From null at suse.de Thu May 2 12:30:02 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 02 May 2024 12:30:02 -0000 Subject: SUSE-RU-2024:1487-1: moderate: Recommended update for aaa_base Message-ID: <171465300275.20982.7562963173643221197@smelt2.prg2.suse.org> # Recommended update for aaa_base Announcement ID: SUSE-RU-2024:1487-1 Rating: moderate References: * bsc#1211721 * bsc#1221361 * bsc#1221407 * bsc#1222547 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has four fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * home and end button not working from ssh client (bsc#1221407) * use autosetup in prep stage of specfile * drop the stderr redirection for csh (bsc#1221361) * drop sysctl.d/50-default-s390.conf (bsc#1211721) * make sure the script does not exit with 1 if a file with content is found (bsc#1222547) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1487=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1487=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1487=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1487=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1487=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1487=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1487=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1487=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1487=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1487=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1487=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1487=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1487=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1487=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1487=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1487=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1487=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1487=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1487=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1487=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1487=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1487=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1487=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Manager Proxy 4.3 (x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.17.3 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.17.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211721 * https://bugzilla.suse.com/show_bug.cgi?id=1221361 * https://bugzilla.suse.com/show_bug.cgi?id=1221407 * https://bugzilla.suse.com/show_bug.cgi?id=1222547 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 08:30:11 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 08:30:11 -0000 Subject: SUSE-SU-2024:1499-1: low: Security update for java-17-openjdk Message-ID: <171498421151.10143.9117439231619663555@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2024:1499-1 Rating: low References: * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222986 * bsc#1222987 Cross-References: * CVE-2024-21011 * CVE-2024-21012 * CVE-2024-21068 * CVE-2024-21094 CVSS scores: * CVE-2024-21011 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21012 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21068 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21094 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: * CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979) * CVE-2024-21012: Fixed unauthorized data modification due HTTP/2 client improper reverse DNS lookup (JDK-8315708,bsc#1222987) * CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983) * CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with "Exceeded _node_regs array" (JDK-8317507,JDK-8325348,bsc#1222986) Other fixes: \- Update to upstream tag jdk-17.0.11+9 (April 2024 CPU) * Security fixes \+ JDK-8318340: Improve RSA key implementations * Other changes \+ JDK-6928542: Chinese characters in RTF are not decoded \+ JDK-7132796: [macosx] closed/javax/swing/JComboBox/4517214/ /bug4517214.java fails on MacOS \+ JDK-7148092: [macosx] When Alt+down arrow key is pressed, the combobox popup does not appear. \+ JDK-7167356: (javac) investigate failing tests in JavacParserTest \+ JDK-8054022: HttpURLConnection timeouts with Expect: 100-Continue and no chunking \+ JDK-8054572: [macosx] JComboBox paints the border incorrectly \+ JDK-8169475: WheelModifier.java fails by timeout \+ JDK-8205076: [17u] Inet6AddressImpl.c: `lookupIfLocalHost` accesses `int InetAddress.preferIPv6Address` as a boolean \+ JDK-8209595: MonitorVmStartTerminate.java timed out \+ JDK-8210410: Refactor java.util.Currency:i18n shell tests to plain java tests \+ JDK-8261404: Class.getReflectionFactory() is not thread-safe \+ JDK-8261837: SIGSEGV in ciVirtualCallTypeData::translate_from \+ JDK-8263256: Test java/net/Inet6Address/serialize/ /Inet6AddressSerializationTest.java fails due to dynamic reconfigurations of network interface during test \+ JDK-8269258: java/net/httpclient/ManyRequestsLegacy.java failed with connection timeout \+ JDK-8271118: C2: StressGCM should have higher priority than frequency-based policy \+ JDK-8271616: oddPart in MutableBigInteger::mutableModInverse contains info on final result \+ JDK-8272811: Document the effects of building with _GNU_SOURCE in os_posix.hpp \+ JDK-8272853: improve `JavadocTester.runTests` \+ JDK-8273454: C2: Transform (-a) _(-b) into a_ b \+ JDK-8274060: C2: Incorrect computation after JDK-8273454 \+ JDK-8274122: java/io/File/createTempFile/SpecialTempFile.java fails in Windows 11 \+ JDK-8274621: NullPointerException because listenAddress[0] is null \+ JDK-8274632: Possible pointer overflow in PretouchTask chunk claiming \+ JDK-8274634: Use String.equals instead of String.compareTo in java.desktop \+ JDK-8276125: RunThese24H.java SIGSEGV in JfrThreadGroup::thread_group_id \+ JDK-8278028: [test-library] Warnings cleanup of the test library \+ JDK-8278312: Update SimpleSSLContext keystore to use SANs for localhost IP addresses \+ JDK-8278363: Create extented container test groups \+ JDK-8280241: (aio) AsynchronousSocketChannel init fails in IPv6 only Windows env \+ JDK-8281377: Remove vmTestbase/nsk/monitoring/ThreadMXBean/ /ThreadInfo/Deadlock/JavaDeadlock001/TestDescription.java from problemlist. \+ JDK-8281543: Remove unused code/headerfile dtraceAttacher.hpp \+ JDK-8281585: Remove unused imports under test/lib and jtreg/gc \+ JDK-8283400: [macos] a11y : Screen magnifier does not reflect JRadioButton value change \+ JDK-8283626: AArch64: Set relocInfo::offset_unit to 4 \+ JDK-8283994: Make Xerces DatatypeException stackless \+ JDK-8286312: Stop mixing signed and unsigned types in bit operations \+ JDK-8286846: test/jdk/javax/swing/plaf/aqua/ /CustomComboBoxFocusTest.java fails on mac aarch64 \+ JDK-8287832: jdk/jfr/event/runtime/TestActiveSettingEvent.java failed with "Expected two batches of Active Setting events" \+ JDK-8288663: JFR: Disabling the JfrThreadSampler commits only a partially disabled state \+ JDK-8288846: misc tests fail "assert(ms < 1000) failed: Un-interruptable sleep, short time use only" \+ JDK-8289764: gc/lock tests failed with "OutOfMemoryError: Java heap space: failed reallocation of scalar replaced objects" \+ JDK-8290041: ModuleDescriptor.hashCode is inconsistent \+ JDK-8290203: ProblemList vmTestbase/nsk/jvmti/scenarios/ /capability/CM03/cm03t001/TestDescription.java on linux-all \+ JDK-8290399: [macos] Aqua LAF does not fire an action event if combo box menu is displayed \+ JDK-8292458: Atomic operations on scoped enums don't build with clang \+ JDK-8292946: GC lock/jni/jnilock001 test failed "assert(gch->gc_cause() == GCCause::_scavenge_alot || !gch->incremental_collection_failed()) failed: Twice in a row" \+ JDK-8293117: Add atomic bitset functions \+ JDK-8293547: Add relaxed add_and_fetch for macos aarch64 atomics \+ JDK-8294158: HTML formatting for PassFailJFrame instructions \+ JDK-8294254: [macOS] javax/swing/plaf/aqua/ /CustomComboBoxFocusTest.java failure \+ JDK-8294535: Add screen capture functionality to PassFailJFrame \+ JDK-8295068: SSLEngine throws NPE parsing CertificateRequests \+ JDK-8295124: Atomic::add to pointer type may return wrong value \+ JDK-8295274: HelidonAppTest.java fails "assert(event->should_commit()) failed: invariant" from compiled frame" \+ JDK-8296631: NSS tests failing on OL9 linux-aarch64 hosts \+ JDK-8297968: Crash in PrintOptoAssembly \+ JDK-8298087: XML Schema Validation reports an required attribute twice via ErrorHandler \+ JDK-8299494: Test vmTestbase/nsk/stress/except/except011.java failed: ExceptionInInitializerError: target class not found \+ JDK-8300269: The selected item in an editable JComboBox with titled border is not visible in Aqua LAF \+ JDK-8301306: java/net/httpclient/ _fail with -Xcomp \+ JDK-8301310: The SendRawSysexMessage test may cause a JVM crash \+ JDK-8301787: java/net/httpclient/SpecialHeadersTest failing after JDK-8301306 \+ JDK-8301846: Invalid TargetDataLine after screen lock when using JFileChooser or COM library \+ JDK-8302017: Allocate BadPaddingException only if it will be thrown \+ JDK-8302149: Speed up compiler/jsr292/methodHandleExceptions/ /TestAMEnotNPE.java \+ JDK-8303605: Memory leaks in Metaspace gtests \+ JDK-8304074: [JMX] Add an approximation of total bytes allocated on the Java heap by the JVM \+ JDK-8304696: Duplicate class names in dynamicArchive tests can lead to test failure \+ JDK-8305356: Fix ignored bad CompileCommands in tests \+ JDK-8305900: Use loopback IP addresses in security policy files of httpclient tests \+ JDK-8305906: HttpClient may use incorrect key when finding pooled HTTP/2 connection for IPv6 address \+ JDK-8305962: update jcstress to 0.16 \+ JDK-8305972: Update XML Security for Java to 3.0.2 \+ JDK-8306014: Update javax.net.ssl TLS tests to use SSLContextTemplate or SSLEngineTemplate \+ JDK-8306408: Fix the format of several tables in building.md \+ JDK-8307185: pkcs11 native libraries make JNI calls into java code while holding GC lock \+ JDK-8307926: Support byte-sized atomic bitset operations \+ JDK-8307955: Prefer to PTRACE_GETREGSET instead of PTRACE_GETREGS in method 'ps_proc.c::process_get_lwp_regs' \+ JDK-8307990: jspawnhelper must close its writing side of a pipe before reading from it \+ JDK-8308043: Deadlock in TestCSLocker.java due to blocking GC while allocating \+ JDK-8308245: Add -proc:full to describe current default annotation processing policy \+ JDK-8308336: Test java/net/HttpURLConnection/ /HttpURLConnectionExpectContinueTest.java failed: java.net.BindException: Address already in use \+ JDK-8309302: java/net/Socket/Timeouts.java fails with AssertionError on test temporal post condition \+ JDK-8309305: sun/security/ssl/SSLSocketImpl/ /BlockedAsyncClose.java fails with jtreg test timeout \+ JDK-8309462: [AIX] vmTestbase/nsk/jvmti/RunAgentThread/ /agentthr001/TestDescription.java crashing due to empty while loop \+ JDK-8309733: [macOS, Accessibility] VoiceOver: Incorrect announcements of JRadioButton \+ JDK-8309870: Using -proc:full should be considered requesting explicit annotation processing \+ JDK-8310106: sun.security.ssl.SSLHandshake .getHandshakeProducer() incorrectly checks handshakeConsumers \+ JDK-8310238: [test bug] javax/swing/JTableHeader/6889007/ /bug6889007.java fails \+ JDK-8310380: Handle problems in core-related tests on macOS when codesign tool does not work \+ JDK-8310631: test/jdk/sun/nio/cs/TestCharsetMapping.java is spuriously passing \+ JDK-8310807: java/nio/channels/DatagramChannel/Connect.java timed out \+ JDK-8310838: Correct range notations in MethodTypeDesc specification \+ JDK-8310844: [AArch64] C1 compilation fails because monitor offset in OSR buffer is too large for immediate \+ JDK-8310923: Refactor Currency tests to use JUnit \+ JDK-8311081: KeytoolReaderP12Test.java fail on localized Windows platform \+ JDK-8311160: [macOS, Accessibility] VoiceOver: No announcements on JRadioButtonMenuItem and JCheckBoxMenuItem \+ JDK-8311581: Remove obsolete code and comments in TestLVT.java \+ JDK-8311645: Memory leak in jspawnhelper spawnChild after JDK-8307990 \+ JDK-8311986: Disable runtime/os/TestTracePageSizes.java for ShenandoahGC \+ JDK-8312428: PKCS11 tests fail with NSS 3.91 \+ JDK-8312434: SPECjvm2008/xml.transform with CDS fails with "can't seal package nu.xom" \+ JDK-8313081: MonitoringSupport_lock should be unconditionally initialized after 8304074 \+ JDK-8313082: Enable CreateCoredumpOnCrash for testing in makefiles \+ JDK-8313206: PKCS11 tests silently skip execution \+ JDK-8313575: Refactor PKCS11Test tests \+ JDK-8313621: test/jdk/jdk/internal/math/FloatingDecimal/ /TestFloatingDecimal should use RandomFactory \+ JDK-8313643: Update HarfBuzz to 8.2.2 \+ JDK-8313816: Accessing jmethodID might lead to spurious crashes \+ JDK-8314164: java/net/HttpURLConnection/ /HttpURLConnectionExpectContinueTest.java fails intermittently in timeout \+ JDK-8314220: Configurable InlineCacheBuffer size \+ JDK-8314830: runtime/ErrorHandling/ tests ignore external VM flags \+ JDK-8315034: File.mkdirs() occasionally fails to create folders on Windows shared folder \+ JDK-8315042: NPE in PKCS7.parseOldSignedData \+ JDK-8315594: Open source few headless Swing misc tests \+ JDK-8315600: Open source few more headless Swing misc tests \+ JDK-8315602: Open source swing security manager test \+ JDK-8315611: Open source swing text/html and tree test \+ JDK-8315680: java/lang/ref/ReachabilityFenceTest.java should run with -Xbatch \+ JDK-8315731: Open source several Swing Text related tests \+ JDK-8315761: Open source few swing JList and JMenuBar tests \+ JDK-8315920: C2: "control input must dominate current control" assert failure \+ JDK-8315986: [macos14] javax/swing/JMenuItem/4654927/ /bug4654927.java: component must be showing on the screen to determine its location \+ JDK-8316001: GC: Make TestArrayAllocatorMallocLimit use createTestJvm \+ JDK-8316028: Update FreeType to 2.13.2 \+ JDK-8316030: Update Libpng to 1.6.40 \+ JDK-8316106: Open source few swing JInternalFrame and JMenuBar tests \+ JDK-8316304: (fs) Add support for BasicFileAttributes .creationTime() for Linux \+ JDK-8316392: compiler/interpreter/ /TestVerifyStackAfterDeopt.java failed with SIGBUS in PcDescContainer::find_pc_desc_internal \+ JDK-8316414: C2: large byte array clone triggers "failed: malformed control flow" assertion failure on linux-x86 \+ JDK-8316415: Parallelize sun/security/rsa/SignedObjectChain.java subtests \+ JDK-8316418: containers/docker/TestMemoryWithCgroupV1.java get OOM killed with Parallel GC \+ JDK-8316445: Mark com/sun/management/HotSpotDiagnosticMXBean/ /CheckOrigin.java as vm.flagless \+ JDK-8316679: C2 SuperWord: wrong result, load should not be moved before store if not comparable \+ JDK-8316693: Simplify at-requires checkDockerSupport() \+ JDK-8316929: Shenandoah: Shenandoah degenerated GC and full GC need to cleanup old OopMapCache entries \+ JDK-8316947: Write a test to check textArea triggers MouseEntered/MouseExited events properly \+ JDK-8317039: Enable specifying the JDK used to run jtreg \+ JDK-8317144: Exclude sun/security/pkcs11/sslecc/ /ClientJSSEServerJSSE.java on Linux ppc64le \+ JDK-8317307: test/jdk/com/sun/jndi/ldap/ /LdapPoolTimeoutTest.java fails with ConnectException: Connection timed out: no further information \+ JDK-8317603: Improve exception messages thrown by sun.nio.ch.Net native methods (win) \+ JDK-8317771: [macos14] Expand/collapse a JTree using keyboard freezes the application in macOS 14 Sonoma \+ JDK-8317807: JAVA_FLAGS removed from jtreg running in JDK-8317039 \+ JDK-8317960: [17u] Excessive CPU usage on AbstractQueuedSynchronized.isEnqueued \+ JDK-8318154: Improve stability of WheelModifier.java test \+ JDK-8318183: C2: VM may crash after hitting node limit \+ JDK-8318410: jdk/java/lang/instrument/BootClassPath/ /BootClassPathTest.sh fails on Japanese Windows \+ JDK-8318468: compiler/tiered/LevelTransitionTest.java fails with -XX:CompileThreshold=100 -XX:TieredStopAtLevel=1 \+ JDK-8318490: Increase timeout for JDK tests that are close to the limit when run with libgraal \+ JDK-8318603: Parallelize sun/java2d/marlin/ClipShapeTest.java \+ JDK-8318607: Enable parallelism in vmTestbase/nsk/stress/jni tests \+ JDK-8318608: Enable parallelism in vmTestbase/nsk/stress/threads tests \+ JDK-8318689: jtreg is confused when folder name is the same as the test name \+ JDK-8318736: com/sun/jdi/JdwpOnThrowTest.java failed with "transport error 202: bind failed: Address already in use" \+ JDK-8318951: Additional negative value check in JPEG decoding \+ JDK-8318955: Add ReleaseIntArrayElements in Java_sun_awt_X11_XlibWrapper_SetBitmapShape XlbWrapper.c to early return \+ JDK-8318957: Enhance agentlib:jdwp help output by info about allow option \+ JDK-8318961: increase javacserver connection timeout values and max retry attempts \+ JDK-8318971: Better Error Handling for Jar Tool When Processing Non- existent Files \+ JDK-8318983: Fix comment typo in PKCS12Passwd.java \+ JDK-8319124: Update XML Security for Java to 3.0.3 \+ JDK-8319213: Compatibility.java reads both stdout and stderr of JdkUtils \+ JDK-8319436: Proxy.newProxyInstance throws NPE if loader is null and interface not visible from class loader \+ JDK-8319456: jdk/jfr/event/gc/collection/ /TestGCCauseWith[Serial|Parallel].java : GC cause 'GCLocker Initiated GC' not in the valid causes \+ JDK-8319668: Fixup of jar filename typo in BadFactoryTest.sh \+ JDK-8319922: libCreationTimeHelper.so fails to link in JDK 21 \+ JDK-8319961: JvmtiEnvBase doesn't zero _ext_event_callbacks \+ JDK-8320001: javac crashes while adding type annotations to the return type of a constructor \+ JDK-8320168: handle setsocktopt return values \+ JDK-8320208: Update Public Suffix List to b5bf572 \+ JDK-8320300: Adjust hs_err output in malloc/mmap error cases \+ JDK-8320363: ppc64 TypeEntries::type_unknown logic looks wrong, missed optimization opportunity \+ JDK-8320597: RSA signature verification fails on signed data that does not encode params correctly \+ JDK-8320798: Console read line with zero out should zero out underlying buffer \+ JDK-8320885: Bump update version for OpenJDK: jdk-17.0.11 \+ JDK-8320921: GHA: Parallelize hotspot_compiler test jobs \+ JDK-8320937: support latest VS2022 MSC_VER in abstract_vm_version.cpp \+ JDK-8321151: JDK-8294427 breaks Windows L&F on all older Windows versions \+ JDK-8321215: Incorrect x86 instruction encoding for VSIB addressing mode \+ JDK-8321408: Add Certainly roots R1 and E1 \+ JDK-8321480: ISO 4217 Amendment 176 Update \+ JDK-8321599: Data loss in AVX3 Base64 decoding \+ JDK-8321815: Shenandoah: gc state should be synchronized to java threads only once per safepoint \+ JDK-8321972: test runtime/Unsafe/InternalErrorTest.java timeout on linux-riscv64 platform \+ JDK-8322098: os::Linux::print_system_memory_info enhance the THP output with /sys/kernel/mm/transparent_hugepage/hpage_pmd_size \+ JDK-8322321: Add man page doc for -XX:+VerifySharedSpaces \+ JDK-8322417: Console read line with zero out should zero out when throwing exception \+ JDK-8322583: RISC-V: Enable fast class initialization checks \+ JDK-8322725: (tz) Update Timezone Data to 2023d \+ JDK-8322750: Test "api/java_awt/interactive/ /SystemTrayTests.html" failed because A blue ball icon is added outside of the system tray \+ JDK-8322772: Clean up code after JDK-8322417 \+ JDK-8322783: prioritize /etc/os-release over /etc/SuSE-release in hs_err/info output \+ JDK-8322968: [17u] Amend Atomics gtest with 1-byte tests \+ JDK-8323008: filter out harmful -std_ flags added by autoconf from CXX \+ JDK-8323021: Shenandoah: Encountered reference count always attributed to first worker thread \+ JDK-8323086: Shenandoah: Heap could be corrupted by oom during evacuation \+ JDK-8323243: JNI invocation of an abstract instance method corrupts the stack \+ JDK-8323331: fix typo hpage_pdm_size \+ JDK-8323428: Shenandoah: Unused memory in regions compacted during a full GC should be mangled \+ JDK-8323515: Create test alias "all" for all test roots \+ JDK-8323637: Capture hotspot replay files in GHA \+ JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/platform/docker/TestDockerMemoryMetrics.java always fail because OOM killed \+ JDK-8323806: [17u] VS2017 build fails with warning after 8293117\. \+ JDK-8324184: Windows VS2010 build failed with "error C2275: 'int64_t'" \+ JDK-8324280: RISC-V: Incorrect implementation in VM_Version::parse_satp_mode \+ JDK-8324347: Enable "maybe-uninitialized" warning for FreeType 2.13.1 \+ JDK-8324514: ClassLoaderData::print_on should print address of class loader \+ JDK-8324647: Invalid test group of lib-test after JDK-8323515 \+ JDK-8324659: GHA: Generic jtreg errors are not reported \+ JDK-8324937: GHA: Avoid multiple test suites per job \+ JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/ /AKISerialNumber.java is failing \+ JDK-8325150: (tz) Update Timezone Data to 2024a \+ JDK-8325585: Remove no longer necessary calls to set/unset-in-asgct flag in JDK 17 \+ JDK-8326000: Remove obsolete comments for class sun.security.ssl.SunJSSE \+ JDK-8327036: [macosx- aarch64] SIGBUS in MarkActivationClosure::do_code_blob reached from Unsafe_CopySwapMemory0 \+ JDK-8327391: Add SipHash attribution file \+ JDK-8329836: [17u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.11 * Removed the possibility to use the system timezone-java (bsc#1213470). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1499=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1499=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1499=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1499=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1499=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1499=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1499=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1499=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1499=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1499=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1499=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-jmods-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-src-17.0.11.0-150400.3.42.1 * openSUSE Leap 15.4 (noarch) * java-17-openjdk-javadoc-17.0.11.0-150400.3.42.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-jmods-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-src-17.0.11.0-150400.3.42.1 * openSUSE Leap 15.5 (noarch) * java-17-openjdk-javadoc-17.0.11.0-150400.3.42.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Manager Proxy 4.3 (x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-17-openjdk-17.0.11.0-150400.3.42.1 * java-17-openjdk-debugsource-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-debuginfo-17.0.11.0-150400.3.42.1 * java-17-openjdk-headless-17.0.11.0-150400.3.42.1 * java-17-openjdk-demo-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-17.0.11.0-150400.3.42.1 * java-17-openjdk-devel-debuginfo-17.0.11.0-150400.3.42.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21011.html * https://www.suse.com/security/cve/CVE-2024-21012.html * https://www.suse.com/security/cve/CVE-2024-21068.html * https://www.suse.com/security/cve/CVE-2024-21094.html * https://bugzilla.suse.com/show_bug.cgi?id=1213470 * https://bugzilla.suse.com/show_bug.cgi?id=1222979 * https://bugzilla.suse.com/show_bug.cgi?id=1222983 * https://bugzilla.suse.com/show_bug.cgi?id=1222986 * https://bugzilla.suse.com/show_bug.cgi?id=1222987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 08:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 08:30:15 -0000 Subject: SUSE-SU-2024:1498-1: low: Security update for java-11-openjdk Message-ID: <171498421567.10143.15340746427270959386@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2024:1498-1 Rating: low References: * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986 * bsc#1222987 Cross-References: * CVE-2024-21011 * CVE-2024-21012 * CVE-2024-21068 * CVE-2024-21085 * CVE-2024-21094 CVSS scores: * CVE-2024-21011 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21012 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21068 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-21085 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21094 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: * CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979) * CVE-2024-21012: Fixed unauthorized data modification due HTTP/2 client improper reverse DNS lookup (JDK-8315708,bsc#1222987) * CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983) * CVE-2024-21085: Fixed denial of service due to Pack200 excessive memory allocation (JDK-8322114,bsc#1222984) * CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with "Exceeded _node_regs array" (JDK-8317507,JDK-8325348,bsc#1222986) Other fixes: \- Upgrade to upstream tag jdk-11.0.23+9 (April 2024 CPU) * Security fixes \+ JDK-8318340: Improve RSA key implementations * Other changes \+ JDK-6928542: Chinese characters in RTF are not decoded \+ JDK-7132796: [macosx] closed/javax/swing/JComboBox/4517214/ /bug4517214.java fails on MacOS \+ JDK-7148092: [macosx] When Alt+down arrow key is pressed, the combobox popup does not appear. \+ JDK-8054022: HttpURLConnection timeouts with Expect: 100-Continue and no chunking \+ JDK-8054572: [macosx] JComboBox paints the border incorrectly \+ JDK-8058176: [mlvm] tests should not allow code cache exhaustion \+ JDK-8067651: LevelTransitionTest.java, fix trivial methods levels logic \+ JDK-8068225: nsk/jdi/EventQueue/remove_l/remove_l005 intermittently times out \+ JDK-8156889: ListKeychainStore.sh fails in some virtualized environments \+ JDK-8166275: vm/mlvm/meth/stress/compiler/deoptimize keeps timeouting \+ JDK-8166554: Avoid compilation blocking in OverloadCompileQueueTest.java \+ JDK-8169475: WheelModifier.java fails by timeout \+ JDK-8180266: Convert sun/security/provider/KeyStore/DKSTest.sh to Java Jtreg Test \+ JDK-8186610: move ModuleUtils to top-level testlibrary \+ JDK-8192864: defmeth tests can hide failures \+ JDK-8193543: Regression automated test '/open/test/jdk/java/ /awt/TrayIcon/SystemTrayInstance/SystemTrayInstanceTest.java' fails \+ JDK-8198668: MemoryPoolMBean/isUsageThresholdExceeded/ /isexceeded001/TestDescription.java still failing \+ JDK-8202282: [TESTBUG] appcds TestCommon .makeCommandLineForAppCDS() can be removed \+ JDK-8202790: DnD test DisposeFrameOnDragTest.java does not clean up \+ JDK-8202931: [macos] java/awt/Choice/ChoicePopupLocation/ /ChoicePopupLocation.java fails \+ JDK-8207211: [TESTBUG] Remove excessive output from CDS/AppCDS tests \+ JDK-8207214: Broken links in JDK API serialized-form page \+ JDK-8207855: Make applications/jcstress invoke tests in batches \+ JDK-8208243: vmTestbase/gc/lock/jni/jnilock002/ /TestDescription.java fails in jdk/hs nightly \+ JDK-8208278: [mlvm] [TESTBUG] vm.mlvm.mixed.stress.java .findDeadlock.INDIFY_Test Deadlocked threads are not always detected \+ JDK-8208623: [TESTBUG] runtime/LoadClass/LongBCP.java fails in AUFS file system \+ JDK-8208699: remove unneeded imports from runtime tests \+ JDK-8208704: runtime/appcds/MultiReleaseJars.java timed out often in hs-tier7 testing \+ JDK-8208705: [TESTBUG] The -Xlog:cds,cds+hashtables vm option is not always required for appcds tests \+ JDK-8209549: remove VMPropsExt from TEST.ROOT \+ JDK-8209595: MonitorVmStartTerminate.java timed out \+ JDK-8209946: [TESTBUG] CDS tests should use "@run driver" \+ JDK-8211438: [Testbug] runtime/XCheckJniJsig/XCheckJSig.java looks for libjsig in wrong location \+ JDK-8211978: Move testlibrary/jdk/testlibrary/ /SimpleSSLContext.java and testkeys to network testlibrary \+ JDK-8213622: Windows VS2013 build failure - "'snprintf': identifier not found" \+ JDK-8213926: WB_EnqueueInitializerForCompilation requests compilation for NULL \+ JDK-8213927: G1 ignores AlwaysPreTouch when UseTransparentHugePages is enabled \+ JDK-8214908: add ctw tests for jdk.jfr and jdk.management.jfr modules \+ JDK-8214915: CtwRunner misses export for jdk.internal.access \+ JDK-8216408: XMLStreamWriter setDefaultNamespace(null) throws NullPointerException \+ JDK-8217475: Unexpected StackOverflowError in "process reaper" thread \+ JDK-8218754: JDK-8068225 regression in JDIBreakpointTest \+ JDK-8219475: javap man page needs to be updated \+ JDK-8219585: [TESTBUG] sun/management/jmxremote/bootstrap/ /JMXInterfaceBindingTest.java passes trivially when it shouldn't \+ JDK-8219612: [TESTBUG] compiler.codecache.stress.Helper .TestCaseImpl can't be defined in different runtime package as its nest host \+ JDK-8225471: Test utility jdk.test.lib.util.FileUtils .areAllMountPointsAccessible needs to tolerate duplicates \+ JDK-8226706: (se) Reduce the number of outer loop iterations on Windows in java/nio/channels/Selector/RacyDeregister.java \+ JDK-8226905: unproblem list applications/ctw/modules/ _tests on windows \+ JDK-8226910: make it possible to use jtreg 's -match via run-test framework \+ JDK-8227438: [TESTLIB] Determine if file exists by Files.exists in function FileUtils.deleteFileIfExistsWithRetry \+ JDK-8231585: java/lang/management/ThreadMXBean/ /MaxDepthForThreadInfoTest.java fails with java.lang.NullPointerException \+ JDK-8232839: JDI AfterThreadDeathTest.java failed due to "FAILED: Did not get expected IllegalThreadStateException on a StepRequest.enable()" \+ JDK-8233453: MLVM deoptimize stress test timed out \+ JDK-8234309: LFGarbageCollectedTest.java fails with parse Exception \+ JDK-8237222: [macos] java/awt/Focus/UnaccessibleChoice/ /AccessibleChoiceTest.java fails \+ JDK-8237777: "Dumping core ..." is shown despite claiming that "# No core dump will be written." \+ JDK-8237834: com/sun/jndi/ldap/LdapDnsProviderTest.java failing with LDAP response read timeout \+ JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel \+ JDK-8239801: [macos] java/awt/Focus/UnaccessibleChoice/ /AccessibleChoiceTest.java fails \+ JDK-8244679: JVM/TI GetCurrentContendedMonitor/contmon001 failed due to "(IsSameObject#3) unexpected monitor object: 0x000000562336DBA8" \+ JDK-8246222: Rename javac test T6395981.java to be more informative \+ JDK-8247818: GCC 10 warning stringop- overflow with symbol code \+ JDK-8249087: Always initialize _body[0..1] in Symbol constructor \+ JDK-8251349: Add TestCaseImpl to OverloadCompileQueueTest.java's build dependencies \+ JDK-8251904: vmTestbase/nsk/sysdict/vm/stress/btree/btree010/ /btree010.java fails with ClassNotFoundException: nsk.sysdict.share.BTree0LLRLRLRRLR \+ JDK-8253543: sanity/client/SwingSet/src/ /ButtonDemoScreenshotTest.java failed with "AssertionError: All pixels are not black" \+ JDK-8253739: java/awt/image/MultiResolutionImage/ /MultiResolutionImageObserverTest.java fails \+ JDK-8253820: Save test images and dumps with timestamps from client sanity suite \+ JDK-8255277: randomDelay in DrainDeadlockT and LoggingDeadlock do not randomly delay \+ JDK-8255546: Missing coverage for javax.smartcardio.CardPermission and ResponseAPDU \+ JDK-8255743: Relax SIGFPE match in in runtime/ErrorHandling/SecondaryErrorTest.java \+ JDK-8257505: nsk/share/test/StressOptions stressTime is scaled in getter but not when printed \+ JDK-8259801: Enable XML Signature secure validation mode by default \+ JDK-8264135: UnsafeGetStableArrayElement should account for different JIT implementation details \+ JDK-8265349: vmTestbase/../stress/compiler/deoptimize/ /Test.java fails with OOME due to CodeCache exhaustion. \+ JDK-8269025: jsig/Testjsig.java doesn't check exit code \+ JDK-8269077: TestSystemGC uses "require vm.gc.G1" for large pages subtest \+ JDK-8271094: runtime/duplAttributes/DuplAttributesTest.java doesn't check exit code \+ JDK-8271224: runtime/EnclosingMethodAttr/EnclMethodAttr.java doesn't check exit code \+ JDK-8271828: mark hotspot runtime/classFileParserBug tests which ignore external VM flags \+ JDK-8271829: mark hotspot runtime/Throwable tests which ignore external VM flags \+ JDK-8271890: mark hotspot runtime/Dictionary tests which ignore external VM flags \+ JDK-8272291: mark hotspot runtime/logging tests which ignore external VM flags \+ JDK-8272335: runtime/cds/appcds/MoveJDKTest.java doesn't check exit codes \+ JDK-8272551: mark hotspot runtime/modules tests which ignore external VM flags \+ JDK-8272552: mark hotspot runtime/cds tests which ignore external VM flags \+ JDK-8273803: Zero: Handle "zero" variant in CommandLineOptionTest.java \+ JDK-8274122: java/io/File/createTempFile/SpecialTempFile.java fails in Windows 11 \+ JDK-8274621: NullPointerException because listenAddress[0] is null \+ JDK-8276796: gc/TestSystemGC.java large pages subtest fails with ZGC \+ JDK-8280007: Enable Neoverse N1 optimizations for Arm Neoverse V1 & N2 \+ JDK-8281149: (fs) java/nio/file/FileStore/Basic.java fails with java.lang.RuntimeException: values differ by more than 1GB \+ JDK-8281377: Remove vmTestbase/nsk/monitoring/ThreadMXBean/ /ThreadInfo/Deadlock/JavaDeadlock001/TestDescription.java from problemlist. \+ JDK-8281717: Cover logout method for several LoginModule \+ JDK-8282665: [REDO] ByteBufferTest.java: replace endless recursion with RuntimeException in void ck(double x, double y) \+ JDK-8284090: com/sun/security/auth/module/AllPlatforms.java fails to compile \+ JDK-8285756: clean up use of bad arguments for `@clean` in langtools tests \+ JDK-8285785: CheckCleanerBound test fails with PasswordCallback object is not released \+ JDK-8285867: Convert applet manual tests SelectionVisible.java to Frame and automate \+ JDK-8286846: test/jdk/javax/swing/plaf/aqua/ /CustomComboBoxFocusTest.java fails on mac aarch64 \+ JDK-8286969: Add a new test library API to execute kinit in SecurityTools.java \+ JDK-8287113: JFR: Periodic task thread uses period for method sampling events \+ JDK-8289511: Improve test coverage for XPath Axes: child \+ JDK-8289764: gc/lock tests failed with "OutOfMemoryError: Java heap space: failed reallocation of scalar replaced objects" \+ JDK-8289948: Improve test coverage for XPath functions: Node Set Functions \+ JDK-8290399: [macos] Aqua LAF does not fire an action event if combo box menu is displayed \+ JDK-8290909: MemoryPoolMBean/isUsageThresholdExceeded tests failed with "isUsageThresholdExceeded() returned false, and is still false, while threshold = MMMMMMM and used peak = NNNNNNN" \+ JDK-8292182: [TESTLIB] Enhance JAXPPolicyManager to setup required permissions for jtreg version 7 jar \+ JDK-8292946: GC lock/jni/jnilock001 test failed "assert(gch->gc_cause() == GCCause::_scavenge_alot || !gch->incremental_collection_failed()) failed: Twice in a row" \+ JDK-8293819: sun/util/logging/PlatformLoggerTest.java failed with "RuntimeException: Retrieved backing PlatformLogger level null is not the expected CONFIG" \+ JDK-8294158: HTML formatting for PassFailJFrame instructions \+ JDK-8294254: [macOS] javax/swing/plaf/aqua/ /CustomComboBoxFocusTest.java failure \+ JDK-8294402: Add diagnostic logging to VMProps.checkDockerSupport \+ JDK-8294535: Add screen capture functionality to PassFailJFrame \+ JDK-8296083: javax/swing/JTree/6263446/bug6263446.java fails intermittently on a VM \+ JDK-8296384: [TESTBUG] sun/security/provider/SecureRandom/ /AbstractDrbg/SpecTest.java intermittently timeout \+ JDK-8299494: Test vmTestbase/nsk/stress/except/except011.java failed: ExceptionInInitializerError: target class not found \+ JDK-8300269: The selected item in an editable JComboBox with titled border is not visible in Aqua LAF \+ JDK-8300727: java/awt/List/ListGarbageCollectionTest/ /AwtListGarbageCollectionTest.java failed with "List wasn't garbage collected" \+ JDK-8301310: The SendRawSysexMessage test may cause a JVM crash \+ JDK-8301377: adjust timeout for JLI GetObjectSizeIntrinsicsTest.java subtest again \+ JDK-8301846: Invalid TargetDataLine after screen lock when using JFileChooser or COM library \+ JDK-8302017: Allocate BadPaddingException only if it will be thrown \+ JDK-8302109: Trivial fixes to btree tests \+ JDK-8302149: Speed up compiler/jsr292/methodHandleExceptions/TestAMEnotNPE.java \+ JDK-8302607: increase timeout for ContinuousCallSiteTargetChange.java \+ JDK-8304074: [JMX] Add an approximation of total bytes allocated on the Java heap by the JVM \+ JDK-8304314: StackWalkTest.java fails after CODETOOLS-7903373 \+ JDK-8304725: AsyncGetCallTrace can cause SIGBUS on M1 \+ JDK-8305502: adjust timeouts in three more M&M tests \+ JDK-8305505: NPE in javazic compiler \+ JDK-8305972: Update XML Security for Java to 3.0.2 \+ JDK-8306072: Open source several AWT MouseInfo related tests \+ JDK-8306076: Open source AWT misc tests \+ JDK-8306409: Open source AWT KeyBoardFocusManger, LightWeightComponent related tests \+ JDK-8306640: Open source several AWT TextArea related tests \+ JDK-8306652: Open source AWT MenuItem related tests \+ JDK-8306681: Open source more AWT DnD related tests \+ JDK-8306683: Open source several clipboard and color AWT tests \+ JDK-8306752: Open source several container and component AWT tests \+ JDK-8306753: Open source several container AWT tests \+ JDK-8306755: Open source few Swing JComponent and AbstractButton tests \+ JDK-8306812: Open source several AWT Miscellaneous tests \+ JDK-8306871: Open source more AWT Drag & Drop tests \+ JDK-8306996: Open source Swing MenuItem related tests \+ JDK-8307123: Fix deprecation warnings in DPrinter \+ JDK-8307130: Open source few Swing JMenu tests \+ JDK-8307299: Move more DnD tests to open \+ JDK-8307311: Timeouts on one macOS 12.6.1 host of two Swing JTableHeader tests \+ JDK-8307381: Open Source JFrame, JIF related Swing Tests \+ JDK-8307683: Loop Predication should not hoist range checks with trap on success projection by negating their condition \+ JDK-8308043: Deadlock in TestCSLocker.java due to blocking GC while allocating \+ JDK-8308116: jdk.test.lib.compiler.InMemoryJavaCompiler .compile does not close files \+ JDK-8308223: failure handler missed jcmd.vm.info command \+ JDK-8308232: nsk/jdb tests don't pass -verbose flag to the debuggee \+ JDK-8308245: Add -proc:full to describe current default annotation processing policy \+ JDK-8308336: Test java/net/HttpURLConnection/ /HttpURLConnectionExpectContinueTest.java failed: java.net.BindException: Address already in use \+ JDK-8309104: [JVMCI] compiler/unsafe/ /UnsafeGetStableArrayElement test asserts wrong values with Graal \+ JDK-8309119: [17u/11u] Redo JDK-8297951: C2: Create skeleton predicates for all If nodes in loop predication \+ JDK-8309462: [AIX] vmTestbase/nsk/jvmti/RunAgentThread/ /agentthr001/TestDescription.java crashing due to empty while loop \+ JDK-8309778: java/nio/file/Files/CopyAndMove.java fails when using second test directory \+ JDK-8309870: Using -proc:full should be considered requesting explicit annotation processing \+ JDK-8310106: sun.security.ssl.SSLHandshake .getHandshakeProducer() incorrectly checks handshakeConsumers \+ JDK-8310238: [test bug] javax/swing/JTableHeader/6889007/ /bug6889007.java fails \+ JDK-8310551: vmTestbase/nsk/jdb/interrupt/interrupt001/ /interrupt001.java timed out due to missing prompt \+ JDK-8310807: java/nio/channels/DatagramChannel/Connect.java timed out \+ JDK-8311081: KeytoolReaderP12Test.java fail on localized Windows platform \+ JDK-8311511: Improve description of NativeLibrary JFR event \+ JDK-8311585: Add JRadioButtonMenuItem to bug8031573.java \+ JDK-8313081: MonitoringSupport_lock should be unconditionally initialized after 8304074 \+ JDK-8313082: Enable CreateCoredumpOnCrash for testing in makefiles \+ JDK-8313164: src/java.desktop/windows/native/libawt/windows/ /awt_Robot.cpp GetRGBPixels adjust releasing of resources \+ JDK-8313252: Java_sun_awt_windows_ThemeReader_paintBackground release resources in early returns \+ JDK-8313643: Update HarfBuzz to 8.2.2 \+ JDK-8313816: Accessing jmethodID might lead to spurious crashes \+ JDK-8314144: gc/g1/ihop/TestIHOPStatic.java fails due to extra concurrent mark with -Xcomp \+ JDK-8314164: java/net/HttpURLConnection/ /HttpURLConnectionExpectContinueTest.java fails intermittently in timeout \+ JDK-8314883: Java_java_util_prefs_FileSystemPreferences_lockFile0 write result errno in missing case \+ JDK-8315034: File.mkdirs() occasionally fails to create folders on Windows shared folder \+ JDK-8315042: NPE in PKCS7.parseOldSignedData \+ JDK-8315415: OutputAnalyzer.shouldMatchByLine() fails in some cases \+ JDK-8315499: build using devkit on Linux ppc64le RHEL puts path to devkit into libsplashscreen \+ JDK-8315594: Open source few headless Swing misc tests \+ JDK-8315600: Open source few more headless Swing misc tests \+ JDK-8315602: Open source swing security manager test \+ JDK-8315606: Open source few swing text/html tests \+ JDK-8315611: Open source swing text/html and tree test \+ JDK-8315680: java/lang/ref/ReachabilityFenceTest.java should run with -Xbatch \+ JDK-8315731: Open source several Swing Text related tests \+ JDK-8315761: Open source few swing JList and JMenuBar tests \+ JDK-8315986: [macos14] javax/swing/JMenuItem/4654927/ /bug4654927.java: component must be showing on the screen to determine its location \+ JDK-8316001: GC: Make TestArrayAllocatorMallocLimit use createTestJvm \+ JDK-8316028: Update FreeType to 2.13.2 \+ JDK-8316030: Update Libpng to 1.6.40 \+ JDK-8316106: Open source few swing JInternalFrame and JMenuBar tests \+ JDK-8316461: Fix: make test outputs TEST SUCCESS after unsuccessful exit \+ JDK-8316947: Write a test to check textArea triggers MouseEntered/MouseExited events properly \+ JDK-8317307: test/jdk/com/sun/jndi/ldap/ /LdapPoolTimeoutTest.java fails with ConnectException: Connection timed out: no further information \+ JDK-8317327: Remove JT_JAVA dead code in jib-profiles.js \+ JDK-8318154: Improve stability of WheelModifier.java test \+ JDK-8318410: jdk/java/lang/instrument/BootClassPath/ /BootClassPathTest.sh fails on Japanese Windows \+ JDK-8318468: compiler/tiered/LevelTransitionTest.java fails with -XX:CompileThreshold=100 -XX:TieredStopAtLevel=1 \+ JDK-8318603: Parallelize sun/java2d/marlin/ClipShapeTest.java \+ JDK-8318607: Enable parallelism in vmTestbase/nsk/stress/jni tests \+ JDK-8318608: Enable parallelism in vmTestbase/nsk/stress/threads tests \+ JDK-8318736: com/sun/jdi/JdwpOnThrowTest.java failed with "transport error 202: bind failed: Address already in use" \+ JDK-8318889: C2: add bailout after assert Bad graph detected in build_loop_late \+ JDK-8318951: Additional negative value check in JPEG decoding \+ JDK-8318955: Add ReleaseIntArrayElements in Java_sun_awt_X11_XlibWrapper_SetBitmapShape XlbWrapper.c to early return \+ JDK-8318971: Better Error Handling for Jar Tool When Processing Non-existent Files \+ JDK-8318983: Fix comment typo in PKCS12Passwd.java \+ JDK-8319124: Update XML Security for Java to 3.0.3 \+ JDK-8319456: jdk/jfr/event/gc/collection/ /TestGCCauseWith[Serial|Parallel].java : GC cause 'GCLocker Initiated GC' not in the valid causes \+ JDK-8319668: Fixup of jar filename typo in BadFactoryTest.sh \+ JDK-8320001: javac crashes while adding type annotations to the return type of a constructor \+ JDK-8320208: Update Public Suffix List to b5bf572 \+ JDK-8320363: ppc64 TypeEntries::type_unknown logic looks wrong, missed optimization opportunity \+ JDK-8320597: RSA signature verification fails on signed data that does not encode params correctly \+ JDK-8320798: Console read line with zero out should zero out underlying buffer \+ JDK-8320884: Bump update version for OpenJDK: jdk-11.0.23 \+ JDK-8320937: support latest VS2022 MSC_VER in abstract_vm_version.cpp \+ JDK-8321151: JDK-8294427 breaks Windows L&F on all older Windows versions \+ JDK-8321215: Incorrect x86 instruction encoding for VSIB addressing mode \+ JDK-8321408: Add Certainly roots R1 and E1 \+ JDK-8321480: ISO 4217 Amendment 176 Update \+ JDK-8322178: Error. can't find jdk.testlibrary .SimpleSSLContext in test directory or libraries \+ JDK-8322417: Console read line with zero out should zero out when throwing exception \+ JDK-8322725: (tz) Update Timezone Data to 2023d \+ JDK-8322750: Test "api/java_awt/interactive/ /SystemTrayTests.html" failed because A blue ball icon is added outside of the system tray \+ JDK-8322752: [11u] GetStackTraceAndRetransformTest.java is failing assert \+ JDK-8322772: Clean up code after JDK-8322417 \+ JDK-8323008: filter out harmful -std_ flags added by autoconf from CXX \+ JDK-8323243: JNI invocation of an abstract instance method corrupts the stack \+ JDK-8323515: Create test alias "all" for all test roots \+ JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/ /platform/docker/TestDockerMemoryMetrics.java always fail because OOM killed \+ JDK-8324184: Windows VS2010 build failed with "error C2275: 'int64_t'" \+ JDK-8324307: [11u] hotspot fails to build with GCC 12 and newer (non-static data member initializers) \+ JDK-8324347: Enable "maybe- uninitialized" warning for FreeType 2.13.1 \+ JDK-8324659: GHA: Generic jtreg errors are not reported \+ JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/ /AKISerialNumber.java is failing \+ JDK-8325150: (tz) Update Timezone Data to 2024a \+ JDK-8326109: GCC 13 reports maybe-uninitialized warnings for jni.cpp with dtrace enabled \+ JDK-8326503: [11u] java/net/HttpURLConnection/ /HttpURLConnectionExpectContinueTest.java fail because of package org.junit.jupiter.api does not exist \+ JDK-8327391: Add SipHash attribution file \+ JDK-8329837: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.23 * Removed the possibility to use the system timezone-java (bsc#1213470) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1498=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1498=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1498=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1498=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1498=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1498=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1498=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1498=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1498=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1498=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1498=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1498=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1498=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1498=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1498=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1498=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1498=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1498=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Manager Proxy 4.3 (x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-src-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-jmods-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * openSUSE Leap 15.5 (noarch) * java-11-openjdk-javadoc-11.0.23.0-150000.3.113.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * SUSE Package Hub 15 15-SP5 (noarch) * java-11-openjdk-javadoc-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debuginfo-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-demo-11.0.23.0-150000.3.113.1 * java-11-openjdk-11.0.23.0-150000.3.113.1 * java-11-openjdk-devel-11.0.23.0-150000.3.113.1 * java-11-openjdk-headless-11.0.23.0-150000.3.113.1 * java-11-openjdk-debugsource-11.0.23.0-150000.3.113.1 ## References: * https://www.suse.com/security/cve/CVE-2024-21011.html * https://www.suse.com/security/cve/CVE-2024-21012.html * https://www.suse.com/security/cve/CVE-2024-21068.html * https://www.suse.com/security/cve/CVE-2024-21085.html * https://www.suse.com/security/cve/CVE-2024-21094.html * https://bugzilla.suse.com/show_bug.cgi?id=1213470 * https://bugzilla.suse.com/show_bug.cgi?id=1222979 * https://bugzilla.suse.com/show_bug.cgi?id=1222983 * https://bugzilla.suse.com/show_bug.cgi?id=1222984 * https://bugzilla.suse.com/show_bug.cgi?id=1222986 * https://bugzilla.suse.com/show_bug.cgi?id=1222987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 08:30:18 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 08:30:18 -0000 Subject: SUSE-SU-2024:1497-1: important: Security update for skopeo Message-ID: <171498421826.10143.9571926075724997518@smelt2.prg2.suse.org> # Security update for skopeo Announcement ID: SUSE-SU-2024:1497-1 Rating: important References: * bsc#1215611 * bsc#1219563 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two security fixes can now be installed. ## Description: This update for skopeo fixes the following issues: * Update to version 1.14.2: * [release-1.14] Bump Skopeo to v1.14.2 * [release-1.14] Bump c/image to v5.29.2, c/common to v0.57.3 (fixes bsc#1219563) * Update to version 1.14.1: * Bump to v1.14.1 * fix(deps): update module github.com/containers/common to v0.57.2 * fix(deps): update module github.com/containers/image/v5 to v5.29.1 * chore(deps): update dependency containers/automation_images to v20240102 * Fix libsubid detection * fix(deps): update module golang.org/x/term to v0.16.0 * fix(deps): update golang.org/x/exp digest to 02704c9 * chore(deps): update dependency containers/automation_images to v20231208 * [skip-ci] Update actions/stale action to v9 * fix(deps): update module github.com/containers/common to v0.57.1 * fix(deps): update golang.org/x/exp digest to 6522937 * DOCS: add Gentoo in install.md * DOCS: Update to add Arch Linux in install.md * fix(deps): update module golang.org/x/term to v0.15.0 * Bump to v1.14.1-dev * Update to version 1.14.0: * Bump to v1.14.0 * fix(deps): update module github.com/containers/common to v0.57.0 * chore(deps): update dependency containers/automation_images to v20231116 * fix(deps): update module github.com/containers/image/v5 to v5.29.0 * Add documentation and smoke tests for the new --compat-auth-file options * Update c/image and c/common to latest * fix(deps): update module github.com/containers/storage to v1.51.0 * fix(deps): update module golang.org/x/term to v0.14.0 * fix(deps): update module github.com/spf13/cobra to v1.8.0 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.2 * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.1 * fix(deps): update github.com/containers/common digest to 3e5caa0 * chore(deps): update module google.golang.org/grpc to v1.57.1 [security] * fix(deps): update module github.com/containers/ocicrypt to v1.1.9 * Update github.com/klauspost/compress to v1.17.2 * chore(deps): update module github.com/docker/docker to v24.0.7+incompatible [security] * Fix ENTRYPOINT documentation, drop others. * Remove unused environment variables in Cirrus * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.0 * chore(deps): update dependency containers/automation_images to v20231004 * chore(deps): update module golang.org/x/net to v0.17.0 [security] * copy: Note support for `zstd:chunked` * fix(deps): update module golang.org/x/term to v0.13.0 * fix(deps): update module github.com/docker/distribution to v2.8.3+incompatible * fix(deps): update github.com/containers/common digest to 745eaa4 * Packit: switch to @containers/packit-build team for copr failure notification comments * Packit: tag @lsm5 on copr build failures * vendor of containers/common * fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc5 * fix(deps): update module github.com/containers/common to v0.56.0 * Cirrus: Remove multi-arch skopeo image builds * fix(deps): update module github.com/containers/image/v5 to v5.28.0 * Increase the golangci-lint timeout * fix(deps): update module github.com/containers/storage to v1.50.2 * fix(deps): update module github.com/containers/storage to v1.50.1 * fix(deps): update golang.org/x/exp digest to 9212866 * Fix a man page link * fix(deps): update github.com/containers/image/v5 digest to 58d5eb6 * GHA: Closed issue/PR comment-lock test * fix(deps): update module github.com/containers/common to v0.55.4 * fix(deps): update module github.com/containers/storage to v1.49.0 * rpm: spdx compatible license field * chore(deps): update dependency golangci/golangci-lint to v1.54.2 * chore(deps): update dependency containers/automation_images to v20230816 * Packit: set eln target correctly * packit: Build PRs into default packit COPRs * DOCS: Update Go version requirement info * DOCS: Add information about the cross-build * fix(deps): update module github.com/containers/ocicrypt to v1.1.8 * fix(deps): update module github.com/containers/common to v0.55.3 * Update c/image after https://github.com/containers/image/pull/2070 * chore(deps): update dependency golangci/golangci-lint to v1.54.1 * chore(deps): update dependency containers/automation_images to v20230809 * fix(deps): update golang.org/x/exp digest to 352e893 * chore(deps): update dependency containers/automation_images to v20230807 * Update to Go 1.19 * fix(deps): update module golang.org/x/term to v0.11.0 * Update c/image for golang.org/x/exp * RPM: define gobuild macro for rhel/centos stream * Fix handling the unexpected return value combination from IsRunningImageAllowed * Close the PolicyContext, as required by the API * Use globalOptions.getPolicyContext instead of an image-targeted SystemContext * Packit: remove pre-sync action * fix(deps): update module github.com/containers/common to v0.55.2 * proxy: Change the imgid to uint64 * [CI:BUILD] Packit: install golist before updating downstream spec * Update module golang.org/x/term to v0.10.0 * Bump to v1.14.0-dev * Bump to v1.13.0 * Bump go version to 1.21 (bsc#1215611) * Update to version 1.13.2: * [release-1.13] Bump to v1.13.2 * [release-1.31] Bump c/common v0.55.3 * Packit: remove pre-sync action * [release-1.13] Bump to v1.13.2-dev * Update to version 1.13.1: * [release-1.13] Bump to v1.13.1 * [release-1.13] Bump c/common to v0.55.2 * [release-1.13 backport] [CI:BUILD] Packit: install golist before updating downstream spec * [release-1.13] Bump to v1.13.1-dev * Update to version 1.13.0: * Bump to v1.13.0 * proxy: Policy verification of OCI Image before pulling * Update module github.com/opencontainers/image-spec to v1.1.0-rc4 * Update module github.com/containers/common to v0.55.1 * Update module github.com/containers/common to v0.54.0 * Update module github.com/containers/image/v5 to v5.26.0 * [CI:BUILD] RPM: fix ELN builds * Update module github.com/containers/storage to v1.47.0 * Packit: easier to read distro conditionals * Update dependency golangci/golangci-lint to v1.53.3 * Help Renovate manage the golangci-lint version * Minor: Cleanup renovate configuration * Update dependency containers/automation_images to v20230614 * Update module golang.org/x/term to v0.9.0 * [CI:BUILD] Packit: add jobs for downstream Fedora package builds * Update module github.com/sirupsen/logrus to v1.9.3 * Update dependency containers/automation_images to v20230601 * Update golang.org/x/exp digest to 2e198f4 * Update github.com/containers/image/v5 digest to e14c1c5 * Update module github.com/stretchr/testify to v1.8.4 * Update module github.com/stretchr/testify to v1.8.3 * Update dependency containers/automation_images to v20230517 * Update module github.com/sirupsen/logrus to v1.9.2 * Update module github.com/docker/distribution to v2.8.2+incompatible * Trigger an update of the ostree_ext container image * Update c/image with https://github.com/containers/image/pull/1944 * Update module github.com/containers/common to v0.53.0 * Update module golang.org/x/term to v0.8.0 * Update dependency containers/automation_images to v20230426 * Update golang.org/x/exp digest to 47ecfdc * Emphasize the semantics of --preserve-digests a tiny bit * Improve the static build documentation a tiny bit * Bump to v1.12.1-dev ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1497=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1497=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1497=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1497=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1497=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1497=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1497=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1497=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1497=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1497=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1497=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1497=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1497=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1497=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1497=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1497=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * openSUSE Leap 15.3 (noarch) * skopeo-zsh-completion-1.14.2-150300.11.8.1 * skopeo-bash-completion-1.14.2-150300.11.8.1 * skopeo-fish-completion-1.14.2-150300.11.8.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Manager Proxy 4.3 (x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * skopeo-debuginfo-1.14.2-150300.11.8.1 * skopeo-1.14.2-150300.11.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1215611 * https://bugzilla.suse.com/show_bug.cgi?id=1219563 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:19 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:19 -0000 Subject: SUSE-SU-2024:1532-1: important: Maintenance update for SUSE Manager 4.3 Release Notes Message-ID: <171499861938.9288.10574664666804324039@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3 Release Notes Announcement ID: SUSE-SU-2024:1532-1 Rating: important References: * bsc#1170848 * bsc#1208572 * bsc#1214340 * bsc#1214387 * bsc#1216085 * bsc#1217204 * bsc#1217874 * bsc#1218764 * bsc#1218805 * bsc#1218931 * bsc#1218957 * bsc#1219061 * bsc#1219233 * bsc#1219634 * bsc#1219875 * bsc#1220001 * bsc#1220101 * bsc#1220169 * bsc#1220194 * bsc#1220221 * bsc#1220376 * bsc#1220705 * bsc#1220726 * bsc#1220903 * bsc#1220980 * bsc#1221111 * bsc#1221182 * bsc#1221279 * bsc#1221465 * bsc#1221571 * bsc#1221784 * bsc#1221922 * bsc#1222110 * bsc#1222347 * jsc#MSQA-760 Cross-References: * CVE-2023-51775 CVSS scores: * CVE-2023-51775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability, contains one feature and has 33 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager-proxy: * Update to SUSE Manager 4.3.12 * Bugs mentioned: bsc#1208572, bsc#1214387, bsc#1217204, bsc#1220980, bsc#1221465 bsc#1222347, bsc#1220001 ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: release-notes-susemanager: * Update to SUSE Manager 4.3.12 * Monitoring: Node exporter upgraded to 1.7.0 * Automatic migration from Salt 3000 to the Salt Bundle * New update-salt recurring state * uyuni-proxy-systemd-services package has been added to proxy channel * New Errata getRelevantErrata API endpoint * CVEs fixed: 2023-51775 * Bugs mentioned: bsc#1170848, bsc#1208572, bsc#1214340, bsc#1214387, bsc#1216085 bsc#1217204, bsc#1217874, bsc#1218764, bsc#1218805, bsc#1218931 bsc#1218957, bsc#1219061, bsc#1219233, bsc#1219634, bsc#1219875 bsc#1220101, bsc#1220169, bsc#1220194, bsc#1220221, bsc#1220376 bsc#1220705, bsc#1220726, bsc#1220903, bsc#1220980, bsc#1221111 bsc#1221182, bsc#1221279, bsc#1221465, bsc#1221571, bsc#1221784 bsc#1221922, bsc#1222110, bsc#1222347 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1532=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1532=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1532=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1532=1 ## Package List: * SUSE Manager Proxy 4.3 (noarch) * release-notes-susemanager-proxy-4.3.12-150400.3.82.