fixes can now be installed.
## Description:
This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-
patterns-sle15, sca-server-report fixes the following issues:
sca-patterns-base was updated to version 1.5.2:
  * Fixed scatool email failure with python3 (bsc#1192315)
  * Allow batch mode that does not have progress bar issue#13 (pr#14)
  * Added quiet and debug modes issue#11
sca-patterns-sle11 was updated to version 1.5.2
  * Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
  * Changes to python/SUSE.py version 1.0.1
  * Changed name from getScInfo to getSCInfo
  * Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
  * Updated SLES version constants
Changes to version 1.5.1
  * Fixed UnicodeDecodeError when reading files (bsc#1204723)
Changes in version 1.5.5
  * New patterns (2) (bsc#1214837):
  * sle15sp4/kabi-000021148.py: Pattern for TID000021148
  * sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151
  * New security announcement patterns as of Aug 2023 (140).
  * New security announcement patterns as of May 2023 (881).
Changes in version 1.5.3
  * New regular patterns (3)
  * sle15sp2/freeused-000020894.py: Pattern for TID000020894
  * sle15sp3/freeused-000020894.py: Pattern for TID000020894
  * sle15sp4/freeused-000020894.py: Pattern for TID000020894
Changes in version 1.5.3
  * Updated category in btrfsmaster-000018779.py (bsc#1188138)
  * sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
  * sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
  * New regular patterns (7)
  * sle15all/vimerr-000020735.py: Pattern for TID000020735
  * sle15all/nmiconfig-000020754.py: Pattern for TID000020754
  * sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
  * sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
  * sle15sp3/sssdad-000020793.py: Pattern for TID000020793
  * sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
  * sle15sp4/sssdad-000020793.py: Pattern for TID000020793
  * New security announcement patterns (1426)
Additional patterns in version 1.5.2
  * sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
    (bsc#1201522)
  * sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs
    (bsc#1201523)
Changes in version 1.5.2
  * Check setup-sca php version mismatch (bsc#1201011)
  * SCA schema pattern check (tid#000020689)
  * kernel crashes at nfs4_get_valid_delegation (tid#000020688)
Changes in version 1.5.1
  * IRQ vectory affinity issue
  * TID000020653 NFS mount attempt with vers=n returns invalid argument or
    incorrect mount option
Changes in version 1.5.5
  * New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
  * New security announcement patterns as of May 2023 (543).
Changes in version 1.5.3
  * Updated category in btrfsmaster-000018779.py (bsc#1188138)
  * Fixed invalid link in lvm-00003.pl (bsc#1186148)
  * Removed invalid pattern dst-00001.pl (bsc#1188137)
  * Removed or fixed patterns with no valid solution links (bsc#1204772)
  * New regular patterns (1)
  * sle12all/nmiconfig-000020754.py: Pattern for TID000020754
  * New security announcement patterns (831)
Additional patterns in version 1.5.2
  * sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails
    (bsc#1201522)
  * sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs
    (bsc#1201523)
Changes in version 1.5.2
  * SCA schema pattern check
Changes in version 1.5.3
  * New security announcement patterns as of Aug 2023 (12) (bsc#1214837)
Changes in version 1.5.2
  * New security announcement patterns (14)
Changes in version 1.5.2
  * Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:
  * Server Applications Module 15-SP4  
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128=1
  * Server Applications Module 15-SP5  
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128=1
  * SUSE Manager Proxy 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128=1
  * SUSE Manager Retail Branch Server 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.2-2023-4128=1
  * SUSE Manager Server 4.2  
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128=1
## Package List:
  * Server Applications Module 15-SP4 (noarch)
    * sca-patterns-sle11-1.5.3-150400.3.3.1
    * sca-patterns-sle12-1.5.5-150400.3.3.1
    * sca-patterns-base-1.5.2-150400.3.3.1
    * sca-patterns-sle15-1.5.5-150400.3.3.1
    * sca-server-report-1.5.2-150400.3.3.1
  * Server Applications Module 15-SP5 (noarch)
    * sca-patterns-sle11-1.5.3-150400.3.3.1
    * sca-patterns-sle12-1.5.5-150400.3.3.1
    * sca-patterns-base-1.5.2-150400.3.3.1
    * sca-patterns-sle15-1.5.5-150400.3.3.1
    * sca-server-report-1.5.2-150400.3.3.1
  * SUSE Manager Proxy 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1
  * SUSE Manager Retail Branch Server 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1
  * SUSE Manager Server 4.2 (noarch)
    * sca-patterns-sle12-1.5.5-150300.3.6.1
    * sca-patterns-base-1.5.2-150300.10.6.1
    * sca-patterns-sle11-1.5.3-150300.18.6.1
    * sca-patterns-sle15-1.5.5-150300.14.6.1
    * sca-server-report-1.5.2-150300.11.6.1
## References:
  * https://bugzilla.suse.com/show_bug.cgi?id=1186148
  * https://bugzilla.suse.com/show_bug.cgi?id=1188137
  * https://bugzilla.suse.com/show_bug.cgi?id=1188138
  * https://bugzilla.suse.com/show_bug.cgi?id=1192315
  * https://bugzilla.suse.com/show_bug.cgi?id=1201011
  * https://bugzilla.suse.com/show_bug.cgi?id=1201522
  * https://bugzilla.suse.com/show_bug.cgi?id=1201523
  * https://bugzilla.suse.com/show_bug.cgi?id=1204721
  * https://bugzilla.suse.com/show_bug.cgi?id=1204723
  * https://bugzilla.suse.com/show_bug.cgi?id=1204724
  * https://bugzilla.suse.com/show_bug.cgi?id=1204772
  * https://bugzilla.suse.com/show_bug.cgi?id=1204776
  * https://bugzilla.suse.com/show_bug.cgi?id=1205826
  * https://bugzilla.suse.com/show_bug.cgi?id=1210908
  * https://bugzilla.suse.com/show_bug.cgi?id=1214837
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/suma-updates/attachments/20231019/6805fdb2/attachment-0001.htm>
    
    
More information about the suma-updates
mailing list