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * release-notes-susemanager-proxy-4.3.12-150400.3.82.3 * SUSE Manager Server 4.3 (noarch) * release-notes-susemanager-4.3.12-150400.3.108.2 * openSUSE Leap 15.4 (noarch) * release-notes-susemanager-proxy-4.3.12-150400.3.82.3 * release-notes-susemanager-4.3.12-150400.3.108.2 ## References: * https://www.suse.com/security/cve/CVE-2023-51775.html * https://bugzilla.suse.com/show_bug.cgi?id=1170848 * https://bugzilla.suse.com/show_bug.cgi?id=1208572 * https://bugzilla.suse.com/show_bug.cgi?id=1214340 * https://bugzilla.suse.com/show_bug.cgi?id=1214387 * https://bugzilla.suse.com/show_bug.cgi?id=1216085 * https://bugzilla.suse.com/show_bug.cgi?id=1217204 * https://bugzilla.suse.com/show_bug.cgi?id=1217874 * https://bugzilla.suse.com/show_bug.cgi?id=1218764 * https://bugzilla.suse.com/show_bug.cgi?id=1218805 * https://bugzilla.suse.com/show_bug.cgi?id=1218931 * https://bugzilla.suse.com/show_bug.cgi?id=1218957 * https://bugzilla.suse.com/show_bug.cgi?id=1219061 * https://bugzilla.suse.com/show_bug.cgi?id=1219233 * https://bugzilla.suse.com/show_bug.cgi?id=1219634 * https://bugzilla.suse.com/show_bug.cgi?id=1219875 * https://bugzilla.suse.com/show_bug.cgi?id=1220001 * https://bugzilla.suse.com/show_bug.cgi?id=1220101 * https://bugzilla.suse.com/show_bug.cgi?id=1220169 * https://bugzilla.suse.com/show_bug.cgi?id=1220194 * https://bugzilla.suse.com/show_bug.cgi?id=1220221 * https://bugzilla.suse.com/show_bug.cgi?id=1220376 * https://bugzilla.suse.com/show_bug.cgi?id=1220705 * https://bugzilla.suse.com/show_bug.cgi?id=1220726 * https://bugzilla.suse.com/show_bug.cgi?id=1220903 * https://bugzilla.suse.com/show_bug.cgi?id=1220980 * https://bugzilla.suse.com/show_bug.cgi?id=1221111 * https://bugzilla.suse.com/show_bug.cgi?id=1221182 * https://bugzilla.suse.com/show_bug.cgi?id=1221279 * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1221571 * https://bugzilla.suse.com/show_bug.cgi?id=1221784 * https://bugzilla.suse.com/show_bug.cgi?id=1221922 * https://bugzilla.suse.com/show_bug.cgi?id=1222110 * https://bugzilla.suse.com/show_bug.cgi?id=1222347 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:24 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:24 -0000 Subject: SUSE-RU-2024:1531-1: moderate: Recommended update for golang-github-prometheus-alertmanager, golang-github-prometheus-node_exporter Message-ID: <171499862479.9288.863092971019157750@smelt2.prg2.suse.org> # Recommended update for golang-github-prometheus-alertmanager, golang-github- prometheus-node_exporter Announcement ID: SUSE-RU-2024:1531-1 Rating: moderate References: * jsc#MSQA-760 * jsc#PED-7893 * jsc#PED-7928 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools Beta for SLE 15 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that contains three features can now be installed. ## Description: This update for golang-github-prometheus-alertmanager, golang-github-prometheus- node_exporter fixes the following issues: * update to 1.7.0 (jsc#PED-7893, jsc#PED-7928): * [FEATURE] Add ZFS freebsd per dataset stats #2753 * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721 * [ENHANCEMENT] Parallelize stat calls in Linux filesystem collector #1772 * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711 * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric #2778 * [ENHANCEMENT] Improve qdisc collector performance #2779 * [ENHANCEMENT] Add include and exclude filter for hwmon collector #2699 * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead of procfs #2777 * [BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754 * [BUGFIX] Fallback to 32-bit stats in netdev #2757 * [BUGFIX] Close btrfs.FS handle after use #2780 * [BUGFIX] Move RO status before error return #2807 * [BUFFIX] Fix promhttp_metric_handler_errors_total being always active #2808 * [BUGFIX] Fix nfsd v4 index miss #2824 * update to 1.6.1: (no source code changes in this release) * BuildRequire go1.20 * update to 1.6.0: * [CHANGE] Fix cpustat when some cpus are offline #2318 * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605 * [CHANGE] Deprecate ntp collector #2603 * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583 * [CHANGE] Deprecate supervisord collector #2685 * [FEATURE] Enable uname collector on NetBSD #2559 * [FEATURE] NetBSD support for the meminfo collector #2570 * [FEATURE] NetBSD support for CPU collector #2626 * [FEATURE] Add FreeBSD collector for netisr subsystem #2668 * [FEATURE] Add softirqs collector #2669 * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449 * [ENHANCEMENT] Add administrative state of Linux network interfaces #2515 * [ENHANCEMENT] Log current value of GOMAXPROCS #2537 * [ENHANCEMENT] Add profiler options for perf collector #2542 * [ENHANCEMENT] Allow root path as metrics path #2590 * [ENHANCEMENT] Add cpu frequency governor metrics #2569 * [ENHANCEMENT] Add new landing page #2622 * [ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634 * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687 * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats #2612 * [ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669 * [BUGFIX] perf: fixes for automatically detecting the correct tracefs mountpoints #2553 * [BUGFIX] Fix `thermal_zone` collector noise @2554 * [BUGFIX] Fix a problem fetching the user wire count on FreeBSD 2584 * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631 * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605 * [BUGFIX] Fix OpenBSD filesystem collector string parsing #2637 * [BUGFIX] Fix bad reporting of `node_cpu_seconds_total` in OpenBSD #2663 * change go_modules archive in _service to use obscpio file ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1531=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1531=1 * SUSE Manager Client Tools Beta for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-BETA-2024-1531=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1531=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1531=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1531=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1531=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1531=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1531=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1531=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1531=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1531=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1531=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1531=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1531=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1531=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1531=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1531=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1531=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1531=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1531=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1531=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * SUSE Manager Client Tools Beta for SLE 15 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-alertmanager-0.26.0-150100.4.22.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Manager Proxy 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-150100.3.29.1 ## References: * https://jira.suse.com/browse/MSQA-760 * https://jira.suse.com/browse/PED-7893 * https://jira.suse.com/browse/PED-7928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:33 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:33 -0000 Subject: SUSE-RU-2024:1528-1: moderate: Recommended update for salt Message-ID: <171499863300.9288.26761315759767660@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2024:1528-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * jsc#MSQA-760 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has five fixes can now be installed. ## Description: This update for salt fixes the following issues: * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Provide user(salt)/group(salt) capabilities for RPM 4.19 * Extend dependencies for python3-salt-testsuiteand python3-salt packages * Improve Salt and testsuite packages multibuild * Enable multibuilld and create test flavor * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1528=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1528=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1528=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1528=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1528=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1528=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1528=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1528=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1528=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1528=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1528=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1528=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1528=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1528=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1528=1 ## Package List: * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Manager Server 4.3 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-salt-testsuite-3006.0-150400.8.57.1 * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * openSUSE Leap 15.4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * salt-minion-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-transactional-update-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * SUSE Manager Proxy 4.3 (x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Manager Proxy 4.3 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * salt-minion-3006.0-150400.8.57.2 * salt-master-3006.0-150400.8.57.2 * salt-syndic-3006.0-150400.8.57.2 * salt-ssh-3006.0-150400.8.57.2 * salt-cloud-3006.0-150400.8.57.2 * salt-api-3006.0-150400.8.57.2 * salt-proxy-3006.0-150400.8.57.2 * python3-salt-3006.0-150400.8.57.2 * salt-standalone-formulas-configuration-3006.0-150400.8.57.2 * salt-3006.0-150400.8.57.2 * salt-doc-3006.0-150400.8.57.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * salt-zsh-completion-3006.0-150400.8.57.2 * salt-bash-completion-3006.0-150400.8.57.2 * salt-fish-completion-3006.0-150400.8.57.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:41 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:41 -0000 Subject: SUSE-SU-2024:1525-1: important: Security update for SUSE Manager Salt Bundle Message-ID: <171499864117.9288.14023807594142910751@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2024:1525-1 Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2024-1525=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-1.36.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:43 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:43 -0000 Subject: SUSE-SU-2024:1522-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <171499864343.9288.15495582175957013148@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2024:1522-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for Debian 12 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-1522=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (amd64) * venv-salt-minion-3006.0-2.12.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:47 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:47 -0000 Subject: SUSE-SU-2024:1521-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <171499864760.9288.17608108556990640209@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2024:1521-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for Debian 11 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-1521=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (amd64) * venv-salt-minion-3006.0-2.50.4 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:50 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:50 -0000 Subject: SUSE-SU-202404:15258-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <171499865001.9288.16796080887125500140@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-202404:15258-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202404-15258=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * venv-salt-minion-3006.0-2.43.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:52 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:52 -0000 Subject: SUSE-SU-202404:15257-1: moderate: Security update for SUSE Manager Salt Bundle Message-ID: <171499865236.9288.17720167939384863294@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-202404:15257-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202404-15257=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * venv-salt-minion-3006.0-2.52.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:55 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:55 -0000 Subject: SUSE-SU-2024:1518-1: important: Security update for SUSE Manager Salt Bundle Message-ID: <171499865555.9288.3975899901304361090@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2024:1518-1 Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Bugs fixed: * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1518=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1518=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1518=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1518=1 ## Package List: * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.54.3 * SUSE Manager Client Tools for SLE Micro 5 (aarch64 s390x x86_64) * venv-salt-minion-3006.0-150000.3.54.3 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.54.3 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-150000.3.54.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:58 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:58 -0000 Subject: SUSE-SU-2024:1517-1: important: Security update for SUSE Manager Salt Bundle Message-ID: <171499865803.9288.4875989850155569008@smelt2.prg2.suse.org> # Security update for SUSE Manager Salt Bundle Announcement ID: SUSE-SU-2024:1517-1 Rating: important References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves two vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update fixes the following issues: venv-salt-minion: * Security issues fixed: * CVE-2024-22231: Prevent directory traversal when creating syndic cache directory on the master (bsc#1219430) * CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file method (bsc#1219431) * Bugs fixed: * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-1517=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * venv-salt-minion-3006.0-3.52.3 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:59 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:59 -0000 Subject: SUSE-RU-2024:1516-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <171499865909.9288.8497026583519150197@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1516-1 Rating: moderate References: * jsc#ECO-3319 * jsc#MSQA-760 Affected Products: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains two features can now be installed. ## Description: This update fixes the following issues: scap-security-guide: * Updated to 0.1.71 (jsc#ECO-3319) * Add RHEL 9 STIG * Add support for Debian 12 * Update PCI-DSS profile for RHEL * Include bugfixes and improvements for SLE spacecmd: * Version 4.3.27-0 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2024-1516=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch) * scap-security-guide-redhat-0.1.71-1.18.1 * spacecmd-4.3.27-1.30.1 ## References: * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:30:59 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:30:59 -0000 Subject: SUSE-RU-2024:1513-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <171499865992.9288.9594819633249989951@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1513-1 Rating: moderate References: * jsc#MSQA-760 Affected Products: * SUSE Manager Client Tools for Debian 12 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 4.3.27-0 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-x86_64-2024-1513=1 ## Package List: * SUSE Manager Client Tools for Debian 12 (all) * spacecmd-4.3.27-3.12.1 ## References: * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:01 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:01 -0000 Subject: SUSE-RU-202404:15255-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <171499866176.9288.8370125074594310265@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-202404:15255-1 Rating: moderate References: * jsc#ECO-3319 * jsc#MSQA-760 Affected Products: * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains two features can now be installed. ## Description: This update fixes the following issues: scap-security-guide: * Updated to 0.1.71 (jsc#ECO-3319) * Add RHEL 9 STIG * Add support for Debian 12 * Update PCI-DSS profile for RHEL * Include bugfixes and improvements for SLE spacecmd: * Version 4.3.27-0 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-202404-15255=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 22.04 2204 (all) * spacecmd-4.3.27-2.36.2 * scap-security-guide-ubuntu-0.1.71-2.20.2 ## References: * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:00 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:00 -0000 Subject: SUSE-RU-2024:1512-1: moderate: Recommended update for SUSE Manager Client Tools Message-ID: <171499866079.9288.974275179311317942@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1512-1 Rating: moderate References: * jsc#MSQA-760 Affected Products: * SUSE Manager Client Tools for Debian 11 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 4.3.27-0 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-x86_64-2024-1512=1 ## Package List: * SUSE Manager Client Tools for Debian 11 (all) * spacecmd-4.3.27-2.39.1 ## References: * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:04 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:04 -0000 Subject: SUSE-SU-202404:15254-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <171499866499.9288.4954662469867418461@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-202404:15254-1 Rating: moderate References: * bsc#1211649 * bsc#1211888 * bsc#1216850 * bsc#1218482 * bsc#1219001 * bsc#1219430 * bsc#1219431 * jsc#ECO-3319 * jsc#MSQA-760 Cross-References: * CVE-2024-22231 * CVE-2024-22232 CVSS scores: * CVE-2024-22231 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2024-22232 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that solves two vulnerabilities, contains two features and has five security fixes can now be installed. ## Description: This update fixes the following issues: salt: * Prevent directory traversal when creating syndic cache directory on the master (CVE-2024-22231, bsc#1219430) * Prevent directory traversal attacks in the master's serve_file method (CVE-2024-22232, bsc#1219431) * Convert oscap output to UTF-8 * Make Salt compatible with Python 3.11 * Ignore non-ascii chars in oscap output (bsc#1219001) * Fix detected issues in Salt tests when running on VMs * Make importing seco.range thread safe (bsc#1211649) * Fix problematic tests and allow smooth tests executions on containers * Discover Ansible playbook files as " _.yml " or "_.yaml" files (bsc#1211888) * Provide user(salt)/group(salt) capabilities for RPM 4.19 * Extend dependencies for python3-salt-testsuite and python3-salt packages * Improve Salt and testsuite packages multibuild * Enable multibuild and create test flavor * Additionally we require python-mock just for older Python versions. * Prevent exceptions with fileserver.update when called via state (bsc#1218482) * Improve pip target override condition with VENV_PIP_TARGET environment variable (bsc#1216850) * Fixed KeyError in logs when running a state that fails scap-security-guide: * Updated to 0.1.71 (jsc#ECO-3319) * Add RHEL 9 STIG * Add support for Debian 12 * Update PCI-DSS profile for RHEL * lots of bugfixes and improvements for SLE spacecmd: * Version 4.3.27-0 * Update translation strings ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-202404-15254=1 ## Package List: * SUSE Manager Client Tools for Ubuntu 20.04 2004 (all) * salt-common-3006.0+ds-1+2.122.2 * salt-minion-3006.0+ds-1+2.122.2 * scap-security-guide-ubuntu-0.1.71-2.41.2 * spacecmd-4.3.27-2.81.2 ## References: * https://www.suse.com/security/cve/CVE-2024-22231.html * https://www.suse.com/security/cve/CVE-2024-22232.html * https://bugzilla.suse.com/show_bug.cgi?id=1211649 * https://bugzilla.suse.com/show_bug.cgi?id=1211888 * https://bugzilla.suse.com/show_bug.cgi?id=1216850 * https://bugzilla.suse.com/show_bug.cgi?id=1218482 * https://bugzilla.suse.com/show_bug.cgi?id=1219001 * https://bugzilla.suse.com/show_bug.cgi?id=1219430 * https://bugzilla.suse.com/show_bug.cgi?id=1219431 * https://jira.suse.com/browse/ECO-3319 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:12 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:12 -0000 Subject: SUSE-SU-2024:1509-1: important: Security update for SUSE Manager Client Tools Message-ID: <171499867237.9288.14197759108322520592@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2024:1509-1 Rating: important References: * bsc#1008037 * bsc#1008038 * bsc#1010940 * bsc#1019021 * bsc#1038785 * bsc#1059235 * bsc#1099805 * bsc#1166389 * bsc#1171823 * bsc#1174145 * bsc#1174302 * bsc#1175993 * bsc#1177948 * bsc#1216854 * bsc#1219002 * bsc#1219912 * bsc#1221092 * bsc#1221465 * bsc#1222155 * jsc#MSQA-760 Cross-References: * CVE-2016-8614 * CVE-2016-8628 * CVE-2016-8647 * CVE-2016-9587 * CVE-2017-7550 * CVE-2018-10874 * CVE-2020-10744 * CVE-2020-14330 * CVE-2020-14332 * CVE-2020-14365 * CVE-2020-1753 * CVE-2023-5764 * CVE-2023-6152 * CVE-2024-0690 * CVE-2024-1313 CVSS scores: * CVE-2016-8614 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2016-8628 ( NVD ): 9.1 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2016-8647 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2016-8647 ( NVD ): 2.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2016-9587 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-7550 ( SUSE ): 8.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2017-7550 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-7550 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-10874 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2018-10874 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2020-10744 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L * CVE-2020-10744 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L * CVE-2020-14330 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2020-14330 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-14365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2020-14365 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2020-1753 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-5764 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2023-5764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-0690 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools for SLE 15 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves 15 vulnerabilities, contains one feature and has four security fixes can now be installed. ## Description: This update fixes the following issues: POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599: * Version 0.1.1710765237.46af599 * Moved image services to dracut-saltboot package * Use salt bundle * Version 0.1.1645440615.7f1328c * Removed deprecated kiwi functions POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599: * Version 0.1.1710765237.46af599 * Moved image services to dracut-saltboot package * Use salt bundle * Version 0.1.1645440615.7f1328c * Removed deprecated kiwi functions ansible received the following fixes: * Security issues fixed: * CVE-2023-5764: Address issues where internal templating can cause unsafe variables to lose their unsafe designation (bsc#1216854) * Breaking changes: assert - Nested templating may result in an inability for the conditional to be evaluated. See the porting guide for more information. * CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002) * CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993) * CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823) * CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that can lead to code execution (bsc#1099805) * Bugs fixed: * Don't Require python-coverage, it is needed only for testing (bsc#1177948) dracut-saltboot was updated to version 0.1.1710765237.46af599: * Version 0.1.1710765237.46af599 * Load only first available leaseinfo (bsc#1221092) * Version 0.1.1681904360.84ef141 grafana was updated to version 9.5.18: * Grafana now requires Go 1.20 * Security issues fixed: * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155) * CVE-2023-6152: Add email verification when updating user email (bsc#1219912) * Other non-security related changes: * Version 9.5.17: * [FEATURE] Alerting: Backport use Alertmanager API v2 * Version 9.5.16: * [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL * Version 9.5.15: * [FEATURE] Alerting: Attempt to retry retryable errors * Version 9.5.14: * [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error * [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied * [BUGFIX] LDAP: Fix enable users on successfull login * Version 9.5.13: * [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder * [BUGFIX] Licensing: Pass func to update env variables when starting plugin * Version 9.5.12: * [FEATURE] Azure: Add support for Workload Identity authentication * Version 9.5.9: * [FEATURE] SSE: Fix DSNode to not panic when response has empty response * [FEATURE] Prometheus: Handle the response with different field key order * [BUGFIX] LDAP: Fix user disabling mgr-daemon was updated to version 4.3.9-0: * Version 4.3.9-0 * Update translation strings spacecmd was updated to version 4.3.27-0: * Version 4.3.27-0 * Update translation strings spacewalk-client-tools was updated to version 4.3.19-0: * Version 4.3.19-0 * Update translation strings spacewalk-koan was updated to version version 4.3.6-0: * Version 4.3.6-0 * Change Docker image location for test uyuni-common-libs was updated to version 4.3.10-0: * Version 4.3.10-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) uyuni-proxy-systemd-services was updated to version 4.3.12-0: * Version 4.3.12-0 * Update to SUSE Manager 4.3.12 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1509=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1509=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2024-1509=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1509=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1509=1 ## Package List: * openSUSE Leap 15.5 (noarch) * POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 * ansible-2.9.27-150000.1.17.2 * ansible-test-2.9.27-150000.1.17.2 * ansible-doc-2.9.27-150000.1.17.2 * spacecmd-4.3.27-150000.3.116.2 * POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.14.0-150000.3.18.2 * SUSE Manager Client Tools for SLE 15 (noarch) * python3-spacewalk-koan-4.3.6-150000.3.33.2 * POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 * ansible-2.9.27-150000.1.17.2 * python3-spacewalk-client-setup-4.3.19-150000.3.89.2 * spacewalk-client-tools-4.3.19-150000.3.89.2 * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 * mgr-daemon-4.3.9-150000.1.47.2 * ansible-doc-2.9.27-150000.1.17.2 * spacewalk-koan-4.3.6-150000.3.33.2 * spacecmd-4.3.27-150000.3.116.2 * POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 * spacewalk-client-setup-4.3.19-150000.3.89.2 * python3-spacewalk-check-4.3.19-150000.3.89.2 * python3-spacewalk-client-tools-4.3.19-150000.3.89.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * spacewalk-check-4.3.19-150000.3.89.2 * SUSE Manager Client Tools for SLE 15 (aarch64 ppc64le s390x x86_64) * grafana-debuginfo-9.5.18-150000.1.63.2 * python3-uyuni-common-libs-4.3.10-150000.1.39.2 * grafana-9.5.18-150000.1.63.2 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 * dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.14.0-150000.3.18.2 * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * ansible-2.9.27-150000.1.17.2 * ansible-doc-2.9.27-150000.1.17.2 * uyuni-proxy-systemd-services-4.3.12-150000.1.21.2 ## References: * https://www.suse.com/security/cve/CVE-2016-8614.html * https://www.suse.com/security/cve/CVE-2016-8628.html * https://www.suse.com/security/cve/CVE-2016-8647.html * https://www.suse.com/security/cve/CVE-2016-9587.html * https://www.suse.com/security/cve/CVE-2017-7550.html * https://www.suse.com/security/cve/CVE-2018-10874.html * https://www.suse.com/security/cve/CVE-2020-10744.html * https://www.suse.com/security/cve/CVE-2020-14330.html * https://www.suse.com/security/cve/CVE-2020-14332.html * https://www.suse.com/security/cve/CVE-2020-14365.html * https://www.suse.com/security/cve/CVE-2020-1753.html * https://www.suse.com/security/cve/CVE-2023-5764.html * https://www.suse.com/security/cve/CVE-2023-6152.html * https://www.suse.com/security/cve/CVE-2024-0690.html * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1008037 * https://bugzilla.suse.com/show_bug.cgi?id=1008038 * https://bugzilla.suse.com/show_bug.cgi?id=1010940 * https://bugzilla.suse.com/show_bug.cgi?id=1019021 * https://bugzilla.suse.com/show_bug.cgi?id=1038785 * https://bugzilla.suse.com/show_bug.cgi?id=1059235 * https://bugzilla.suse.com/show_bug.cgi?id=1099805 * https://bugzilla.suse.com/show_bug.cgi?id=1166389 * https://bugzilla.suse.com/show_bug.cgi?id=1171823 * https://bugzilla.suse.com/show_bug.cgi?id=1174145 * https://bugzilla.suse.com/show_bug.cgi?id=1174302 * https://bugzilla.suse.com/show_bug.cgi?id=1175993 * https://bugzilla.suse.com/show_bug.cgi?id=1177948 * https://bugzilla.suse.com/show_bug.cgi?id=1216854 * https://bugzilla.suse.com/show_bug.cgi?id=1219002 * https://bugzilla.suse.com/show_bug.cgi?id=1219912 * https://bugzilla.suse.com/show_bug.cgi?id=1221092 * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:15 -0000 Subject: SUSE-SU-2024:1508-1: moderate: Security update for SUSE Manager Client Tools Message-ID: <171499867586.9288.16604046277364155858@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2024:1508-1 Rating: moderate References: * bsc#1219912 * bsc#1221465 * bsc#1222155 * jsc#MSQA-760 * jsc#PED-7893 * jsc#PED-7928 Cross-References: * CVE-2023-6152 * CVE-2024-1313 CVSS scores: * CVE-2023-6152 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools for SLE 12 An update that solves two vulnerabilities, contains three features and has one security fix can now be installed. ## Description: This update fixes the following issues: golang-github-prometheus-node_exporter: * Update to 1.7.0 (jsc#PED-7893, jsc#PED-7928): * [FEATURE] Add ZFS freebsd per dataset stats #2753 * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721 * [ENHANCEMENT] Parallelize stat calls in Linux filesystem collector #1772 * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711 * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric #2778 * [ENHANCEMENT] Improve qdisc collector performance #2779 * [ENHANCEMENT] Add include and exclude filter for hwmon collector #2699 * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead of procfs #2777 * [BUFFIX] Fix ZFS arcstats on FreeBSD 14.0+ 2754 * [BUGFIX] Fallback to 32-bit stats in netdev #2757 * [BUGFIX] Close btrfs.FS handle after use #2780 * [BUGFIX] Move RO status before error return #2807 * [BUFFIX] Fix promhttp_metric_handler_errors_total being always active #2808 * [BUGFIX] Fix nfsd v4 index miss #2824 * Update to 1.6.1: (no source code changes in this release) * BuildRequire go1.20 * Update to 1.6.0: * [CHANGE] Fix cpustat when some cpus are offline #2318 * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605 * [CHANGE] Deprecate ntp collector #2603 * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583 * [CHANGE] Deprecate supervisord collector #2685 * [FEATURE] Enable uname collector on NetBSD #2559 * [FEATURE] NetBSD support for the meminfo collector #2570 * [FEATURE] NetBSD support for CPU collector #2626 * [FEATURE] Add FreeBSD collector for netisr subsystem #2668 * [FEATURE] Add softirqs collector #2669 * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449 * [ENHANCEMENT] Add administrative state of Linux network interfaces #2515 * [ENHANCEMENT] Log current value of GOMAXPROCS #2537 * [ENHANCEMENT] Add profiler options for perf collector #2542 * [ENHANCEMENT] Allow root path as metrics path #2590 * [ENHANCEMENT] Add cpu frequency governor metrics #2569 * [ENHANCEMENT] Add new landing page #2622 * [ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634 * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687 * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats #2612 * [ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669 * [BUGFIX] perf: fixes for automatically detecting the correct tracefs mountpoints #2553 * [BUGFIX] Fix `thermal_zone` collector noise @2554 * [BUGFIX] Fix a problem fetching the user wire count on FreeBSD 2584 * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631 * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605 * [BUGFIX] Fix OpenBSD filesystem collector string parsing #2637 * [BUGFIX] Fix bad reporting of `node_cpu_seconds_total` in OpenBSD #2663 * Change go_modules archive in _service to use obscpio file grafana: * Packaging improvements: * Changed deprecated `disabled` service mode to `manual` * Drop golang-packaging macros * Drop explicit mod=vendor as it is enabled automatically * Update to version 9.5.18: * [SECURITY] CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155) * Update to version 9.5.17: * [FEATURE] Alerting: Backport use Alertmanager API v2 * Require Go 1.20 * Update to version 9.5.16: * [SECURITY] CVE-2023-6152: Add email verification when updating user email (bsc#1219912) * [BUGFIX] Annotations: Split cleanup into separate queries and deletes to avoid deadlocks on MySQL * Update to version 9.5.15: * [FEATURE] Alerting: Attempt to retry retryable errors * Update to version 9.5.14: * [BUGFIX] Alerting: Fix state manager to not keep datasource_uid and ref_id labels in state after Error * [BUGFIX] Transformations: Config overrides being lost when config from query transform is applied * [BUGFIX] LDAP: Fix enable users on successfull login * Update to version 9.5.13: * [BUGFIX] BrowseDashboards: Only remember the most recent expanded folder * [BUGFIX] Licensing: Pass func to update env variables when starting plugin * Update to version 9.5.12: * [FEATURE] Azure: Add support for Workload Identity authentication * Update to version 9.5.9: * [FEATURE] SSE: Fix DSNode to not panic when response has empty response * [FEATURE] Prometheus: Handle the response with different field key order * [BUGFIX] LDAP: Fix user disabling mgr-daemon: * Version 4.3.9-0 * Update translation strings spacecmd: * Version 4.3.27-0 * Update translation strings spacewalk-client-tools: * Version 4.3.19-0 * Update translation strings spacewalk-koan: * Version 4.3.6-0 * Change Docker image location for test uyuni-common-libs: * Version 4.3.10-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-1508=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1508=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1508=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1508=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-promu-0.14.0-1.18.1 * golang-github-prometheus-alertmanager-0.26.0-1.27.2 * golang-github-prometheus-node_exporter-1.7.0-1.30.2 * python2-uyuni-common-libs-4.3.10-1.39.1 * grafana-9.5.18-1.63.1 * SUSE Manager Client Tools for SLE 12 (noarch) * spacewalk-client-setup-4.3.19-52.98.1 * spacecmd-4.3.27-38.139.1 * python2-spacewalk-client-tools-4.3.19-52.98.1 * spacewalk-client-tools-4.3.19-52.98.1 * python2-spacewalk-check-4.3.19-52.98.1 * spacewalk-koan-4.3.6-24.36.1 * spacewalk-check-4.3.19-52.98.1 * mgr-daemon-4.3.9-1.47.1 * python2-spacewalk-koan-4.3.6-24.36.1 * python2-spacewalk-client-setup-4.3.19-52.98.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64) * golang-github-prometheus-node_exporter-1.7.0-1.30.2 * SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-1.30.2 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * golang-github-prometheus-node_exporter-1.7.0-1.30.2 ## References: * https://www.suse.com/security/cve/CVE-2023-6152.html * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1219912 * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://jira.suse.com/browse/MSQA-760 * https://jira.suse.com/browse/PED-7893 * https://jira.suse.com/browse/PED-7928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 12:31:23 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 12:31:23 -0000 Subject: SUSE-SU-2024:1507-1: moderate: Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Message-ID: <171499868321.9288.2081557550300593274@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Announcement ID: SUSE-SU-2024:1507-1 Rating: moderate References: * bsc#1170848 * bsc#1208572 * bsc#1214340 * bsc#1214387 * bsc#1216085 * bsc#1217204 * bsc#1217874 * bsc#1218764 * bsc#1218805 * bsc#1218931 * bsc#1218957 * bsc#1219061 * bsc#1219233 * bsc#1219634 * bsc#1219875 * bsc#1220101 * bsc#1220169 * bsc#1220194 * bsc#1220221 * bsc#1220376 * bsc#1220705 * bsc#1220726 * bsc#1220903 * bsc#1220980 * bsc#1221111 * bsc#1221182 * bsc#1221279 * bsc#1221465 * bsc#1221571 * bsc#1221784 * bsc#1221922 * bsc#1222110 * bsc#1222347 * jsc#MSQA-760 Cross-References: * CVE-2023-51775 CVSS scores: * CVE-2023-51775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability, contains one feature and has 32 security fixes can now be installed. ## Recommended update for SUSE Manager Proxy and Retail Branch Server 4.3 ### Description: This update fixes the following issues: mgr-daemon: * Version 4.3.9-0 * Update translation strings spacecmd: * Version 4.3.27-0 * Update translation strings spacewalk-backend: * Version 4.3.28-0 * Strip whitespace from .deb package metadata (bsc#1214387) * Fix inserting NULL into some columns during ISSv1 sync (bsc#1220980) * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) * Unquote HTML-encoded credentials before synchronizing repositories (bsc#1217204) spacewalk-certs-tools: * Version 4.3.23-0 * Fix liberty bootstrapping when zypper is installed (bsc#1222347) * Apply reboot method changes for transactional systems in the bootstrap script spacewalk-client-tools: * Version 4.3.19-0 * Update translation strings spacewalk-web: * Version 4.3.38-0 * Upgrade json5 to 2.2.3 * Upgrade semver to 7.6.0 * Add one-shot action execution to recurring custom state create/edit * Add two filters for rpmlint in package spacewalk-web: explicit-lib- dependency and filename-too-long-for-joliet * Fix virtual systems filters (bsc#1208572) * Improve CLM Create New Filter button * Bump the WebUI version to 4.3.12 uyuni-common-libs: * Version 4.3.10-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) uyuni-proxy-systemd-services: * Version 4.3.12-0 * Update to SUSE Manager 4.3.12 * Version 4.3.11-1 * Update the image version How to apply this update: 1. Log in as root user to the SUSE Manager Proxy or Retail Branch Server. 2. Stop the proxy service: `spacewalk-proxy stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-proxy start` ## Security update for SUSE Manager Server 4.3 ### Description: This update fixes the following issues: cobbler: * Provide option to use pre-built GRUB bootloader * Prevent parallel executions of cobbler sync actions (bsc#1218764) image-sync-formula: * Update to version 0.1.1711646883.4a44375 * Add missing URL tag * Update license to SPDX syntax inter-server-sync: * Version 0.3.3-1 * Correct primary key export for table suseproductsccrepository (bsc#1220169) jose4j: * CVE-2023-51775: Fix denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value (bsc#1220726) smdba: * Version 1.7.13 * postmaster no longer exists from >=16 and it's an alias for postgresql, using postgresql command spacecmd: * Version 4.3.27-0 * Update translation strings spacewalk-backend: * Version 4.3.28-0 * Strip whitespace from .deb package metadata (bsc#1214387) * Fix inserting NULL into some columns during ISSv1 sync (bsc#1220980) * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) * Unquote HTML-encoded credentials before synchronizing repositories (bsc#1217204) spacewalk-certs-tools: * Version 4.3.23-0 * Fix liberty bootstrapping when zypper is installed (bsc#1222347) * Apply reboot method changes for transactional systems in the bootstrap script spacewalk-client-tools: * Version 4.3.19-0 * Update translation strings spacewalk-config: * Version 4.3.13-0 * Be explicit about default Apache configs being overwritten on updates and point to making custom configs. (bsc#1219061) spacewalk-java: * Version 4.3.73-0 * New API endpoint for getRelevantErrata. It takes multiple servers as argument and it returns an array of maps representing the errata that can be applied to each system * Version 4.3.72-0 * Use execution module call to detect client instance flavor (PAYG/BYOS) in public cloud (bsc#1218805) * Update help text for the custom repo filter field (bsc#1217874) * Fix issue where Salt cannot access autoinstallation files (bsc#1220221) * Fix issue when checking for credential duplication (bsc#1218957) * Fix matching epoch while creating Ubuntu erratas * When an action that belongs to an action chain is unscheduled, unschedule the action chain as well (bsc#1221784) * Reschedule failed SSH actions caused by a connection error due to a scheduled reboot * Fix removal of old IPv6 addresses (bsc#1214340) * Do not automatically add child channels outside of selected base channel (bsc#1220101) * Fix listProxies API call (bsc#1219233) * Fix system.provisionSystem when called via HTTP API (bsc#1219875) * Remove package sync not available message in Software > Packages > Profile since it is no longer available for supported clients (bsc#1221279) * Fix login for read-only users when using HTTP API (bsc#1221111) * Add one-shot action execution to recurring custom state create/edit * Fix a typo in 'Deploy Files' page * Drop system password as identifier on SCC system registration (bsc#1219634, bsc#1221182) * Fix memory size extraction in virtual instances (bsc#1219634) * Fix virtual systems filters (bsc#1208572) * Update license to include the year 2024 * Add timeout for SMTP server connection (bsc#1218931) * Commit Salt event removal in case of process failure (bsc#1218931) * Users with API read only are only allowed to make GET requests * Ignore retry suffix when getting recurring action id from schedule name * Sort CLM project filters by filter name spacewalk-web: * Version 4.3.38-0 * Upgrade json5 to 2.2.3 * Upgrade semver to 7.6.0 * Add one-shot action execution to recurring custom state create/edit * Fix virtual systems filters (bsc#1208572) * Improve CLM Create New Filter button * Bump the WebUI version to 4.3.12 subscription-matcher: * Version 0.37 * add missing part number (bsc#1221922) * Fix penalties logging by initializing the score director consistently * Removed wrong apache-commons-lang dependency * Version 0.36 * Fixed Log4j 2 initialization supportutils-plugin-susemanager: * Version 4.3.11-0 * Add Salt and Reposync connections to minimum required DB connections calculation susemanager: * Version 4.3.35-0 * Add bootstrap repository definition for openSUSE Leap 15.6 * Add bootstrap repository definition for SUSE Linux Enterprise 15 SP6 susemanager-docs_en: * Removed Debian 10 from the list of supported clients * Added new workflow describing updating of clients using recurring actions to Commown Workflows * Added documentation on adding a storage device for VMWare * Documented registercloudguest tools for registering public cloud installation (BYOS) by adding a reference to the Public Cloud Guide * Added information about requirements for the PostgreSQL database to the Installation and Upgrade Guide (bsc#1220376) * Fixed the instructions for SSL Certificates (bsc#1219061) * Remove package sync paragraph in package-management doc since it is not available for Salt clients and traditional clients are no longer supported (bsc#1221279) * Fixed incorrect reference to SUSE Linux Enterprise Server 15 SP5 as base product for SUSE Manager 4.3, even in public cloud * Updated VM based installation for 4.3 VM image with ignition or cloudinit in Installation and Upgrade Guide * Added reference from Hub documentation to Inter-Server Synchronization in Large Deployment Guide * Documented Virtualization Guest and Virtualization Host Formula * Reformatted Supported Clients tables in Client Configuration Guide and Installation and Upgrade Guide * Add documentation about SMTP timeout configuration * Documented SSH key rotation in Salt Guide (bsc#1170848) * Documented liberate formula in Salt Guide * Fixed Prepare on-demand images section in Client Configuration * Fixed a changed configuration parameter for salt-ssh * Added Pay-as-you-go on the Cloud: FAQ document * Updated max-connections tuning recommendation in Large Deployment * Added troubleshooting instructions for setting up in public cloud (BYOS) to Administration Guide * Added section about migrating Enterprise Linux (EL) clients to SUSE Liberty Linux to Client Configuration Guide * Added detailed information about the messages produced by subscription matcher * Added Pay-as-you-go as supported service on Azure to the Public Cloud Guide * Added and fixed configuration details in Troubleshooting Renaming Server in Administration Guide susemanager-schema: * Version 4.3.25-0 * Add update-salt to internal state table susemanager-sls: * Version 4.3.41-0 * Use execution module call to detect client instance flavor (PAYG/BYOS) in public cloud (bsc#1218805) * Do not log dnf needs-restarting output in Salt's log (bsc#1220194) * Dynamically load an SELinux policy for "Push via SSH tunnel" for SELinux enabled clients. This policy allows communication over a custom SSH port * Fix reboot needed detection for SUSE systems * Fix SUSE Liberty Linux bootstrapping when Zypper is installed (bsc#1222347) * Distinguish between different SUSE versions when detecting if a reboot is needed (bsc#1220903, bsc#1221571) * Improve updatestack update in uptodate state * Add a standalone update-salt state * Add pillar check to skip reboot_if_needed state * Recognize .tar.xz and .ext4 image files (bsc#1216085) * Avoid issues on reactivating traditional clients as Salt managed * Fix the case of missing requisites on bootstrap (bsc#1220705) susemanager-sync-data: * Version 4.3.17-0 * AlmaLinux 9 PowerTools was renamed into CRB (bsc#1222110) uyuni-common-libs: * Version 4.3.10-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) uyuni-reportdb-schema: * Version 4.3.10-0 * Provide reportdb upgrade schema path structure How to apply this update: 1. Log in as root user to the SUSE Manager Server. 2. Stop the Spacewalk service: `spacewalk-service stop` 3. Apply the patch using either zypper patch or YaST Online Update. 4. Start the Spacewalk service: `spacewalk-service start` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1507=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1507=1 ## Package List: * SUSE Manager Proxy 4.3 Module 4.3 (noarch) * spacewalk-base-minimal-4.3.38-150400.3.42.6 * python3-spacewalk-certs-tools-4.3.23-150400.3.28.5 * python3-spacewalk-client-setup-4.3.19-150400.3.27.5 * python3-spacewalk-client-tools-4.3.19-150400.3.27.5 * mgr-daemon-4.3.9-150400.3.15.5 * spacewalk-backend-4.3.28-150400.3.41.7 * spacecmd-4.3.27-150400.3.36.5 * spacewalk-certs-tools-4.3.23-150400.3.28.5 * spacewalk-client-setup-4.3.19-150400.3.27.5 * spacewalk-client-tools-4.3.19-150400.3.27.5 * python3-spacewalk-check-4.3.19-150400.3.27.5 * spacewalk-check-4.3.19-150400.3.27.5 * spacewalk-base-minimal-config-4.3.38-150400.3.42.6 * SUSE Manager Proxy 4.3 Module 4.3 (x86_64) * python3-uyuni-common-libs-4.3.10-150400.3.18.4 * SUSE Manager Server 4.3 Module 4.3 (noarch) * spacewalk-java-lib-4.3.73-150400.3.79.1 * susemanager-docs_en-4.3-150400.9.56.4 * spacewalk-backend-package-push-server-4.3.28-150400.3.41.7 * spacewalk-backend-4.3.28-150400.3.41.7 * spacewalk-java-4.3.73-150400.3.79.1 * spacewalk-backend-iss-export-4.3.28-150400.3.41.7 * spacewalk-backend-xmlrpc-4.3.28-150400.3.41.7 * spacewalk-base-4.3.38-150400.3.42.6 * spacewalk-taskomatic-4.3.73-150400.3.79.1 * spacewalk-backend-sql-4.3.28-150400.3.41.7 * spacewalk-backend-sql-postgresql-4.3.28-150400.3.41.7 * python3-spacewalk-certs-tools-4.3.23-150400.3.28.5 * python3-spacewalk-client-tools-4.3.19-150400.3.27.5 * susemanager-docs_en-pdf-4.3-150400.9.56.4 * jose4j-0.5.1-150400.3.9.4 * spacewalk-backend-config-files-tool-4.3.28-150400.3.41.7 * spacecmd-4.3.27-150400.3.36.5 * spacewalk-certs-tools-4.3.23-150400.3.28.5 * susemanager-schema-4.3.25-150400.3.39.5 * spacewalk-backend-config-files-common-4.3.28-150400.3.41.7 * supportutils-plugin-susemanager-4.3.11-150400.3.21.4 * spacewalk-java-config-4.3.73-150400.3.79.1 * image-sync-formula-0.1.1711646883.4a44375-150400.3.18.4 * spacewalk-base-minimal-config-4.3.38-150400.3.42.6 * spacewalk-java-postgresql-4.3.73-150400.3.79.1 * subscription-matcher-0.37-150400.3.22.4 * susemanager-schema-utility-4.3.25-150400.3.39.5 * uyuni-reportdb-schema-4.3.10-150400.3.15.6 * spacewalk-backend-xml-export-libs-4.3.28-150400.3.41.7 * spacewalk-backend-iss-4.3.28-150400.3.41.7 * susemanager-sync-data-4.3.17-150400.3.25.4 * cobbler-3.3.3-150400.5.42.5 * spacewalk-backend-config-files-4.3.28-150400.3.41.7 * spacewalk-backend-applet-4.3.28-150400.3.41.7 * spacewalk-base-minimal-4.3.38-150400.3.42.6 * spacewalk-backend-app-4.3.28-150400.3.41.7 * uyuni-config-modules-4.3.41-150400.3.47.6 * susemanager-sls-4.3.41-150400.3.47.6 * spacewalk-html-4.3.38-150400.3.42.6 * spacewalk-client-tools-4.3.19-150400.3.27.5 * spacewalk-backend-tools-4.3.28-150400.3.41.7 * spacewalk-backend-server-4.3.28-150400.3.41.7 * spacewalk-config-4.3.13-150400.3.15.5 * SUSE Manager Server 4.3 Module 4.3 (ppc64le s390x x86_64) * smdba-1.7.13-0.150400.4.12.4 * susemanager-4.3.35-150400.3.48.6 * inter-server-sync-debuginfo-0.3.3-150400.3.30.4 * inter-server-sync-0.3.3-150400.3.30.4 * susemanager-tools-4.3.35-150400.3.48.6 * python3-uyuni-common-libs-4.3.10-150400.3.18.4 ## References: * https://www.suse.com/security/cve/CVE-2023-51775.html * https://bugzilla.suse.com/show_bug.cgi?id=1170848 * https://bugzilla.suse.com/show_bug.cgi?id=1208572 * https://bugzilla.suse.com/show_bug.cgi?id=1214340 * https://bugzilla.suse.com/show_bug.cgi?id=1214387 * https://bugzilla.suse.com/show_bug.cgi?id=1216085 * https://bugzilla.suse.com/show_bug.cgi?id=1217204 * https://bugzilla.suse.com/show_bug.cgi?id=1217874 * https://bugzilla.suse.com/show_bug.cgi?id=1218764 * https://bugzilla.suse.com/show_bug.cgi?id=1218805 * https://bugzilla.suse.com/show_bug.cgi?id=1218931 * https://bugzilla.suse.com/show_bug.cgi?id=1218957 * https://bugzilla.suse.com/show_bug.cgi?id=1219061 * https://bugzilla.suse.com/show_bug.cgi?id=1219233 * https://bugzilla.suse.com/show_bug.cgi?id=1219634 * https://bugzilla.suse.com/show_bug.cgi?id=1219875 * https://bugzilla.suse.com/show_bug.cgi?id=1220101 * https://bugzilla.suse.com/show_bug.cgi?id=1220169 * https://bugzilla.suse.com/show_bug.cgi?id=1220194 * https://bugzilla.suse.com/show_bug.cgi?id=1220221 * https://bugzilla.suse.com/show_bug.cgi?id=1220376 * https://bugzilla.suse.com/show_bug.cgi?id=1220705 * https://bugzilla.suse.com/show_bug.cgi?id=1220726 * https://bugzilla.suse.com/show_bug.cgi?id=1220903 * https://bugzilla.suse.com/show_bug.cgi?id=1220980 * https://bugzilla.suse.com/show_bug.cgi?id=1221111 * https://bugzilla.suse.com/show_bug.cgi?id=1221182 * https://bugzilla.suse.com/show_bug.cgi?id=1221279 * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1221571 * https://bugzilla.suse.com/show_bug.cgi?id=1221784 * https://bugzilla.suse.com/show_bug.cgi?id=1221922 * https://bugzilla.suse.com/show_bug.cgi?id=1222110 * https://bugzilla.suse.com/show_bug.cgi?id=1222347 * https://jira.suse.com/browse/MSQA-760 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 6 16:30:04 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 06 May 2024 16:30:04 -0000 Subject: SUSE-SU-2024:1151-2: moderate: Security update for curl Message-ID: <171501300440.3039.12935477945711998663@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2024:1151-2 Rating: moderate References: * bsc#1221665 * bsc#1221667 Cross-References: * CVE-2024-2004 * CVE-2024-2398 CVSS scores: * CVE-2024-2004 ( SUSE ): 3.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N * CVE-2024-2398 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665) * CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1151=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1151=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1151=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1151=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1151=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1151=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1151=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1151=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * SUSE Manager Proxy 4.3 (x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * curl-debuginfo-8.0.1-150400.5.44.1 * libcurl-devel-8.0.1-150400.5.44.1 * curl-debugsource-8.0.1-150400.5.44.1 * libcurl4-debuginfo-8.0.1-150400.5.44.1 * libcurl4-8.0.1-150400.5.44.1 * curl-8.0.1-150400.5.44.1 * SUSE Manager Server 4.3 (x86_64) * libcurl4-32bit-8.0.1-150400.5.44.1 * libcurl4-32bit-debuginfo-8.0.1-150400.5.44.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2004.html * https://www.suse.com/security/cve/CVE-2024-2398.html * https://bugzilla.suse.com/show_bug.cgi?id=1221665 * https://bugzilla.suse.com/show_bug.cgi?id=1221667 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 7 08:30:12 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 07 May 2024 08:30:12 -0000 Subject: SUSE-RU-2024:1538-1: moderate: Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed Message-ID: <171507061295.6146.29697195516457583@smelt2.prg2.suse.org> # Recommended update for kernel-firmware-nvidia-gspx-G06, nvidia-open- driver-G06-signed Announcement ID: SUSE-RU-2024:1538-1 Rating: moderate References: * bsc#1222972 * bsc#1223454 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has two fixes can now be installed. ## Description: This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues: Changes in kernel-firmware-nvidia-gspx-G06: * Update to 550.78 Changes in nvidia-open-driver-G06-signed: * Update to 550.78 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1538=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1538=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1538=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1538=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1538=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1538=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1538=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1538=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1538=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1538=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1538=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1538=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1538=1 ## Package List: * openSUSE Leap 15.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * openSUSE Leap 15.4 (x86_64) * nvidia-open-driver-G06-signed-azure-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-550.78_k5.14.21_150400.14.75-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-azure-550.78_k5.14.21_150400.14.75-150400.9.59.1 * openSUSE Leap 15.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * openSUSE Leap 15.4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-64kb-devel-550.78-150400.9.59.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-64kb-devel-550.78-150400.9.59.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-64kb-devel-550.78-150400.9.59.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-64kb-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-64kb-devel-550.78-150400.9.59.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Manager Proxy 4.3 (x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 * SUSE Manager Server 4.3 (nosrc x86_64) * kernel-firmware-nvidia-gspx-G06-550.78-150400.9.30.1 * SUSE Manager Server 4.3 (x86_64) * nvidia-open-driver-G06-signed-default-devel-550.78-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-kmp-default-550.78_k5.14.21_150400.24.116-150400.9.59.1 * nvidia-open-driver-G06-signed-debugsource-550.78-150400.9.59.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222972 * https://bugzilla.suse.com/show_bug.cgi?id=1223454 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 7 16:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 07 May 2024 16:30:05 -0000 Subject: SUSE-RU-2024:0425-2: moderate: Recommended update for python-argcomplete Message-ID: <171509940519.11798.4045192603448419329@smelt2.prg2.suse.org> # Recommended update for python-argcomplete Announcement ID: SUSE-RU-2024:0425-2 Rating: moderate References: * bsc#1219305 Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-argcomplete fixes the following issues: * Use update-alternatives for package binaries to avoid conflict with python311 stack (bsc#1219305) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-425=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-425=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-425=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-425=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-425=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-425=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-425=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-425=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-425=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-425=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-425=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-425=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-425=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-425=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-425=1 ## Package List: * SUSE Manager Server 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Manager Proxy 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1219305 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 7 16:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 07 May 2024 16:30:15 -0000 Subject: SUSE-RU-2024:1481-2: moderate: Recommended update for rmt-server Message-ID: <171509941575.11798.1608467450212846395@smelt2.prg2.suse.org> # Recommended update for rmt-server Announcement ID: SUSE-RU-2024:1481-2 Rating: moderate References: * bsc#1222122 * jsc#PED-3684 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for rmt-server fixes the following issues: * Support bzip2 compressed repositories (bsc#1222122) * Remove automatic backup generation for repodata within repository * Add support for Debian repositories using flat or nested structures (jsc#PED-3684) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1481=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1481=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1481=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1481=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1481=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1481=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1481=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1481=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1481=1 ## Package List: * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-pubcloud-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-debuginfo-2.16-150400.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Proxy 4.3 (x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rmt-server-debuginfo-2.16-150400.3.21.1 * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * rmt-server-debugsource-2.16-150400.3.21.1 * rmt-server-2.16-150400.3.21.1 * rmt-server-config-2.16-150400.3.21.1 * rmt-server-pubcloud-2.16-150400.3.21.1 * rmt-server-debuginfo-2.16-150400.3.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222122 * https://jira.suse.com/browse/PED-3684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 8 12:30:03 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 08 May 2024 12:30:03 -0000 Subject: SUSE-SU-2024:1557-1: moderate: Security update for rpm Message-ID: <171517140368.28521.8259400737947549647@smelt2.prg2.suse.org> # Security update for rpm Announcement ID: SUSE-SU-2024:1557-1 Rating: moderate References: * bsc#1189495 * bsc#1191175 * bsc#1218686 Cross-References: * CVE-2021-3521 CVSS scores: * CVE-2021-3521 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N * CVE-2021-3521 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for rpm fixes the following issues: Security fixes: \- CVE-2021-3521: Fixed missing subkey binding signature checking (bsc#1191175) Other fixes: * accept more signature subpackets marked as critical (bsc#1218686) * backport limit support for the autopatch macro (bsc#1189495) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1557=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1557=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1557=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1557=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1557=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1557=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1557=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1557=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1557=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1557=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1557=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1557=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1557=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1557=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1557=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1557=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1557=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1557=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1557=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1557=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1557=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * SUSE Manager Proxy 4.3 (x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-32bit-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-32bit-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Manager Server 4.3 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-imaevmsign-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * rpm-imaevmsign-debuginfo-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap 15.4 (x86_64) * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.16.1 * rpm-32bit-4.14.3-150400.59.16.1 * rpm-ndb-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap 15.4 (aarch64_ilp32) * rpm-64bit-4.14.3-150400.59.16.1 * rpm-64bit-debuginfo-4.14.3-150400.59.16.1 * rpm-ndb-64bit-4.14.3-150400.59.16.1 * rpm-ndb-64bit-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * openSUSE Leap 15.5 (x86_64) * rpm-ndb-32bit-debuginfo-4.14.3-150400.59.16.1 * rpm-32bit-4.14.3-150400.59.16.1 * rpm-ndb-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * Basesystem Module 15-SP5 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rpm-ndb-debugsource-4.14.3-150400.59.16.1 * rpm-ndb-debuginfo-4.14.3-150400.59.16.1 * rpm-ndb-4.14.3-150400.59.16.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * rpm-build-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rpm-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * rpm-32bit-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * rpm-4.14.3-150400.59.16.1 * rpm-debuginfo-4.14.3-150400.59.16.1 * python311-rpm-debuginfo-4.14.3-150400.59.16.1 * rpm-build-4.14.3-150400.59.16.1 * rpm-32bit-4.14.3-150400.59.16.1 * python311-rpm-4.14.3-150400.59.16.1 * rpm-devel-4.14.3-150400.59.16.1 * rpm-build-debuginfo-4.14.3-150400.59.16.1 * rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-4.14.3-150400.59.16.1 * rpm-32bit-debuginfo-4.14.3-150400.59.16.1 * python-rpm-debugsource-4.14.3-150400.59.16.1 * python3-rpm-debuginfo-4.14.3-150400.59.16.1 ## References: * https://www.suse.com/security/cve/CVE-2021-3521.html * https://bugzilla.suse.com/show_bug.cgi?id=1189495 * https://bugzilla.suse.com/show_bug.cgi?id=1191175 * https://bugzilla.suse.com/show_bug.cgi?id=1218686 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 9 12:30:21 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 09 May 2024 12:30:21 -0000 Subject: SUSE-RU-2024:1564-1: moderate: Recommended update for powerpc-utils Message-ID: <171525782199.13210.9664932762034637920@smelt2.prg2.suse.org> # Recommended update for powerpc-utils Announcement ID: SUSE-RU-2024:1564-1 Rating: moderate References: * bsc#1200731 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for powerpc-utils fixes the following issue: * Use separate hcn-init service for wicked and NM (bsc#1200731) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1564=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1564=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1564=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1564=1 ## Package List: * openSUSE Leap 15.4 (ppc64le) * powerpc-utils-debugsource-1.3.10-150400.19.18.2 * powerpc-utils-1.3.10-150400.19.18.2 * powerpc-utils-debuginfo-1.3.10-150400.19.18.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (ppc64le) * powerpc-utils-debugsource-1.3.10-150400.19.18.2 * powerpc-utils-1.3.10-150400.19.18.2 * powerpc-utils-debuginfo-1.3.10-150400.19.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le) * powerpc-utils-debugsource-1.3.10-150400.19.18.2 * powerpc-utils-1.3.10-150400.19.18.2 * powerpc-utils-debuginfo-1.3.10-150400.19.18.2 * SUSE Manager Server 4.3 (ppc64le) * powerpc-utils-debugsource-1.3.10-150400.19.18.2 * powerpc-utils-1.3.10-150400.19.18.2 * powerpc-utils-debuginfo-1.3.10-150400.19.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1200731 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 9 16:30:11 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 09 May 2024 16:30:11 -0000 Subject: SUSE-SU-2024:1578-1: important: Security update for sssd Message-ID: <171527221164.11958.12991984203840596263@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2024:1578-1 Rating: important References: * bsc#1223100 Cross-References: * CVE-2023-3758 CVSS scores: * CVE-2023-3758 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2023-3758: Fixed race condition during authorization that lead to GPO policies functioning inconsistently (bsc#1223100) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1578=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1578=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1578=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1578=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1578=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1578=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1578=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1578=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1578=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1578=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1578=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1578=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1578=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1578=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1578=1 ## Package List: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * SUSE Manager Proxy 4.3 (x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Manager Server 4.3 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libipa_hbac0-2.5.2-150400.4.27.1 * python3-ipa_hbac-debuginfo-2.5.2-150400.4.27.1 * python3-sss_nss_idmap-debuginfo-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * python3-ipa_hbac-2.5.2-150400.4.27.1 * libnfsidmap-sss-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * python3-sss-murmur-2.5.2-150400.4.27.1 * python3-sss-murmur-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * python3-sss_nss_idmap-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libnfsidmap-sss-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * openSUSE Leap 15.4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * openSUSE Leap 15.4 (aarch64_ilp32) * sssd-common-64bit-debuginfo-2.5.2-150400.4.27.1 * sssd-common-64bit-2.5.2-150400.4.27.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libipa_hbac0-2.5.2-150400.4.27.1 * sssd-dbus-debuginfo-2.5.2-150400.4.27.1 * sssd-krb5-common-debuginfo-2.5.2-150400.4.27.1 * sssd-tools-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap-devel-2.5.2-150400.4.27.1 * sssd-proxy-2.5.2-150400.4.27.1 * sssd-krb5-2.5.2-150400.4.27.1 * libsss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_idmap0-2.5.2-150400.4.27.1 * libsss_simpleifp0-2.5.2-150400.4.27.1 * sssd-tools-2.5.2-150400.4.27.1 * libsss_certmap-devel-2.5.2-150400.4.27.1 * sssd-ldap-debuginfo-2.5.2-150400.4.27.1 * sssd-ipa-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.27.1 * libsss_certmap0-2.5.2-150400.4.27.1 * sssd-kcm-2.5.2-150400.4.27.1 * libipa_hbac-devel-2.5.2-150400.4.27.1 * python3-sssd-config-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp-devel-2.5.2-150400.4.27.1 * libsss_certmap0-debuginfo-2.5.2-150400.4.27.1 * python3-sssd-config-2.5.2-150400.4.27.1 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.27.1 * libsss_nss_idmap0-2.5.2-150400.4.27.1 * sssd-krb5-debuginfo-2.5.2-150400.4.27.1 * sssd-ad-debuginfo-2.5.2-150400.4.27.1 * sssd-ldap-2.5.2-150400.4.27.1 * sssd-dbus-2.5.2-150400.4.27.1 * sssd-ipa-2.5.2-150400.4.27.1 * libsss_idmap-devel-2.5.2-150400.4.27.1 * sssd-krb5-common-2.5.2-150400.4.27.1 * sssd-proxy-debuginfo-2.5.2-150400.4.27.1 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.27.1 * sssd-2.5.2-150400.4.27.1 * sssd-common-debuginfo-2.5.2-150400.4.27.1 * sssd-common-2.5.2-150400.4.27.1 * sssd-debugsource-2.5.2-150400.4.27.1 * sssd-ad-2.5.2-150400.4.27.1 * sssd-kcm-debuginfo-2.5.2-150400.4.27.1 * libipa_hbac0-debuginfo-2.5.2-150400.4.27.1 * sssd-winbind-idmap-2.5.2-150400.4.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.27.1 * sssd-common-32bit-debuginfo-2.5.2-150400.4.27.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3758.html * https://bugzilla.suse.com/show_bug.cgi?id=1223100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 10 12:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 10 May 2024 12:30:05 -0000 Subject: SUSE-SU-2024:1598-1: important: Security update for less Message-ID: <171534420568.30359.8606573557482147906@smelt2.prg2.suse.org> # Security update for less Announcement ID: SUSE-SU-2024:1598-1 Rating: important References: * bsc#1222849 Cross-References: * CVE-2024-32487 CVSS scores: * CVE-2024-32487 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for less fixes the following issues: * CVE-2024-32487: Fixed mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1598=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1598=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1598=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1598=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1598=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1598=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1598=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1598=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1598=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1598=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1598=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1598=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1598=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1598=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1598=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1598=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1598=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1598=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * less-debuginfo-590-150400.3.9.1 * less-590-150400.3.9.1 * less-debugsource-590-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32487.html * https://bugzilla.suse.com/show_bug.cgi?id=1222849 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 10 16:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 10 May 2024 16:30:05 -0000 Subject: SUSE-RU-2024:1604-1: moderate: Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Message-ID: <171535860518.13521.8678658858577651530@smelt2.prg2.suse.org> # Maintenance update for SUSE Manager 4.3: Server, Proxy and Retail Branch Server Announcement ID: SUSE-RU-2024:1604-1 Rating: moderate References: * bsc#1224012 * jsc#MSQA-779 Affected Products: * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: spacewalk-java: * version 4.3.75-0 * Fix status icon of the systems overview list (bsc#1224012) * version 4.3.74-0 * Fix status icon and base channel of the virtual systems list (bsc#1224012) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1604=1 ## Package List: * SUSE Manager Server 4.3 Module 4.3 (noarch) * spacewalk-java-lib-4.3.75-150400.3.82.2 * spacewalk-java-postgresql-4.3.75-150400.3.82.2 * spacewalk-java-4.3.75-150400.3.82.2 * spacewalk-taskomatic-4.3.75-150400.3.82.2 * spacewalk-java-config-4.3.75-150400.3.82.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224012 * https://jira.suse.com/browse/MSQA-779 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 10 16:30:08 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 10 May 2024 16:30:08 -0000 Subject: SUSE-RU-2024:1603-1: important: Recommended update for salt Message-ID: <171535860876.13521.16169924834432969099@smelt2.prg2.suse.org> # Recommended update for salt Announcement ID: SUSE-RU-2024:1603-1 Rating: important References: * jsc#MSQA-779 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for salt fixes the following issues: * Make "man" a recommended package instead of required to fix installation issues with SLE Micro ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1603=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1603=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1603=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1603=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1603=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1603=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1603=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1603=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1603=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1603=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1603=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1603=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1603=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1603=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1603=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * salt-doc-3006.0-150400.8.60.1 * python3-salt-testsuite-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * openSUSE Leap 15.4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * salt-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-transactional-update-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Manager Proxy 4.3 (x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Manager Proxy 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * salt-doc-3006.0-150400.8.60.1 * salt-minion-3006.0-150400.8.60.1 * salt-master-3006.0-150400.8.60.1 * salt-syndic-3006.0-150400.8.60.1 * salt-proxy-3006.0-150400.8.60.1 * salt-api-3006.0-150400.8.60.1 * salt-ssh-3006.0-150400.8.60.1 * salt-3006.0-150400.8.60.1 * salt-cloud-3006.0-150400.8.60.1 * salt-standalone-formulas-configuration-3006.0-150400.8.60.1 * python3-salt-3006.0-150400.8.60.1 * SUSE Manager Server 4.3 (noarch) * salt-bash-completion-3006.0-150400.8.60.1 * salt-zsh-completion-3006.0-150400.8.60.1 * salt-fish-completion-3006.0-150400.8.60.1 ## References: * https://jira.suse.com/browse/MSQA-779 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 08:30:01 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 08:30:01 -0000 Subject: SUSE-RU-2024:1620-1: moderate: Recommended update for SUSE Manager Client Tools Beta Message-ID: <171558900171.7713.12032270255830075643@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Beta Announcement ID: SUSE-RU-2024:1620-1 Rating: moderate References: * jsc#MSQA-775 Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SAP Applications Module 15-SP2 * SAP Applications Module 15-SP3 * SAP Applications Module 15-SP4 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools Beta for SLE 15 * SUSE Manager Client Tools for SLE 15 An update that contains one feature can now be installed. ## Description: This update for SUSE Manager Client Tools Beta fixes the following issues: * Changed codestream origin of SUSE Manager Client Tools Beta (no source changes) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1620=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1620=1 * SUSE Manager Client Tools for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-2024-1620=1 * SUSE Manager Client Tools Beta for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-BETA-2024-1620=1 * SAP Applications Module 15-SP2 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP2-2024-1620=1 * SAP Applications Module 15-SP3 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP3-2024-1620=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2024-1620=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2024-1620=1 * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2024-1620=1 ## Package List: * openSUSE Leap 15.5 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * openSUSE Leap 15.6 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SUSE Manager Client Tools for SLE 15 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SUSE Manager Client Tools Beta for SLE 15 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SAP Applications Module 15-SP2 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SAP Applications Module 15-SP3 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SAP Applications Module 15-SP4 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SAP Applications Module 15-SP5 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 * SAP Applications Module 15-SP6 (noarch) * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-150000.1.13.1 * grafana-sap-providers-1.1-150000.1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-150000.1.13.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-150000.1.13.1 ## References: * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 08:30:03 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 08:30:03 -0000 Subject: SUSE-RU-202405:15262-1: moderate: Recommended update for SUSE Manager Client Tools Beta Message-ID: <171558900365.7713.12455972266206243536@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Beta Announcement ID: SUSE-RU-202405:15262-1 Rating: moderate References: * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 * SUSE Manager Client Tools for Ubuntu 22.04 2204 An update that contains one feature can now be installed. ## Description: This update for SUSE Manager Client Tools Beta fixes the following issues: * Changed codestream origin of SUSE Manager Client Tools Beta (no source changes): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 zypper in -t patch SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-1619=1 * SUSE Manager Client Tools for Ubuntu 22.04 2204 zypper in -t patch suse-ubu224ct-client-tools-beta-202405-15262=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 (amd64) * librpmsign9-4.17.0+dfsg1-4build1 * rpm-common-4.17.0+dfsg1-4build1 * libopenscap-perl-1.2.17-0.1ubuntu7~uyuni1 * python3-openscap-1.2.17-0.1ubuntu7~uyuni1 * libopenscap8-dbg-1.2.17-0.1ubuntu7~uyuni1 * libfsverity0-1.4-1~exp1build1 * librpmio9-4.17.0+dfsg1-4build1 * librpmbuild9-4.17.0+dfsg1-4build1 * libopenscap-dev-1.2.17-0.1ubuntu7~uyuni1 * librpm9-4.17.0+dfsg1-4build1 * libopenscap8-1.2.17-0.1ubuntu7~uyuni1 * python3-rpm-4.17.0+dfsg1-4build1 * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 (all) * scap-security-guide-ubuntu-0.1.71-2.22.1 * SUSE Manager Client Tools for Ubuntu 22.04 2204 (amd64) * librpmsign9-4.17.0+dfsg1-4build1 * rpm-common-4.17.0+dfsg1-4build1 * libopenscap-perl-1.2.17-0.1ubuntu7~uyuni1 * python3-openscap-1.2.17-0.1ubuntu7~uyuni1 * libopenscap8-dbg-1.2.17-0.1ubuntu7~uyuni1 * libfsverity0-1.4-1~exp1build1 * librpmio9-4.17.0+dfsg1-4build1 * librpmbuild9-4.17.0+dfsg1-4build1 * libopenscap-dev-1.2.17-0.1ubuntu7~uyuni1 * librpm9-4.17.0+dfsg1-4build1 * libopenscap8-1.2.17-0.1ubuntu7~uyuni1 * python3-rpm-4.17.0+dfsg1-4build1 * SUSE Manager Client Tools for Ubuntu 22.04 2204 (all) * scap-security-guide-ubuntu-0.1.71-2.22.1 ## References: * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 08:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 08:30:05 -0000 Subject: SUSE-RU-202405:15261-1: moderate: Recommended update for SUSE Manager Client Tools Beta Message-ID: <171558900563.7713.4615399973361722123@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Beta Announcement ID: SUSE-RU-202405:15261-1 Rating: moderate References: * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 * SUSE Manager Client Tools for Ubuntu 20.04 2004 An update that contains one feature can now be installed. ## Description: This update for SUSE Manager Client Tools Beta fixes the following issues: * Changed codestream origin of SUSE Manager Client Tools Beta (no source changes): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 zypper in -t patch SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-1618=1 * SUSE Manager Client Tools for Ubuntu 20.04 2004 zypper in -t patch suse-ubu204ct-client-tools-beta-202405-15261=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (amd64) * libzmq5-4.3.2-2ubuntu1 * python3-zmq-18.1.1-3 * libopenscap8-1.2.16-1build1~uyuni1 * librpmbuild8-4.14.2.1+dfsg1-1build2 * python-openscap-1.2.16-1build1~uyuni1 * librpmsign8-4.14.2.1+dfsg1-1build2 * python3-rpm-4.14.2.1+dfsg1-1build2 * librpmio8-4.14.2.1+dfsg1-1build2 * libopenscap-perl-1.2.16-1build1~uyuni1 * libpgm-5.2-0-5.2.122~dfsg-3ubuntu1 * rpm-common-4.14.2.1+dfsg1-1build2 * librpm8-4.14.2.1+dfsg1-1build2 * libopenscap8-dbg-1.2.16-1build1~uyuni1 * libopenscap-dev-1.2.16-1build1~uyuni1 * libnorm1-1.5.8+dfsg2-2build1 * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (all) * scap-security-guide-ubuntu-0.1.71-2.43.4 * SUSE Manager Client Tools for Ubuntu 20.04 2004 (amd64) * libzmq5-4.3.2-2ubuntu1 * python3-zmq-18.1.1-3 * libopenscap8-1.2.16-1build1~uyuni1 * librpmbuild8-4.14.2.1+dfsg1-1build2 * python-openscap-1.2.16-1build1~uyuni1 * librpmsign8-4.14.2.1+dfsg1-1build2 * python3-rpm-4.14.2.1+dfsg1-1build2 * librpmio8-4.14.2.1+dfsg1-1build2 * libopenscap-perl-1.2.16-1build1~uyuni1 * libpgm-5.2-0-5.2.122~dfsg-3ubuntu1 * rpm-common-4.14.2.1+dfsg1-1build2 * librpm8-4.14.2.1+dfsg1-1build2 * libopenscap8-dbg-1.2.16-1build1~uyuni1 * libopenscap-dev-1.2.16-1build1~uyuni1 * libnorm1-1.5.8+dfsg2-2build1 * SUSE Manager Client Tools for Ubuntu 20.04 2004 (all) * scap-security-guide-ubuntu-0.1.71-2.43.4 ## References: * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 08:30:06 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 08:30:06 -0000 Subject: SUSE-RU-2024:1617-1: moderate: Recommended update for SUSE Manager Client Tools Beta Message-ID: <171558900654.7713.18257377473321695166@smelt2.prg2.suse.org> # Recommended update for SUSE Manager Client Tools Beta Announcement ID: SUSE-RU-2024:1617-1 Rating: moderate References: * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 An update that contains one feature can now be installed. ## Description: This update for SUSE Manager Client Tools Beta fixes the following issues: * Changed codestream origin of SUSE Manager Client Tools Beta (no source changes): ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-2024-1617=1 * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1617=1 ## Package List: * SUSE Manager Client Tools for RHEL, Liberty and Clones 9 (noarch) * scap-security-guide-redhat-0.1.71-1.20.1 * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 (noarch) * scap-security-guide-redhat-0.1.71-1.20.1 ## References: * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 12:30:02 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 12:30:02 -0000 Subject: SUSE-SU-2024:0305-2: moderate: Security update for cpio Message-ID: <171560340253.6034.977543340770936458@smelt2.prg2.suse.org> # Security update for cpio Announcement ID: SUSE-SU-2024:0305-2 Rating: moderate References: * bsc#1218571 * bsc#1219238 Cross-References: * CVE-2023-7207 CVSS scores: * CVE-2023-7207 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for cpio fixes the following issues: * Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-305=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-305=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-305=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-305=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-305=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-305=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-305=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-305=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Manager Proxy 4.3 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * cpio-lang-2.13-150400.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * cpio-2.13-150400.3.6.1 * cpio-mt-debuginfo-2.13-150400.3.6.1 * cpio-debugsource-2.13-150400.3.6.1 * cpio-debuginfo-2.13-150400.3.6.1 * cpio-mt-2.13-150400.3.6.1 * SUSE Manager Server 4.3 (noarch) * cpio-lang-2.13-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7207.html * https://bugzilla.suse.com/show_bug.cgi?id=1218571 * https://bugzilla.suse.com/show_bug.cgi?id=1219238 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 12:30:05 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 12:30:05 -0000 Subject: SUSE-SU-2024:0638-2: moderate: Security update for gnutls Message-ID: <171560340518.6034.8533940172974622593@smelt2.prg2.suse.org> # Security update for gnutls Announcement ID: SUSE-SU-2024:0638-2 Rating: moderate References: * bsc#1218862 * bsc#1218865 Cross-References: * CVE-2024-0553 * CVE-2024-0567 CVSS scores: * CVE-2024-0553 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0553 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-0567 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0567 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves two vulnerabilities can now be installed. ## Description: This update for gnutls fixes the following issues: * CVE-2024-0567: Fixed an incorrect rejection of certificate chains with distributed trust (bsc#1218862). * CVE-2024-0553: Fixed a timing attack against the RSA-PSK key exchange, which could lead to the leakage of sensitive data (bsc#1218865). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-638=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-638=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-638=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-638=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-638=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-638=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-638=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-638=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Manager Server 4.3 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gnutls-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-3.7.3-150400.4.41.3 * libgnutls30-hmac-3.7.3-150400.4.41.3 * libgnutls30-debuginfo-3.7.3-150400.4.41.3 * libgnutlsxx28-3.7.3-150400.4.41.3 * libgnutlsxx28-debuginfo-3.7.3-150400.4.41.3 * libgnutls-devel-3.7.3-150400.4.41.3 * libgnutlsxx-devel-3.7.3-150400.4.41.3 * gnutls-debugsource-3.7.3-150400.4.41.3 * gnutls-3.7.3-150400.4.41.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libgnutls30-32bit-3.7.3-150400.4.41.3 * libgnutls30-32bit-debuginfo-3.7.3-150400.4.41.3 * libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 ## References: * https://www.suse.com/security/cve/CVE-2024-0553.html * https://www.suse.com/security/cve/CVE-2024-0567.html * https://bugzilla.suse.com/show_bug.cgi?id=1218862 * https://bugzilla.suse.com/show_bug.cgi?id=1218865 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 13 16:30:07 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 13 May 2024 16:30:07 -0000 Subject: SUSE-SU-2024:1624-1: important: Security update for python-Werkzeug Message-ID: <171561780786.10640.14513619258785470314@smelt2.prg2.suse.org> # Security update for python-Werkzeug Announcement ID: SUSE-SU-2024:1624-1 Rating: important References: * bsc#1223979 Cross-References: * CVE-2024-34069 CVSS scores: * CVE-2024-34069 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python-Werkzeug fixes the following issues: * CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1624=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1624=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1624=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1624=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1624=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1624=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1624=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1624=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1624=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1624=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1624=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1624=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1624=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1624=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1624=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1624=1 ## Package List: * openSUSE Leap 15.3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * python2-Werkzeug-1.0.1-150300.3.8.1 * openSUSE Leap 15.5 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * Basesystem Module 15-SP5 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Package Hub 15 15-SP5 (noarch) * python2-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Manager Proxy 4.3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Manager Server 4.3 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-Werkzeug-1.0.1-150300.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-34069.html * https://bugzilla.suse.com/show_bug.cgi?id=1223979 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 14 08:30:08 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 14 May 2024 08:30:08 -0000 Subject: SUSE-SU-2024:1629-1: moderate: Security update for SUSE Manager Client Tools Beta Message-ID: <171567540816.19724.8876161730970662771@smelt2.prg2.suse.org> # Security update for SUSE Manager Client Tools Beta Announcement ID: SUSE-SU-2024:1629-1 Rating: moderate References: * bsc#1014637 * bsc#1156309 * jsc#MSQA-775 Cross-References: * CVE-2016-9566 * CVE-2019-3698 CVSS scores: * CVE-2016-9566 ( SUSE ): 7.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2016-9566 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2019-3698 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2019-3698 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Advanced Systems Management Module 12 * Containers Module 12 * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Linux Enterprise Software Development Kit 12 SP5 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 * SUSE Manager Client Tools Beta for SLE 12 * SUSE Manager Client Tools for SLE 12 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for SUSE Manager Client Tools Beta fixes the following issues: * Changed codestream origin of SUSE Manager Client Tools Beta (no source changes) icinga in SUSE Manager Client Tools Beta also received the following security fixes: * CVE-2016-9566: Fixed root privilege escalation (bsc#1014637) * CVE-2019-3698 : Symbolic Link (Symlink) following vulnerability in the cronjob allows local attackers to cause cause DoS or potentially escalate privileges by winning a race (bsc#1156309) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-2024-1629=1 * SUSE Manager Client Tools Beta for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-BETA-2024-1629=1 * Advanced Systems Management Module 12 zypper in -t patch SUSE-SLE-Module-Adv-Systems-Management-12-2024-1629=1 * Containers Module 12 zypper in -t patch SUSE-SLE-Module-Containers-12-2024-1629=1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1629=1 SUSE-SLE- SAP-12-SP5-2024-1629=1 * SUSE Linux Enterprise Software Development Kit 12 SP5 zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1629=1 * SUSE Linux Enterprise High Performance Computing 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1629=1 * SUSE Linux Enterprise Server 12 SP5 zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1629=1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 zypper in -t patch SUSE-SLE-WE-12-SP5-2024-1629=1 ## Package List: * SUSE Manager Client Tools for SLE 12 (noarch) * grafana-sap-providers-1.1-1.7.1 * hwdata-0.314-10.14.1 * sysuser-shadow-2.0-1.9.1 * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-1.10.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-1.10.1 * SUSE Manager Client Tools for SLE 12 (aarch64 ppc64le s390x x86_64) * icinga-debugsource-1.13.3-12.8.1 * icinga-www-1.13.3-12.8.1 * libzmq3-4.0.4-15.8.1 * icinga-plugins-eventhandlers-1.13.3-12.8.1 * icinga-idoutils-oracle-1.13.3-12.8.1 * icinga-1.13.3-12.8.1 * icinga-devel-1.13.3-12.8.1 * icinga-idoutils-pgsql-1.13.3-12.8.1 * monitoring-tools-1.13.3-12.8.1 * icinga-debuginfo-1.13.3-12.8.1 * zeromq-debugsource-4.0.4-15.8.1 * icinga-plugins-downtimes-1.13.3-12.8.1 * icinga-idoutils-mysql-1.13.3-12.8.1 * icinga-idoutils-1.13.3-12.8.1 * icinga-www-config-1.13.3-12.8.1 * icinga-doc-1.13.3-12.8.1 * libzmq3-debuginfo-4.0.4-15.8.1 * SUSE Manager Client Tools Beta for SLE 12 (noarch) * grafana-sap-providers-1.1-1.7.1 * sysuser-shadow-2.0-1.9.1 * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-1.10.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-1.10.1 * SUSE Manager Client Tools Beta for SLE 12 (aarch64 ppc64le s390x x86_64) * icinga-debugsource-1.13.3-12.8.1 * icinga-www-1.13.3-12.8.1 * libzmq3-4.0.4-15.8.1 * icinga-plugins-eventhandlers-1.13.3-12.8.1 * icinga-idoutils-oracle-1.13.3-12.8.1 * icinga-1.13.3-12.8.1 * icinga-devel-1.13.3-12.8.1 * icinga-idoutils-pgsql-1.13.3-12.8.1 * monitoring-tools-1.13.3-12.8.1 * icinga-debuginfo-1.13.3-12.8.1 * zeromq-debugsource-4.0.4-15.8.1 * icinga-plugins-downtimes-1.13.3-12.8.1 * icinga-idoutils-mysql-1.13.3-12.8.1 * icinga-idoutils-1.13.3-12.8.1 * icinga-www-config-1.13.3-12.8.1 * icinga-doc-1.13.3-12.8.1 * libzmq3-debuginfo-4.0.4-15.8.1 * Advanced Systems Management Module 12 (ppc64le s390x x86_64) * libzmq3-4.0.4-15.8.1 * libzmq3-debuginfo-4.0.4-15.8.1 * zeromq-debugsource-4.0.4-15.8.1 * Containers Module 12 (noarch) * sysuser-shadow-2.0-1.9.1 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch) * grafana-sap-providers-1.1-1.7.1 * sysuser-shadow-2.0-1.9.1 * grafana-sap-netweaver-dashboards-1.0.3+git.1601889366.9f71957-1.10.1 * grafana-ha-cluster-dashboards-1.1.0+git.1605027022.a84d536-1.10.1 * grafana-sleha-provider-1.1.0+git.1605027022.a84d536-1.10.1 * sysuser-tools-2.0-1.9.1 * SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64) * libzmq3-4.0.4-15.8.1 * zeromq-devel-4.0.4-15.8.1 * libzmq3-debuginfo-4.0.4-15.8.1 * zeromq-debugsource-4.0.4-15.8.1 * SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch) * sysuser-shadow-2.0-1.9.1 * sysuser-tools-2.0-1.9.1 * SUSE Linux Enterprise Server 12 SP5 (noarch) * sysuser-shadow-2.0-1.9.1 * sysuser-tools-2.0-1.9.1 * SUSE Linux Enterprise Workstation Extension 12 12-SP5 (x86_64) * libzmq3-4.0.4-15.8.1 * libzmq3-debuginfo-4.0.4-15.8.1 * zeromq-debugsource-4.0.4-15.8.1 ## References: * https://www.suse.com/security/cve/CVE-2016-9566.html * https://www.suse.com/security/cve/CVE-2019-3698.html * https://bugzilla.suse.com/show_bug.cgi?id=1014637 * https://bugzilla.suse.com/show_bug.cgi?id=1156309 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 14 12:30:16 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 14 May 2024 12:30:16 -0000 Subject: SUSE-RU-2024:1631-1: moderate: Recommended update for python-argcomplete and python-Twisted Message-ID: <171568981695.7579.18037572027107976375@smelt2.prg2.suse.org> # Recommended update for python-argcomplete and python-Twisted Announcement ID: SUSE-RU-2024:1631-1 Rating: moderate References: * bsc#1224109 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-argcomplete and python-Twisted fixes the following issue: * Fix update-alternatives (bsc#1224109) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1631=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1631=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1631=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1631=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1631=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1631=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1631=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1631=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1631=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1631=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1631=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1631=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1631=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1631=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1631=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1631=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1631=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1631=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1631=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1631=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1631=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 (x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Manager Server 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-Twisted-22.2.0-150400.18.1 * python-Twisted-doc-22.2.0-150400.18.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.18.1 * openSUSE Leap 15.5 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * Basesystem Module 15-SP5 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * Basesystem Module 15-SP6 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.18.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 * SUSE Manager Proxy 4.3 (x86_64) * python3-Twisted-22.2.0-150400.18.1 * SUSE Manager Proxy 4.3 (noarch) * python3-argcomplete-1.9.2-150000.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224109 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 14 16:33:39 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 14 May 2024 16:33:39 -0000 Subject: SUSE-SU-2024:1641-1: important: Security update for the Linux Kernel Message-ID: <171570441908.20442.11681152032705571557@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2024:1641-1 Rating: important References: * bsc#1192145 * bsc#1209657 * bsc#1215221 * bsc#1216223 * bsc#1218336 * bsc#1218479 * bsc#1218562 * bsc#1219104 * bsc#1219126 * bsc#1219169 * bsc#1219170 * bsc#1219264 * bsc#1220342 * bsc#1220703 * bsc#1220761 * bsc#1220883 * bsc#1221044 * bsc#1221061 * bsc#1221088 * bsc#1221293 * bsc#1221299 * bsc#1221612 * bsc#1221725 * bsc#1221830 * bsc#1222117 * bsc#1222422 * bsc#1222430 * bsc#1222435 * bsc#1222482 * bsc#1222503 * bsc#1222536 * bsc#1222559 * bsc#1222585 * bsc#1222618 * bsc#1222624 * bsc#1222660 * bsc#1222662 * bsc#1222664 * bsc#1222666 * bsc#1222669 * bsc#1222671 * bsc#1222703 * bsc#1222704 * bsc#1222706 * bsc#1222709 * bsc#1222721 * bsc#1222726 * bsc#1222773 * bsc#1222776 * bsc#1222785 * bsc#1222787 * bsc#1222790 * bsc#1222791 * bsc#1222792 * bsc#1222796 * bsc#1222824 * bsc#1222829 * bsc#1222832 * bsc#1222836 * bsc#1222838 * bsc#1222866 * bsc#1222867 * bsc#1222869 * bsc#1222876 * bsc#1222878 * bsc#1222879 * bsc#1222881 * bsc#1222883 * bsc#1222888 * bsc#1222894 * bsc#1222901 * bsc#1223016 * bsc#1223187 * bsc#1223380 * bsc#1223474 * bsc#1223475 * bsc#1223477 * bsc#1223479 * bsc#1223482 * bsc#1223484 * bsc#1223487 * bsc#1223503 * bsc#1223505 * bsc#1223509 * bsc#1223513 * bsc#1223516 * bsc#1223517 * bsc#1223518 * bsc#1223519 * bsc#1223522 * bsc#1223523 * bsc#1223705 * bsc#1223824 Cross-References: * CVE-2021-47047 * CVE-2021-47181 * CVE-2021-47182 * CVE-2021-47183 * CVE-2021-47184 * CVE-2021-47185 * CVE-2021-47187 * CVE-2021-47188 * CVE-2021-47189 * CVE-2021-47191 * CVE-2021-47192 * CVE-2021-47193 * CVE-2021-47194 * CVE-2021-47195 * CVE-2021-47196 * CVE-2021-47197 * CVE-2021-47198 * CVE-2021-47199 * CVE-2021-47200 * CVE-2021-47201 * CVE-2021-47202 * CVE-2021-47203 * CVE-2021-47204 * CVE-2021-47205 * CVE-2021-47206 * CVE-2021-47207 * CVE-2021-47209 * CVE-2021-47210 * CVE-2021-47211 * CVE-2021-47212 * CVE-2021-47215 * CVE-2021-47216 * CVE-2021-47217 * CVE-2021-47218 * CVE-2021-47219 * CVE-2022-48631 * CVE-2022-48637 * CVE-2022-48638 * CVE-2022-48647 * CVE-2022-48648 * CVE-2022-48650 * CVE-2022-48651 * CVE-2022-48653 * CVE-2022-48654 * CVE-2022-48655 * CVE-2022-48656 * CVE-2022-48657 * CVE-2022-48660 * CVE-2022-48662 * CVE-2022-48663 * CVE-2022-48667 * CVE-2022-48668 * CVE-2023-0160 * CVE-2023-4881 * CVE-2023-52476 * CVE-2023-52500 * CVE-2023-52590 * CVE-2023-52591 * CVE-2023-52607 * CVE-2023-52616 * CVE-2023-52628 * CVE-2023-6270 * CVE-2023-7042 * CVE-2023-7192 * CVE-2024-0841 * CVE-2024-22099 * CVE-2024-23307 * CVE-2024-23848 * CVE-2024-23850 * CVE-2024-25742 * CVE-2024-26601 * CVE-2024-26610 * CVE-2024-26614 * CVE-2024-26642 * CVE-2024-26687 * CVE-2024-26688 * CVE-2024-26689 * CVE-2024-26704 * CVE-2024-26727 * CVE-2024-26733 * CVE-2024-26739 * CVE-2024-26764 * CVE-2024-26766 * CVE-2024-26773 * CVE-2024-26792 * CVE-2024-26816 * CVE-2024-26898 * CVE-2024-26903 * CVE-2024-27043 * CVE-2024-27389 CVSS scores: * CVE-2021-47181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2021-47217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48651 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-48655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48655 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48656 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48657 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48660 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-48660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48662 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48667 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-48668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-0160 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0160 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4881 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2023-4881 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-52476 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52500 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-52590 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-52591 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52628 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6270 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7042 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7042 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7192 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0841 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-0841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-22099 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-22099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23848 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-23848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23850 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-25742 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26610 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-26614 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26642 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26764 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26766 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-26898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26898 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27043 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27389 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 90 vulnerabilities and has three security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 LTSS kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705). * CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824). * CVE-2024-26816: Ignore relocations in .notes section when building with CONFIG_XEN_PV=y (bsc#1222624). * CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618). * CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726). * CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721). * CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585). * CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536). * CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422). * CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503). * CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435). * CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830). * CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293). * CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299). * CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342). * CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725). * CVE-2024-23850: Fixed double free of anonymous device after snapshot creation failure (bsc#1219126). * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169). * CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170). * CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264). * CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479). * CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336). * CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562). * CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117). * CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612). * CVE-2023-52607: Fixed NULL pointer dereference in pgtable_cache_add kasprintf() (bsc#1221061). * CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044). * CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088). * CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883). * CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703). * CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221). * CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657). * CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505). * CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb->mac_header (bsc#1223513). * CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878) * CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832). * CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706). * CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669). * CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664). * CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662). * CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource() (bsc#1222660). The following non-security bugs were fixed: * Call flush_delayed_fput() from nfsd main-loop (bsc#1223380). * ibmvfc: make 'max_sectors' a module option (bsc#1216223). * scsi: Update max_hw_sectors on rescan (bsc#1216223). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1641=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1641=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1641=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2024-1641=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2024-1641=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1641=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1641=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1641=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1641=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1641=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1641=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1641=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1641=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1641=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1641=1 ## Package List: * openSUSE Leap Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.14.21-150400.24.119.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 * kernel-default-livepatch-5.14.21-150400.24.119.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * gfs2-kmp-default-5.14.21-150400.24.119.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1 * ocfs2-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1 * cluster-md-kmp-default-5.14.21-150400.24.119.1 * dlm-kmp-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * kernel-default-extra-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64) * kernel-64kb-devel-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (noarch) * kernel-devel-5.14.21-150400.24.119.1 * kernel-source-vanilla-5.14.21-150400.24.119.1 * kernel-macros-5.14.21-150400.24.119.1 * kernel-docs-html-5.14.21-150400.24.119.1 * kernel-source-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debuginfo-5.14.21-150400.24.119.1 * kernel-debug-livepatch-devel-5.14.21-150400.24.119.1 * kernel-debug-debugsource-5.14.21-150400.24.119.1 * kernel-debug-devel-5.14.21-150400.24.119.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.119.1 * kernel-kvmsmall-devel-5.14.21-150400.24.119.1 * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.119.1 * kernel-default-base-rebuild-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.119.1 * ocfs2-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-default-devel-5.14.21-150400.24.119.1 * cluster-md-kmp-default-5.14.21-150400.24.119.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-build-debugsource-5.14.21-150400.24.119.1 * kernel-default-extra-5.14.21-150400.24.119.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-obs-qa-5.14.21-150400.24.119.1 * reiserfs-kmp-default-5.14.21-150400.24.119.1 * kernel-obs-build-5.14.21-150400.24.119.1 * kernel-default-livepatch-5.14.21-150400.24.119.1 * dlm-kmp-default-5.14.21-150400.24.119.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.119.1 * kernel-default-optional-5.14.21-150400.24.119.1 * kselftests-kmp-default-5.14.21-150400.24.119.1 * gfs2-kmp-default-5.14.21-150400.24.119.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.119.1 * kernel-default-livepatch-devel-5.14.21-150400.24.119.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.119.1 * kernel-syms-5.14.21-150400.24.119.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_119-default-1-150400.9.3.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.119.1 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64) * dtb-nvidia-5.14.21-150400.24.119.1 * dtb-rockchip-5.14.21-150400.24.119.1 * kselftests-kmp-64kb-5.14.21-150400.24.119.1 * dtb-freescale-5.14.21-150400.24.119.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-apm-5.14.21-150400.24.119.1 * ocfs2-kmp-64kb-5.14.21-150400.24.119.1 * kernel-64kb-livepatch-devel-5.14.21-150400.24.119.1 * dtb-mediatek-5.14.21-150400.24.119.1 * dtb-amazon-5.14.21-150400.24.119.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.119.1 * dlm-kmp-64kb-5.14.21-150400.24.119.1 * kernel-64kb-debugsource-5.14.21-150400.24.119.1 * gfs2-kmp-64kb-5.14.21-150400.24.119.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-arm-5.14.21-150400.24.119.1 * dtb-marvell-5.14.21-150400.24.119.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-renesas-5.14.21-150400.24.119.1 * reiserfs-kmp-64kb-5.14.21-150400.24.119.1 * dtb-altera-5.14.21-150400.24.119.1 * dtb-lg-5.14.21-150400.24.119.1 * dtb-socionext-5.14.21-150400.24.119.1 * dtb-xilinx-5.14.21-150400.24.119.1 * cluster-md-kmp-64kb-5.14.21-150400.24.119.1 * dtb-amlogic-5.14.21-150400.24.119.1 * dtb-hisilicon-5.14.21-150400.24.119.1 * dtb-broadcom-5.14.21-150400.24.119.1 * dtb-amd-5.14.21-150400.24.119.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * dtb-exynos-5.14.21-150400.24.119.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.119.1 * dtb-cavium-5.14.21-150400.24.119.1 * dtb-apple-5.14.21-150400.24.119.1 * dtb-qcom-5.14.21-150400.24.119.1 * dtb-sprd-5.14.21-150400.24.119.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-debuginfo-5.14.21-150400.24.119.1 * kernel-64kb-optional-5.14.21-150400.24.119.1 * kernel-64kb-devel-5.14.21-150400.24.119.1 * dtb-allwinner-5.14.21-150400.24.119.1 * kernel-64kb-extra-5.14.21-150400.24.119.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.119.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.3 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.119.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.119.1.150400.24.56.1 * kernel-default-debugsource-5.14.21-150400.24.119.1 * kernel-default-debuginfo-5.14.21-150400.24.119.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47047.html * https://www.suse.com/security/cve/CVE-2021-47181.html * https://www.suse.com/security/cve/CVE-2021-47182.html * https://www.suse.com/security/cve/CVE-2021-47183.html * https://www.suse.com/security/cve/CVE-2021-47184.html * https://www.suse.com/security/cve/CVE-2021-47185.html * https://www.suse.com/security/cve/CVE-2021-47187.html * https://www.suse.com/security/cve/CVE-2021-47188.html * https://www.suse.com/security/cve/CVE-2021-47189.html * https://www.suse.com/security/cve/CVE-2021-47191.html * https://www.suse.com/security/cve/CVE-2021-47192.html * https://www.suse.com/security/cve/CVE-2021-47193.html * https://www.suse.com/security/cve/CVE-2021-47194.html * https://www.suse.com/security/cve/CVE-2021-47195.html * https://www.suse.com/security/cve/CVE-2021-47196.html * https://www.suse.com/security/cve/CVE-2021-47197.html * https://www.suse.com/security/cve/CVE-2021-47198.html * https://www.suse.com/security/cve/CVE-2021-47199.html * https://www.suse.com/security/cve/CVE-2021-47200.html * https://www.suse.com/security/cve/CVE-2021-47201.html * https://www.suse.com/security/cve/CVE-2021-47202.html * https://www.suse.com/security/cve/CVE-2021-47203.html * https://www.suse.com/security/cve/CVE-2021-47204.html * https://www.suse.com/security/cve/CVE-2021-47205.html * https://www.suse.com/security/cve/CVE-2021-47206.html * https://www.suse.com/security/cve/CVE-2021-47207.html * https://www.suse.com/security/cve/CVE-2021-47209.html * https://www.suse.com/security/cve/CVE-2021-47210.html * https://www.suse.com/security/cve/CVE-2021-47211.html * https://www.suse.com/security/cve/CVE-2021-47212.html * https://www.suse.com/security/cve/CVE-2021-47215.html * https://www.suse.com/security/cve/CVE-2021-47216.html * https://www.suse.com/security/cve/CVE-2021-47217.html * https://www.suse.com/security/cve/CVE-2021-47218.html * https://www.suse.com/security/cve/CVE-2021-47219.html * https://www.suse.com/security/cve/CVE-2022-48631.html * https://www.suse.com/security/cve/CVE-2022-48637.html * https://www.suse.com/security/cve/CVE-2022-48638.html * https://www.suse.com/security/cve/CVE-2022-48647.html * https://www.suse.com/security/cve/CVE-2022-48648.html * https://www.suse.com/security/cve/CVE-2022-48650.html * https://www.suse.com/security/cve/CVE-2022-48651.html * https://www.suse.com/security/cve/CVE-2022-48653.html * https://www.suse.com/security/cve/CVE-2022-48654.html * https://www.suse.com/security/cve/CVE-2022-48655.html * https://www.suse.com/security/cve/CVE-2022-48656.html * https://www.suse.com/security/cve/CVE-2022-48657.html * https://www.suse.com/security/cve/CVE-2022-48660.html * https://www.suse.com/security/cve/CVE-2022-48662.html * https://www.suse.com/security/cve/CVE-2022-48663.html * https://www.suse.com/security/cve/CVE-2022-48667.html * https://www.suse.com/security/cve/CVE-2022-48668.html * https://www.suse.com/security/cve/CVE-2023-0160.html * https://www.suse.com/security/cve/CVE-2023-4881.html * https://www.suse.com/security/cve/CVE-2023-52476.html * https://www.suse.com/security/cve/CVE-2023-52500.html * https://www.suse.com/security/cve/CVE-2023-52590.html * https://www.suse.com/security/cve/CVE-2023-52591.html * https://www.suse.com/security/cve/CVE-2023-52607.html * https://www.suse.com/security/cve/CVE-2023-52616.html * https://www.suse.com/security/cve/CVE-2023-52628.html * https://www.suse.com/security/cve/CVE-2023-6270.html * https://www.suse.com/security/cve/CVE-2023-7042.html * https://www.suse.com/security/cve/CVE-2023-7192.html * https://www.suse.com/security/cve/CVE-2024-0841.html * https://www.suse.com/security/cve/CVE-2024-22099.html * https://www.suse.com/security/cve/CVE-2024-23307.html * https://www.suse.com/security/cve/CVE-2024-23848.html * https://www.suse.com/security/cve/CVE-2024-23850.html * https://www.suse.com/security/cve/CVE-2024-25742.html * https://www.suse.com/security/cve/CVE-2024-26601.html * https://www.suse.com/security/cve/CVE-2024-26610.html * https://www.suse.com/security/cve/CVE-2024-26614.html * https://www.suse.com/security/cve/CVE-2024-26642.html * https://www.suse.com/security/cve/CVE-2024-26687.html * https://www.suse.com/security/cve/CVE-2024-26688.html * https://www.suse.com/security/cve/CVE-2024-26689.html * https://www.suse.com/security/cve/CVE-2024-26704.html * https://www.suse.com/security/cve/CVE-2024-26727.html * https://www.suse.com/security/cve/CVE-2024-26733.html * https://www.suse.com/security/cve/CVE-2024-26739.html * https://www.suse.com/security/cve/CVE-2024-26764.html * https://www.suse.com/security/cve/CVE-2024-26766.html * https://www.suse.com/security/cve/CVE-2024-26773.html * https://www.suse.com/security/cve/CVE-2024-26792.html * https://www.suse.com/security/cve/CVE-2024-26816.html * https://www.suse.com/security/cve/CVE-2024-26898.html * https://www.suse.com/security/cve/CVE-2024-26903.html * https://www.suse.com/security/cve/CVE-2024-27043.html * https://www.suse.com/security/cve/CVE-2024-27389.html * https://bugzilla.suse.com/show_bug.cgi?id=1192145 * https://bugzilla.suse.com/show_bug.cgi?id=1209657 * https://bugzilla.suse.com/show_bug.cgi?id=1215221 * https://bugzilla.suse.com/show_bug.cgi?id=1216223 * https://bugzilla.suse.com/show_bug.cgi?id=1218336 * https://bugzilla.suse.com/show_bug.cgi?id=1218479 * https://bugzilla.suse.com/show_bug.cgi?id=1218562 * https://bugzilla.suse.com/show_bug.cgi?id=1219104 * https://bugzilla.suse.com/show_bug.cgi?id=1219126 * https://bugzilla.suse.com/show_bug.cgi?id=1219169 * https://bugzilla.suse.com/show_bug.cgi?id=1219170 * https://bugzilla.suse.com/show_bug.cgi?id=1219264 * https://bugzilla.suse.com/show_bug.cgi?id=1220342 * https://bugzilla.suse.com/show_bug.cgi?id=1220703 * https://bugzilla.suse.com/show_bug.cgi?id=1220761 * https://bugzilla.suse.com/show_bug.cgi?id=1220883 * https://bugzilla.suse.com/show_bug.cgi?id=1221044 * https://bugzilla.suse.com/show_bug.cgi?id=1221061 * https://bugzilla.suse.com/show_bug.cgi?id=1221088 * https://bugzilla.suse.com/show_bug.cgi?id=1221293 * https://bugzilla.suse.com/show_bug.cgi?id=1221299 * https://bugzilla.suse.com/show_bug.cgi?id=1221612 * https://bugzilla.suse.com/show_bug.cgi?id=1221725 * https://bugzilla.suse.com/show_bug.cgi?id=1221830 * https://bugzilla.suse.com/show_bug.cgi?id=1222117 * https://bugzilla.suse.com/show_bug.cgi?id=1222422 * https://bugzilla.suse.com/show_bug.cgi?id=1222430 * https://bugzilla.suse.com/show_bug.cgi?id=1222435 * https://bugzilla.suse.com/show_bug.cgi?id=1222482 * https://bugzilla.suse.com/show_bug.cgi?id=1222503 * https://bugzilla.suse.com/show_bug.cgi?id=1222536 * https://bugzilla.suse.com/show_bug.cgi?id=1222559 * https://bugzilla.suse.com/show_bug.cgi?id=1222585 * https://bugzilla.suse.com/show_bug.cgi?id=1222618 * https://bugzilla.suse.com/show_bug.cgi?id=1222624 * https://bugzilla.suse.com/show_bug.cgi?id=1222660 * https://bugzilla.suse.com/show_bug.cgi?id=1222662 * https://bugzilla.suse.com/show_bug.cgi?id=1222664 * https://bugzilla.suse.com/show_bug.cgi?id=1222666 * https://bugzilla.suse.com/show_bug.cgi?id=1222669 * https://bugzilla.suse.com/show_bug.cgi?id=1222671 * https://bugzilla.suse.com/show_bug.cgi?id=1222703 * https://bugzilla.suse.com/show_bug.cgi?id=1222704 * https://bugzilla.suse.com/show_bug.cgi?id=1222706 * https://bugzilla.suse.com/show_bug.cgi?id=1222709 * https://bugzilla.suse.com/show_bug.cgi?id=1222721 * https://bugzilla.suse.com/show_bug.cgi?id=1222726 * https://bugzilla.suse.com/show_bug.cgi?id=1222773 * https://bugzilla.suse.com/show_bug.cgi?id=1222776 * https://bugzilla.suse.com/show_bug.cgi?id=1222785 * https://bugzilla.suse.com/show_bug.cgi?id=1222787 * https://bugzilla.suse.com/show_bug.cgi?id=1222790 * https://bugzilla.suse.com/show_bug.cgi?id=1222791 * https://bugzilla.suse.com/show_bug.cgi?id=1222792 * https://bugzilla.suse.com/show_bug.cgi?id=1222796 * https://bugzilla.suse.com/show_bug.cgi?id=1222824 * https://bugzilla.suse.com/show_bug.cgi?id=1222829 * https://bugzilla.suse.com/show_bug.cgi?id=1222832 * https://bugzilla.suse.com/show_bug.cgi?id=1222836 * https://bugzilla.suse.com/show_bug.cgi?id=1222838 * https://bugzilla.suse.com/show_bug.cgi?id=1222866 * https://bugzilla.suse.com/show_bug.cgi?id=1222867 * https://bugzilla.suse.com/show_bug.cgi?id=1222869 * https://bugzilla.suse.com/show_bug.cgi?id=1222876 * https://bugzilla.suse.com/show_bug.cgi?id=1222878 * https://bugzilla.suse.com/show_bug.cgi?id=1222879 * https://bugzilla.suse.com/show_bug.cgi?id=1222881 * https://bugzilla.suse.com/show_bug.cgi?id=1222883 * https://bugzilla.suse.com/show_bug.cgi?id=1222888 * https://bugzilla.suse.com/show_bug.cgi?id=1222894 * https://bugzilla.suse.com/show_bug.cgi?id=1222901 * https://bugzilla.suse.com/show_bug.cgi?id=1223016 * https://bugzilla.suse.com/show_bug.cgi?id=1223187 * https://bugzilla.suse.com/show_bug.cgi?id=1223380 * https://bugzilla.suse.com/show_bug.cgi?id=1223474 * https://bugzilla.suse.com/show_bug.cgi?id=1223475 * https://bugzilla.suse.com/show_bug.cgi?id=1223477 * https://bugzilla.suse.com/show_bug.cgi?id=1223479 * https://bugzilla.suse.com/show_bug.cgi?id=1223482 * https://bugzilla.suse.com/show_bug.cgi?id=1223484 * https://bugzilla.suse.com/show_bug.cgi?id=1223487 * https://bugzilla.suse.com/show_bug.cgi?id=1223503 * https://bugzilla.suse.com/show_bug.cgi?id=1223505 * https://bugzilla.suse.com/show_bug.cgi?id=1223509 * https://bugzilla.suse.com/show_bug.cgi?id=1223513 * https://bugzilla.suse.com/show_bug.cgi?id=1223516 * https://bugzilla.suse.com/show_bug.cgi?id=1223517 * https://bugzilla.suse.com/show_bug.cgi?id=1223518 * https://bugzilla.suse.com/show_bug.cgi?id=1223519 * https://bugzilla.suse.com/show_bug.cgi?id=1223522 * https://bugzilla.suse.com/show_bug.cgi?id=1223523 * https://bugzilla.suse.com/show_bug.cgi?id=1223705 * https://bugzilla.suse.com/show_bug.cgi?id=1223824 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 14 16:33:57 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 14 May 2024 16:33:57 -0000 Subject: SUSE-RU-2024:1637-1: moderate: Recommended update for google-cloud SDK Message-ID: <171570443703.20442.4288123244735551005@smelt2.prg2.suse.org> # Recommended update for google-cloud SDK Announcement ID: SUSE-RU-2024:1637-1 Rating: moderate References: * bsc#1210617 * jsc#PED-6697 * jsc#PED-7987 Cross-References: * CVE-2023-30608 CVSS scores: * CVE-2023-30608 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-30608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Python 3 Module 15-SP5 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for google-cloud SDK fixes the following issues: * Add python311 cloud services packages and dependencies (jsc#PED-7987, jsc#PED-6697) * Bellow 5 binaries Obsolete the python3.6 counterpart: python311-google- resumable-media python311-google-api-core python311-google-cloud-storage python311-google-cloud-core python311-googleapis-common-protos * Regular python311 updates (without Obsoletes): python-google-auth python- grpcio python-sqlparse * New python311 packages: libcrc32c python-google-cloud-appengine-logging python-google-cloud-artifact-registry python-google-cloud-audit-log python- google-cloud-build python-google-cloud-compute python-google-cloud-dns python-google-cloud-domains python-google-cloud-iam python-google-cloud-kms- inventory python-google-cloud-kms python-google-cloud-logging python-google- cloud-run python-google-cloud-secret-manager python-google-cloud-service- directory python-google-cloud-spanner python-google-cloud-vpc-access python- google-crc32c python-grpc-google-iam-v1 python-grpcio-status python-proto- plus In python-sqlparse this security issue was fixed: CVE-2023-30608: Fixed parser that contained a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) (bsc#1210617) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1637=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1637=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1637=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1637=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2024-1637=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2024-1637=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1637=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1637=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1637=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1637=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1637=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1637=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1637=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1637=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2024-1637=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2024-1637=1 * Python 3 Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Python3-15-SP5-2024-1637=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-grpcio-1.60.1-150400.9.7.2 * python311-grpcio-debuginfo-1.60.1-150400.9.7.2 * protobuf-devel-debuginfo-25.1-150400.9.6.1 * python311-cryptography-debuginfo-41.0.3-150400.16.19.1 * protobuf-debugsource-25.1-150400.9.6.1 * protobuf-java-25.1-150400.9.6.1 * protobuf-devel-25.1-150400.9.6.1 * libprotoc25_1_0-25.1-150400.9.6.1 * libprotobuf25_1_0-25.1-150400.9.6.1 * python311-google-crc32c-1.5.0-150400.9.3.1 * python311-cryptography-41.0.3-150400.16.19.1 * libcrc32c-devel-1.1.2-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * python311-protobuf-4.25.1-150400.9.6.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python-cryptography-debugsource-41.0.3-150400.16.19.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.6.1 * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1 * python311-cffi-1.15.1-150400.8.7.2 * python-cffi-debugsource-1.15.1-150400.8.7.2 * python-grpcio-debugsource-1.60.1-150400.9.7.2 * python311-cffi-debuginfo-1.15.1-150400.8.7.2 * libcrc32c1-1.1.2-150400.9.3.1 * openSUSE Leap 15.4 (x86_64) * libprotobuf25_1_0-32bit-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-32bit-25.1-150400.9.6.1 * libprotoc25_1_0-32bit-25.1-150400.9.6.1 * openSUSE Leap 15.4 (noarch) * python311-pytz-2023.3-150400.6.6.1 * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-py-1.11.0-150400.12.7.2 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-cachetools-5.3.1-150400.8.6.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * python311-setuptools-67.7.2-150400.3.12.1 * python311-pycparser-2.21-150400.12.7.2 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-urllib3-2.0.7-150400.7.14.1 * python311-idna-3.4-150400.11.6.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-pyasn1-modules-0.3.0-150400.12.7.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-setuptools-wheel-67.7.2-150400.3.12.1 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-requests-2.31.0-150400.6.8.1 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-rsa-4.9-150400.12.7.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * python311-apipkg-3.0.1-150400.12.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libprotobuf-lite25_1_0-64bit-25.1-150400.9.6.1 * libprotoc25_1_0-64bit-25.1-150400.9.6.1 * libprotobuf25_1_0-64bit-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-64bit-debuginfo-25.1-150400.9.6.1 * libprotoc25_1_0-64bit-debuginfo-25.1-150400.9.6.1 * libprotobuf25_1_0-64bit-debuginfo-25.1-150400.9.6.1 * openSUSE Leap Micro 5.3 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * openSUSE Leap Micro 5.4 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * python311-grpcio-1.60.1-150400.9.7.2 * python311-grpcio-debuginfo-1.60.1-150400.9.7.2 * protobuf-devel-debuginfo-25.1-150400.9.6.1 * python311-cryptography-debuginfo-41.0.3-150400.16.19.1 * protobuf-debugsource-25.1-150400.9.6.1 * protobuf-java-25.1-150400.9.6.1 * protobuf-devel-25.1-150400.9.6.1 * libprotoc25_1_0-25.1-150400.9.6.1 * python311-google-crc32c-1.5.0-150400.9.3.1 * python311-cryptography-41.0.3-150400.16.19.1 * libcrc32c-devel-1.1.2-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * python311-protobuf-4.25.1-150400.9.6.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python-cryptography-debugsource-41.0.3-150400.16.19.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.6.1 * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1 * python311-cffi-1.15.1-150400.8.7.2 * python-cffi-debugsource-1.15.1-150400.8.7.2 * python-grpcio-debugsource-1.60.1-150400.9.7.2 * python311-cffi-debuginfo-1.15.1-150400.8.7.2 * libcrc32c1-1.1.2-150400.9.3.1 * openSUSE Leap 15.5 (x86_64) * libprotobuf25_1_0-32bit-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotobuf25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotoc25_1_0-32bit-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-32bit-25.1-150400.9.6.1 * libprotoc25_1_0-32bit-25.1-150400.9.6.1 * openSUSE Leap 15.5 (noarch) * python311-pytz-2023.3-150400.6.6.1 * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-py-1.11.0-150400.12.7.2 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-cachetools-5.3.1-150400.8.6.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * python311-setuptools-67.7.2-150400.3.12.1 * python311-pycparser-2.21-150400.12.7.2 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-urllib3-2.0.7-150400.7.14.1 * python311-idna-3.4-150400.11.6.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-pyasn1-modules-0.3.0-150400.12.7.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-requests-2.31.0-150400.6.8.1 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-rsa-4.9-150400.12.7.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * python311-apipkg-3.0.1-150400.12.6.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * protobuf-debugsource-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libprotobuf-lite25_1_0-25.1-150400.9.6.1 * libprotobuf25_1_0-25.1-150400.9.6.1 * libprotobuf25_1_0-debuginfo-25.1-150400.9.6.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.6.1 * libprotobuf-lite25_1_0-debuginfo-25.1-150400.9.6.1 * protobuf-debugsource-25.1-150400.9.6.1 * libprotoc25_1_0-25.1-150400.9.6.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libprotoc25_1_0-debuginfo-25.1-150400.9.6.1 * protobuf-devel-debuginfo-25.1-150400.9.6.1 * libprotoc25_1_0-25.1-150400.9.6.1 * protobuf-debugsource-25.1-150400.9.6.1 * protobuf-devel-25.1-150400.9.6.1 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * protobuf-debugsource-25.1-150400.9.6.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python311-cffi-1.15.1-150400.8.7.2 * python311-google-crc32c-1.5.0-150400.9.3.1 * python311-grpcio-1.60.1-150400.9.7.2 * python311-grpcio-debuginfo-1.60.1-150400.9.7.2 * python311-cryptography-41.0.3-150400.16.19.1 * libcrc32c-devel-1.1.2-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * python-grpcio-debugsource-1.60.1-150400.9.7.2 * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * python311-protobuf-4.25.1-150400.9.6.1 * protobuf-debugsource-25.1-150400.9.6.1 * libcrc32c1-1.1.2-150400.9.3.1 * Public Cloud Module 15-SP4 (noarch) * python311-pytz-2023.3-150400.6.6.1 * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-py-1.11.0-150400.12.7.2 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-cachetools-5.3.1-150400.8.6.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * python311-setuptools-67.7.2-150400.3.12.1 * python311-pycparser-2.21-150400.12.7.2 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-urllib3-2.0.7-150400.7.14.1 * python311-idna-3.4-150400.11.6.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-pyasn1-modules-0.3.0-150400.12.7.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-requests-2.31.0-150400.6.8.1 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-rsa-4.9-150400.12.7.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * python311-apipkg-3.0.1-150400.12.6.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-google-crc32c-debuginfo-1.5.0-150400.9.3.1 * libcrc32c-debugsource-1.1.2-150400.9.3.1 * python311-google-crc32c-1.5.0-150400.9.3.1 * python311-grpcio-1.60.1-150400.9.7.2 * python311-grpcio-debuginfo-1.60.1-150400.9.7.2 * libcrc32c-devel-1.1.2-150400.9.3.1 * libcrc32c1-debuginfo-1.1.2-150400.9.3.1 * libprotoc25_1_0-debuginfo-25.1-150400.9.6.1 * python-google-crc32c-debugsource-1.5.0-150400.9.3.1 * python-grpcio-debugsource-1.60.1-150400.9.7.2 * protobuf-debugsource-25.1-150400.9.6.1 * libcrc32c1-1.1.2-150400.9.3.1 * libprotoc25_1_0-25.1-150400.9.6.1 * Public Cloud Module 15-SP5 (noarch) * python311-google-cloud-dns-0.35.0-150400.9.3.1 * python311-google-resumable-media-2.7.0-150400.10.4.1 * python311-sqlparse-0.4.4-150400.6.4.2 * python311-google-cloud-core-2.4.1-150400.5.4.1 * python311-google-cloud-spanner-3.40.1-150400.9.3.1 * python311-grpcio-status-1.60.1-150400.9.3.1 * python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 * python311-proto-plus-1.23.0-150400.9.3.1 * python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 * python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 * python311-google-cloud-storage-2.14.0-150400.10.3.1 * python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 * python311-google-cloud-iam-2.13.0-150400.9.3.1 * python311-google-api-core-2.15.0-150400.5.4.1 * python311-google-cloud-service-directory-1.11.1-150400.9.3.1 * python311-google-cloud-run-0.10.1-150400.9.3.1 * python311-google-cloud-audit-log-0.2.5-150400.9.3.1 * python311-google-cloud-domains-1.7.1-150400.9.3.1 * python311-googleapis-common-protos-1.62.0-150400.10.4.1 * python311-google-auth-2.27.0-150400.6.7.1 * python311-google-cloud-compute-1.15.0-150400.9.3.1 * python311-google-cloud-build-3.22.0-150400.9.3.1 * python311-google-cloud-kms-2.21.0-150400.9.3.1 * python311-google-cloud-logging-3.9.0-150400.9.3.1 * python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 * python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 * Python 3 Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python311-cryptography-debuginfo-41.0.3-150400.16.19.1 * python311-cffi-1.15.1-150400.8.7.2 * python311-grpcio-1.60.1-150400.9.7.2 * python311-grpcio-debuginfo-1.60.1-150400.9.7.2 * python311-cryptography-41.0.3-150400.16.19.1 * python-cffi-debugsource-1.15.1-150400.8.7.2 * python-grpcio-debugsource-1.60.1-150400.9.7.2 * python311-cffi-debuginfo-1.15.1-150400.8.7.2 * python-cryptography-debugsource-41.0.3-150400.16.19.1 * python311-protobuf-4.25.1-150400.9.6.1 * Python 3 Module 15-SP5 (noarch) * python311-charset-normalizer-3.1.0-150400.9.7.2 * python311-iniconfig-2.0.0-150400.10.6.1 * python311-pytz-2023.3-150400.6.6.1 * python311-pyasn1-0.5.0-150400.12.7.2 * python311-urllib3-2.0.7-150400.7.14.1 * python311-requests-2.31.0-150400.6.8.1 * python311-rsa-4.9-150400.12.7.1 * python311-cachetools-5.3.1-150400.8.6.1 * python311-idna-3.4-150400.11.6.1 * python311-pyasn1-modules-0.3.0-150400.12.7.1 * python311-setuptools-67.7.2-150400.3.12.1 * python311-pycparser-2.21-150400.12.7.2 * python311-pyOpenSSL-23.2.0-150400.3.10.1 * python311-certifi-2023.7.22-150400.12.6.2 * python311-apipkg-3.0.1-150400.12.6.1 * python311-py-1.11.0-150400.12.7.2 * python311-google-auth-2.27.0-150400.6.7.1 ## References: * https://www.suse.com/security/cve/CVE-2023-30608.html * https://bugzilla.suse.com/show_bug.cgi?id=1210617 * https://jira.suse.com/browse/PED-6697 * https://jira.suse.com/browse/PED-7987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 15 12:30:04 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 15 May 2024 12:30:04 -0000 Subject: SUSE-RU-2024:1660-1: moderate: Recommended update for pam_pkcs11 Message-ID: <171577620487.30449.2554510942803537539@smelt2.prg2.suse.org> # Recommended update for pam_pkcs11 Announcement ID: SUSE-RU-2024:1660-1 Rating: moderate References: * bsc#1221255 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for pam_pkcs11 fixes the following issue: * Fix 0001-Set-slot_num-configuration-parameter-to-0-by-default (bsc#1221255) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1660=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1660=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1660=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1660=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1660=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1660=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1660=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1660=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1660=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1660=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1660=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1660=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1660=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1660=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1660=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1660=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1660=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1660=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1660=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1660=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1660=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1660=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1660=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1660=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1660=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1660=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1660=1 ## Package List: * openSUSE Leap Micro 5.3 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-devel-doc-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * openSUSE Leap 15.5 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * Basesystem Module 15-SP5 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Manager Proxy 4.3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Manager Server 4.3 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Enterprise Storage 7.1 (x86_64) * pam_pkcs11-32bit-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-32bit-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam_pkcs11-0.6.10-150100.3.3.2 * pam_pkcs11-debuginfo-0.6.10-150100.3.3.2 * pam_pkcs11-debugsource-0.6.10-150100.3.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 16 08:30:09 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 16 May 2024 08:30:09 -0000 Subject: SUSE-RU-2024:1665-1: moderate: Recommended update for coreutils Message-ID: <171584820953.6890.5085915832163430444@smelt2.prg2.suse.org> # Recommended update for coreutils Announcement ID: SUSE-RU-2024:1665-1 Rating: moderate References: * bsc#1221632 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for coreutils fixes the following issues: * ls: avoid triggering automounts (bsc#1221632) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1665=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1665=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1665=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1665=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1665=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1665=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1665=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1665=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1665=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1665=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1665=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1665=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1665=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1665=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1665=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1665=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1665=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1665=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * coreutils-debuginfo-8.32-150400.9.6.1 * coreutils-testsuite-8.32-150400.9.6.2 * coreutils-single-8.32-150400.9.6.1 * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-single-debuginfo-8.32-150400.9.6.1 * coreutils-single-debugsource-8.32-150400.9.6.1 * openSUSE Leap 15.4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * coreutils-debuginfo-8.32-150400.9.6.1 * coreutils-testsuite-8.32-150400.9.6.2 * coreutils-single-8.32-150400.9.6.1 * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-single-debuginfo-8.32-150400.9.6.1 * coreutils-single-debugsource-8.32-150400.9.6.1 * openSUSE Leap 15.5 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * Basesystem Module 15-SP5 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Manager Proxy 4.3 (x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Manager Proxy 4.3 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * coreutils-8.32-150400.9.6.1 * coreutils-debugsource-8.32-150400.9.6.1 * coreutils-debuginfo-8.32-150400.9.6.1 * SUSE Manager Server 4.3 (noarch) * coreutils-lang-8.32-150400.9.6.1 * coreutils-doc-8.32-150400.9.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221632 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 22 16:30:17 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 22 May 2024 16:30:17 -0000 Subject: SUSE-SU-2024:1762-1: important: Security update for perl Message-ID: <171639541787.32074.14303676122780347313@smelt2.prg2.suse.org> # Security update for perl Announcement ID: SUSE-SU-2024:1762-1 Rating: important References: * bsc#1082216 * bsc#1082233 * bsc#1213638 Cross-References: * CVE-2018-6798 * CVE-2018-6913 CVSS scores: * CVE-2018-6798 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2018-6913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-6913 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for perl fixes the following issues: Security issues fixed: * CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216) * CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233) Non-security issue fixed: * make Net::FTP work with TLS 1.3 (bsc#1213638) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1762=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1762=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1762=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1762=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1762=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1762=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1762=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1762=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1762=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1762=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1762=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1762=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1762=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1762=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1762=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1762=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1762=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1762=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1762=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1762=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1762=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1762=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1762=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1762=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1762=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1762=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1762=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1762=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1762=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1762=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1762=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Manager Proxy 4.3 (x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Manager Server 4.3 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Enterprise Storage 7.1 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Enterprise Storage 7.1 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap 15.3 (x86_64) * perl-base-32bit-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-5.26.1-150300.17.17.1 * perl-32bit-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap 15.3 (noarch) * perl-doc-5.26.1-150300.17.17.1 * openSUSE Leap 15.3 (aarch64_ilp32) * perl-core-DB_File-64bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-64bit-debuginfo-5.26.1-150300.17.17.1 * perl-64bit-5.26.1-150300.17.17.1 * perl-64bit-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-64bit-5.26.1-150300.17.17.1 * perl-base-64bit-5.26.1-150300.17.17.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap 15.5 (x86_64) * perl-base-32bit-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-5.26.1-150300.17.17.1 * perl-32bit-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap 15.5 (noarch) * perl-doc-5.26.1-150300.17.17.1 * openSUSE Leap 15.6 (x86_64) * perl-base-32bit-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-32bit-5.26.1-150300.17.17.1 * perl-32bit-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * openSUSE Leap 15.6 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * Basesystem Module 15-SP5 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * Basesystem Module 15-SP6 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * Development Tools Module 15-SP5 (noarch) * perl-doc-5.26.1-150300.17.17.1 * Development Tools Module 15-SP6 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Package Hub 15 15-SP5 (x86_64) * perl-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Package Hub 15 15-SP6 (x86_64) * perl-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * perl-5.26.1-150300.17.17.1 * perl-core-DB_File-5.26.1-150300.17.17.1 * perl-base-debuginfo-5.26.1-150300.17.17.1 * perl-debuginfo-5.26.1-150300.17.17.1 * perl-core-DB_File-debuginfo-5.26.1-150300.17.17.1 * perl-base-5.26.1-150300.17.17.1 * perl-debugsource-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * perl-doc-5.26.1-150300.17.17.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * perl-base-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-32bit-debuginfo-5.26.1-150300.17.17.1 * perl-base-32bit-5.26.1-150300.17.17.1 ## References: * https://www.suse.com/security/cve/CVE-2018-6798.html * https://www.suse.com/security/cve/CVE-2018-6913.html * https://bugzilla.suse.com/show_bug.cgi?id=1082216 * https://bugzilla.suse.com/show_bug.cgi?id=1082233 * https://bugzilla.suse.com/show_bug.cgi?id=1213638 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 23 08:30:04 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 23 May 2024 08:30:04 -0000 Subject: SUSE-RU-2024:1764-1: moderate: Recommended update for jackson Message-ID: <171645300421.8295.1928790685211172849@smelt2.prg2.suse.org> # Recommended update for jackson Announcement ID: SUSE-RU-2024:1764-1 Rating: moderate References: Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that can now be installed. ## Description: This update for jackson fixes the following issues: jackson-annotations was upgraded to version 2.16.1: * Added new OptBoolean valued property in @JsonTypeInfo to allow per-type configuration of strict type id handling * Allow per-type configuration of strict type id handling * Added JsonTypeInfo.Value object (backport from 3.0) * Added new JsonTypeInfo.Id.SIMPLE_NAME jackson-bom was upgraded to version 2.16.1: * Added dependency for jackson-module-android-record. This new module offers support for Record type on Android platform, where Java records are supported through "de-sugaring" jackson-core was upgraded to version 2.16.1: * NPE in Version.equals() if snapshot-info null * NPE in "FastDoubleParser", method "JavaBigDecimalParser.parseBigDecimal()" * JsonPointer.append(JsonPointer.tail()) includes the original pointer * Change StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION default to false in Jackson 2.16 * Improve error message for StreamReadConstraints violations * JsonFactory implementations should respect CANONICALIZE_FIELD_NAMES * Root cause for failing test for testMangledIntsBytes() in ParserErrorHandlingTest * Allow all array elements in JsonPointerBasedFilter * Indicate explicitly blocked sources as "REDACTED" instead of "UNKNOWN" in JsonLocation * Start using AssertJ in unit tests * Allow configuring spaces before and/or after the colon in DefaultPrettyPrinter (for Canonical JSON) * Add configurable limit for the maximum number of bytes/chars of content to parse before failing * Add configurable limit for the maximum length of Object property names to parse before failing * Add configurable processing limits for JSON generator (StreamWriteConstraints) * Compare _snapshotInfo in Version * Add JsonGeneratorDecorator to allow decorating JsonGenerators * Add full set of BufferRecyclerPool implementations * Add configurable error report behavior via ErrorReportConfiguration * Make ByteSourceJsonBootstrapper use StringReader for < 8KiB byte[] inputs * Allow pluggable buffer recycling via new RecyclerPool extension point * Change parsing error message to mention -INF jackson-databind was upgraded to version 2.16.1: * JsonSetter(contentNulls = FAIL) is ignored in delegating @JsonCreator argument * Primitive array deserializer not being captured by DeserializerModifier * JsonNode.findValues() and findParents() missing expected values in 2.16.0 * Incorrect deserialization for BigDecimal numbers * Add a way to configure caches Jackson uses * Mix-ins do not work for Enums * Map deserialization results in different numeric classes based on json ordering (BigDecimal / Double) when used in combination with @JsonSubTypes * Generic class with generic field of runtime type Double is deserialized as BigDecimal when used with @JsonTypeInfo and JsonTypeInfo.As.EXISTING_PROPERTY * Combination of @JsonUnwrapped and @JsonAnySetter results in BigDecimal instead of Double * @JsonIgnoreProperties not working with @JsonValue * Deprecated JsonNode.with(String) suggests using JsonNode.withObject(String) but it is not the same thing * Difference in the handling of ObjectId-property inJsonIdentityInfo depending on the deserialization route * Add new OptBoolean valued property in @JsonTypeInfo, handling, to allow per- polymorphic type loose Type Id handling * Fixed regression in 2.15.0 that reaks deserialization for records when mapper.setVisibility(PropertyAccessor.ALL, Visibility.NONE) * Incorrect target type when disabling coercion, trying to deserialize String from Array/Object * @JsonProperty on constructor parameter changes default field serialization order * Create new JavaType subtype IterationType (extending SimpleType) * Use JsonTypeInfo.Value for annotation handling * Add JsonNodeFeature.WRITE_PROPERTIES_SORTED for sorting ObjectNode properties on serialization (for Canonical JSON) * Optimize ObjectNode findValue(s) and findParent(s) fast paths * Locale "" is deserialised as null if ACCEPT_EMPTY_STRING_AS_NULL_OBJECT is enabled * Add guardrail setting for TypeParser handling of type parameters * Use @JsonProperty for Enum values also when READ_ENUMS USING_TO_STRING enabled * Fix Enum deserialization to use @JsonProperty, @JsonAlias even if EnumNamingStrategy used * Use @JsonProperty and lowercase feature when serializing Enums despite using toString() * Use @JsonProperty over EnumNamingStrategy for Enum serialization * Actually cache EnumValues#internalMap * ObjectMapper.valueToTree() will ignore the configuration SerializationFeature.WRAP_ROOT_VALUE * Provide the "ObjectMapper.treeToValue(TreeNode, TypeReference)" method * Expose NativeImageUtil.isRunningInNativeImage() method * Add JsonTypeInfo.Id.SIMPLE_NAME which defaults type id to Class.getSimpleName() * Impossible to deserialize custom Throwable sub-classes that do not have single-String constructors * java.desktop module is no longer optional * ClassUtil fails with java.lang.reflect.InaccessibleObjectException trying to setAccessible on OptionalInt with JDK 17+ * Support sequenced collections (JDK 21) * Add withObjectProperty(String), withArrayProperty(String) in JsonNode * Change JsonNode.withObject(String) to work similar to withArray() wrt argument * Log WARN if deprecated subclasses of PropertyNamingStrategy is used * NPE when transforming a tree to a model class object, at ArrayNode.elements() * Deprecated ObjectReader.withType(Type) has no direct replacement; need forType(Type) * Add new DefaultTyping.NON_FINAL_AND_ENUMS to allow Default Typing for Enums * Do not rewind position when serializing direct ByteBuffer * Exception when deserialization of private record with default constructor * BeanDeserializer updates currentValue incorrectly when deserialising empty Object jackson-dataformats-binary was upgraded to version 2.16.1: * (ion) NullPointerException in IonParser.nextToken() * (smile) Remove Smile-specific buffer-recycling jackson-modules-base was upgraded to version 2.16.1: * (afterburner) Disable when running in native-image * (afterburner) IncompatibleClassChangeError when deserializing a class implementing an interface with default get/set implementations * (blackbird) BlackBird proxy object error in Java 17 * (blackbird) Disable when running in native-image * (guice) Add guice7 (jakarta.inject) module jackson-parent was upgraded to version 2.16: * Upgrade to oss-parent 56 (tons of plugin updates to resolve Maven warnings, new Moditect plugin) jackson-parent, fasterxml-oss-parent: * Added to SUSE Manager 4.3 as it is needed by `jackson-modules-base` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1764=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1764=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1764=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1764=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1764=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1764=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1764=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1764=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1764=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1764=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1764=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1764=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1764=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1764=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1764=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1764=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1764=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1764=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1764=1 ## Package List: * openSUSE Leap 15.5 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * jackson-module-osgi-2.16.1-150200.5.11.1 * jackson-module-mrbean-2.16.1-150200.5.11.1 * jackson-module-blackbird-2.16.1-150200.5.11.1 * jackson-module-no-ctor-deser-2.16.1-150200.5.11.1 * jackson-annotations-javadoc-2.16.1-150200.3.14.4 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformats-binary-javadoc-2.16.1-150200.3.13.6 * fasterxml-oss-parent-38-150200.3.2.1 * jackson-module-paranamer-2.16.1-150200.5.11.1 * jackson-module-afterburner-2.16.1-150200.5.11.1 * jackson-databind-2.16.1-150200.3.18.1 * jackson-bom-2.16.1-150200.3.11.1 * jackson-core-javadoc-2.16.1-150200.3.14.7 * jackson-parent-2.16-150200.3.10.1 * jackson-databind-javadoc-2.16.1-150200.3.18.1 * jackson-dataformat-smile-2.16.1-150200.3.13.6 * jackson-modules-base-2.16.1-150200.5.11.1 * jackson-module-guice-2.16.1-150200.5.11.1 * jackson-modules-base-javadoc-2.16.1-150200.5.11.1 * jackson-dataformats-binary-2.16.1-150200.3.13.6 * jackson-module-jaxb-annotations-2.16.1-150200.5.11.1 * Basesystem Module 15-SP5 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * Development Tools Module 15-SP5 (noarch) * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Manager Server 4.3 Module 4.3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-module-afterburner-2.16.1-150200.5.11.1 * jackson-modules-base-2.16.1-150200.5.11.1 * jackson-module-no-ctor-deser-2.16.1-150200.5.11.1 * jackson-databind-2.16.1-150200.3.18.1 * jackson-module-guice-2.16.1-150200.5.11.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-module-osgi-2.16.1-150200.5.11.1 * jackson-parent-2.16-150200.3.10.1 * fasterxml-oss-parent-38-150200.3.2.1 * jackson-module-mrbean-2.16.1-150200.5.11.1 * jackson-module-paranamer-2.16.1-150200.5.11.1 * jackson-module-jaxb-annotations-2.16.1-150200.5.11.1 * jackson-module-blackbird-2.16.1-150200.5.11.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * jackson-databind-2.16.1-150200.3.18.1 * jackson-annotations-javadoc-2.16.1-150200.3.14.4 * jackson-core-2.16.1-150200.3.14.7 * jackson-databind-javadoc-2.16.1-150200.3.18.1 * jackson-core-javadoc-2.16.1-150200.3.14.7 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * jackson-databind-2.16.1-150200.3.18.1 * jackson-annotations-javadoc-2.16.1-150200.3.14.4 * jackson-core-2.16.1-150200.3.14.7 * jackson-databind-javadoc-2.16.1-150200.3.18.1 * jackson-core-javadoc-2.16.1-150200.3.14.7 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * jackson-databind-2.16.1-150200.3.18.1 * jackson-annotations-javadoc-2.16.1-150200.3.14.4 * jackson-core-2.16.1-150200.3.14.7 * jackson-databind-javadoc-2.16.1-150200.3.18.1 * jackson-core-javadoc-2.16.1-150200.3.14.7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * SUSE Manager Proxy 4.3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * SUSE Manager Retail Branch Server 4.3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * SUSE Manager Server 4.3 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-databind-2.16.1-150200.3.18.1 * jackson-core-2.16.1-150200.3.14.7 * SUSE Enterprise Storage 7.1 (noarch) * jackson-annotations-2.16.1-150200.3.14.4 * jackson-dataformat-cbor-2.16.1-150200.3.13.6 * jackson-databind-2.16.1-150200.3.18.1 * jackson-annotations-javadoc-2.16.1-150200.3.14.4 * jackson-core-2.16.1-150200.3.14.7 * jackson-databind-javadoc-2.16.1-150200.3.18.1 * jackson-core-javadoc-2.16.1-150200.3.14.7 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 23 20:30:06 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 23 May 2024 20:30:06 -0000 Subject: SUSE-SU-2024:1771-1: important: Security update for ucode-intel Message-ID: <171649620672.28590.15545975374781428519@smelt2.prg2.suse.org> # Security update for ucode-intel Announcement ID: SUSE-SU-2024:1771-1 Rating: important References: * bsc#1224277 Cross-References: * CVE-2023-45733 * CVE-2023-45745 * CVE-2023-46103 * CVE-2023-47855 CVSS scores: * CVE-2023-45733 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2023-45745 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N * CVE-2023-46103 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-47855 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for ucode-intel fixes the following issues: Intel CPU Microcode was updated to the 20240514 release (bsc#1224277) * CVE-2023-45733: Fixed a potential security vulnerability in some Intel? Processors that may have allowed information disclosure. * CVE-2023-46103: Fixed a potential security vulnerability in Intel? Core? Ultra Processors that may have allowed denial of service. * CVE-2023-45745,CVE-2023-47855: Fixed a potential security vulnerabilities in some Intel? Trust Domain Extensions (TDX) module software that may have allowed escalation of privilege. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1771=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1771=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1771=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1771=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1771=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1771=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1771=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1771=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1771=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1771=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1771=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1771=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1771=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1771=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1771=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1771=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1771=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1771=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1771=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1771=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1771=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1771=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1771=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1771=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1771=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1771=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2024-1771=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1771=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1771=1 ## Package List: * openSUSE Leap Micro 5.3 (x86_64) * ucode-intel-20240514-150200.41.1 * openSUSE Leap Micro 5.4 (x86_64) * ucode-intel-20240514-150200.41.1 * openSUSE Leap 15.5 (x86_64) * ucode-intel-20240514-150200.41.1 * openSUSE Leap 15.6 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * ucode-intel-20240514-150200.41.1 * Basesystem Module 15-SP5 (x86_64) * ucode-intel-20240514-150200.41.1 * Basesystem Module 15-SP6 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Manager Proxy 4.3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Manager Server 4.3 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Enterprise Storage 7.1 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * ucode-intel-20240514-150200.41.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * ucode-intel-20240514-150200.41.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45733.html * https://www.suse.com/security/cve/CVE-2023-45745.html * https://www.suse.com/security/cve/CVE-2023-46103.html * https://www.suse.com/security/cve/CVE-2023-47855.html * https://bugzilla.suse.com/show_bug.cgi?id=1224277 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 24 16:30:02 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 24 May 2024 16:30:02 -0000 Subject: SUSE-RU-2024:1778-1: moderate: Recommended update for systemd-presets-branding-SLE Message-ID: <171656820220.24355.7257326108606057527@smelt2.prg2.suse.org> # Recommended update for systemd-presets-branding-SLE Announcement ID: SUSE-RU-2024:1778-1 Rating: moderate References: * jsc#PED-5024 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for systemd-presets-branding-SLE fixes the following issues: * Enable sysctl-logger (jsc#PED-5024) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1778=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1778=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1778=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1778=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1778=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1778=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1778=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1778=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1778=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1778=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1778=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1778=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1778=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1778=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1778=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1778=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1778=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Manager Proxy 4.3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Manager Server 4.3 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Enterprise Storage 7.1 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * openSUSE Leap 15.5 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * Basesystem Module 15-SP5 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * systemd-presets-branding-SLE-15.1-150100.20.14.1 ## References: * https://jira.suse.com/browse/PED-5024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 27 16:30:02 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 27 May 2024 16:30:02 -0000 Subject: SUSE-RU-2024:1791-1: moderate: Recommended update for bpftool Message-ID: <171682740247.18612.7978847775151339330@smelt2.prg2.suse.org> # Recommended update for bpftool Announcement ID: SUSE-RU-2024:1791-1 Rating: moderate References: * jsc#PED-8375 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature can now be installed. ## Description: This update for bpftool fixes the following issue: * Enable showing info for processes holding BPF map/prog/link/btf FDs (jsc#PED-8375) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1791=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1791=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1791=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1791=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1791=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1791=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1791=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1791=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1791=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Manager Proxy 4.3 (x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * bpftool-5.14.21-150400.9.7.2 * bpftool-debugsource-5.14.21-150400.9.7.2 * bpftool-debuginfo-5.14.21-150400.9.7.2 ## References: * https://jira.suse.com/browse/PED-8375 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon May 27 16:30:18 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Mon, 27 May 2024 16:30:18 -0000 Subject: SUSE-RU-2024:1786-1: moderate: Recommended update for lasso Message-ID: <171682741875.18612.10738209198750078027@smelt2.prg2.suse.org> # Recommended update for lasso Announcement ID: SUSE-RU-2024:1786-1 Rating: moderate References: * bsc#1205335 Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP5 An update that has one fix can now be installed. ## Description: This update for lasso fixes the following issues: * Fix segmentation fault causing the test suite to fail, build was failing for SLE 15 SP5 (bsc#1205335) * Patch written by Petr Gajdos, reviewed, approved and merged upstream fix- bsc-1205335 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1786=1 * SUSE Package Hub 15 15-SP5 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1786=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1786=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1786=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1786=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1786=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1786=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1786=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1786=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1786=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1786=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1786=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1786=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1786=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * python3-lasso-debuginfo-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Package Hub 15 15-SP5 (aarch64 ppc64le s390x x86_64) * python3-lasso-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * python3-lasso-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * python3-lasso-debuginfo-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * python3-lasso-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * python3-lasso-debuginfo-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * python3-lasso-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * python3-lasso-debuginfo-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Manager Proxy 4.3 (x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Manager Retail Branch Server 4.3 (x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * lasso-debugsource-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.19.4 * python3-lasso-2.6.1-150200.19.4 * python3-lasso-debuginfo-2.6.1-150200.19.4 * liblasso-devel-2.6.1-150200.19.4 * lasso-debuginfo-2.6.1-150200.19.4 * liblasso3-debuginfo-2.6.1-150200.19.4 * liblasso3-2.6.1-150200.19.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205335 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 28 16:30:07 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 28 May 2024 16:30:07 -0000 Subject: SUSE-RU-2024:1802-1: moderate: Recommended update for e2fsprogs Message-ID: <171691380793.27874.1830300097846910858@smelt2.prg2.suse.org> # Recommended update for e2fsprogs Announcement ID: SUSE-RU-2024:1802-1 Rating: moderate References: * bsc#1223596 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for e2fsprogs fixes the following issues: EA Inode handling fixes: \- ext2fs: avoid re-reading inode multiple times (bsc#1223596) \- e2fsck: fix potential out-of-bounds read in inc_ea_inode_refs() (bsc#1223596) \- e2fsck: add more checks for ea inode consistency (bsc#1223596) \- e2fsck: fix golden output of several tests (bsc#1223596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1802=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1802=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1802=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1802=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1802=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1802=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1802=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1802=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1802=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1802=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1802=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1802=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1802=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1802=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1802=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1802=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1802=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1802=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-scrub-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * openSUSE Leap 15.4 (x86_64) * libcom_err-devel-32bit-1.46.4-150400.3.6.2 * libext2fs-devel-32bit-1.46.4-150400.3.6.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libext2fs2-32bit-1.46.4-150400.3.6.2 * libext2fs2-32bit-debuginfo-1.46.4-150400.3.6.2 * openSUSE Leap 15.4 (aarch64_ilp32) * e2fsprogs-64bit-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-64bit-1.46.4-150400.3.6.2 * libext2fs2-64bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-64bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-64bit-1.46.4-150400.3.6.2 * libext2fs-devel-64bit-1.46.4-150400.3.6.2 * libcom_err-devel-64bit-1.46.4-150400.3.6.2 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-scrub-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * openSUSE Leap 15.5 (x86_64) * libcom_err-devel-32bit-1.46.4-150400.3.6.2 * libext2fs-devel-32bit-1.46.4-150400.3.6.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libext2fs2-32bit-1.46.4-150400.3.6.2 * libext2fs2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * Basesystem Module 15-SP5 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * SUSE Manager Proxy 4.3 (x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libcom_err2-1.46.4-150400.3.6.2 * e2fsprogs-debuginfo-1.46.4-150400.3.6.2 * libcom_err-devel-1.46.4-150400.3.6.2 * libext2fs-devel-1.46.4-150400.3.6.2 * libext2fs2-1.46.4-150400.3.6.2 * e2fsprogs-devel-1.46.4-150400.3.6.2 * libext2fs2-debuginfo-1.46.4-150400.3.6.2 * e2fsprogs-1.46.4-150400.3.6.2 * libcom_err2-debuginfo-1.46.4-150400.3.6.2 * libext2fs-devel-static-1.46.4-150400.3.6.2 * libcom_err-devel-static-1.46.4-150400.3.6.2 * e2fsprogs-debugsource-1.46.4-150400.3.6.2 * SUSE Manager Server 4.3 (x86_64) * e2fsprogs-32bit-debuginfo-1.46.4-150400.3.6.2 * libcom_err2-32bit-1.46.4-150400.3.6.2 * libcom_err2-32bit-debuginfo-1.46.4-150400.3.6.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue May 28 16:30:19 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Tue, 28 May 2024 16:30:19 -0000 Subject: SUSE-RU-2024:1797-1: moderate: Recommended update for ipset Message-ID: <171691381970.27874.4844004220185753763@smelt2.prg2.suse.org> # Recommended update for ipset Announcement ID: SUSE-RU-2024:1797-1 Rating: moderate References: * bsc#1223370 Affected Products: * Basesystem Module 15-SP5 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for ipset fixes the following issue: * Fix build with latest kernel (bsc#1223370) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1797=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1797=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1797=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1797=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1797=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1797=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1797=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1797=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1797=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1797=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1797=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1797=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1797=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1797=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1797=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1797=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1797=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1797=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libipset13-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Manager Proxy 4.3 (x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libipset13-7.15-150400.12.6.4 * ipset-7.15-150400.12.6.4 * libipset13-debuginfo-7.15-150400.12.6.4 * ipset-debugsource-7.15-150400.12.6.4 * ipset-debuginfo-7.15-150400.12.6.4 * ipset-devel-7.15-150400.12.6.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1223370 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 08:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 08:30:15 -0000 Subject: SUSE-SU-2024:1807-1: important: Security update for git Message-ID: <171697141589.25860.5402128287245663901@smelt2.prg2.suse.org> # Security update for git Announcement ID: SUSE-SU-2024:1807-1 Rating: important References: * bsc#1224168 * bsc#1224170 * bsc#1224171 * bsc#1224172 * bsc#1224173 Cross-References: * CVE-2024-32002 * CVE-2024-32004 * CVE-2024-32020 * CVE-2024-32021 * CVE-2024-32465 CVSS scores: * CVE-2024-32002 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-32002 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32004 ( SUSE ): 8.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2024-32020 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32021 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L * CVE-2024-32465 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves five vulnerabilities can now be installed. ## Description: This update for git fixes the following issues: * CVE-2024-32002: Fixed recursive clones on case-insensitive filesystems that support symbolic links are susceptible to case confusion (bsc#1224168). * CVE-2024-32004: Fixed arbitrary code execution during local clones (bsc#1224170). * CVE-2024-32020: Fixed file overwriting vulnerability during local clones (bsc#1224171). * CVE-2024-32021: Fixed git may create hardlinks to arbitrary user-readable files (bsc#1224172). * CVE-2024-32465: Fixed arbitrary code execution during clone operations (bsc#1224173). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1807=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1807=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1807=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1807=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1807=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1807=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1807=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1807=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1807=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1807=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1807=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1807=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1807=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1807=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1807=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1807=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1807=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * git-credential-libsecret-2.35.3-150300.10.39.1 * git-credential-libsecret-debuginfo-2.35.3-150300.10.39.1 * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-credential-gnome-keyring-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-p4-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * openSUSE Leap 15.5 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * git-debuginfo-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * git-daemon-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * Development Tools Module 15-SP5 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * git-doc-2.35.3-150300.10.39.1 * SUSE Manager Proxy 4.3 (x86_64) * git-debuginfo-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * git-debuginfo-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * git-debuginfo-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * SUSE Enterprise Storage 7.1 (noarch) * git-doc-2.35.3-150300.10.39.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * git-credential-libsecret-2.35.3-150300.10.39.1 * git-credential-libsecret-debuginfo-2.35.3-150300.10.39.1 * git-daemon-2.35.3-150300.10.39.1 * git-core-debuginfo-2.35.3-150300.10.39.1 * git-core-2.35.3-150300.10.39.1 * git-cvs-2.35.3-150300.10.39.1 * git-daemon-debuginfo-2.35.3-150300.10.39.1 * git-2.35.3-150300.10.39.1 * git-svn-2.35.3-150300.10.39.1 * gitk-2.35.3-150300.10.39.1 * git-credential-gnome-keyring-debuginfo-2.35.3-150300.10.39.1 * perl-Git-2.35.3-150300.10.39.1 * git-credential-gnome-keyring-2.35.3-150300.10.39.1 * git-email-2.35.3-150300.10.39.1 * git-arch-2.35.3-150300.10.39.1 * git-debugsource-2.35.3-150300.10.39.1 * git-gui-2.35.3-150300.10.39.1 * git-p4-2.35.3-150300.10.39.1 * git-debuginfo-2.35.3-150300.10.39.1 * git-web-2.35.3-150300.10.39.1 * openSUSE Leap 15.3 (noarch) * git-doc-2.35.3-150300.10.39.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32002.html * https://www.suse.com/security/cve/CVE-2024-32004.html * https://www.suse.com/security/cve/CVE-2024-32020.html * https://www.suse.com/security/cve/CVE-2024-32021.html * https://www.suse.com/security/cve/CVE-2024-32465.html * https://bugzilla.suse.com/show_bug.cgi?id=1224168 * https://bugzilla.suse.com/show_bug.cgi?id=1224170 * https://bugzilla.suse.com/show_bug.cgi?id=1224171 * https://bugzilla.suse.com/show_bug.cgi?id=1224172 * https://bugzilla.suse.com/show_bug.cgi?id=1224173 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:14 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:14 -0000 Subject: SUSE-RU-2024:1827-1: important: Recommended update for wicked Message-ID: <171698581495.26329.7927976429094329490@smelt2.prg2.suse.org> # Recommended update for wicked Announcement ID: SUSE-RU-2024:1827-1 Rating: important References: * bsc#1205604 * bsc#1218926 * bsc#1219108 * bsc#1224100 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has four fixes can now be installed. ## Description: This update for wicked fixes the following issues: * client: fix ifreload to pull UP ports/links again when the config of their master/lower changed (bsc#1224100) * Update to version 0.6.75: * cleanup: fix ni_fsm_state_t enum-int-mismatch warnings * cleanup: fix overflow warnings in a socket testcase on i586 * ifcheck: report new and deleted configs as changed (bsc#1218926) * man: improve ARP configuration options in the wicked-config.5 * bond: add ports when master is UP to avoid port MTU revert (bsc#1219108) * cleanup: fix interface dependencies and shutdown order (bsc#1205604) * Remove port arrays from bond,team,bridge,ovs-bridge (redundant) and consistently use config and state info attached to the port interface as in rtnetlink(7). * Cleanup ifcfg parsing, schema configuration and service properties * Migrate ports in xml config and policies already applied in nanny * Remove "missed config" generation from finite state machine, which is completed while parsing the config or while xml config migration. * Issue a warning when "lower" interface (e.g. eth0) config is missed while parsing config depending on it (e.g. eth0.42 vlan). * Resolve ovs master to the effective bridge in config and wickedd * Implement netif-check-state require checks using system relations from wickedd/kernel instead of config relations for ifdown and add linkDown and deleteDevice checks to all master and lower references. * Add a `wicked <ifup|ifdown|ifreload> --dry-run ?` option to show the system/config interface hierarchies as notice with +/- marked interfaces to setup and/or shutdown. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1827=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1827=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1827=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1827=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2024-1827=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1827=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1827=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1827=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1827=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1827=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1827=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1827=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1827=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1827=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1827=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Manager Proxy 4.3 (x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * wicked-service-0.6.75-150400.3.24.1 * wicked-debugsource-0.6.75-150400.3.24.1 * wicked-0.6.75-150400.3.24.1 * wicked-debuginfo-0.6.75-150400.3.24.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205604 * https://bugzilla.suse.com/show_bug.cgi?id=1218926 * https://bugzilla.suse.com/show_bug.cgi?id=1219108 * https://bugzilla.suse.com/show_bug.cgi?id=1224100 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:21 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:21 -0000 Subject: SUSE-RU-2024:1821-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <171698582171.26329.16447547367110191836@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1821-1 Rating: moderate References: * bsc#1222277 * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.6-0 * Update translations uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 zypper in -t patch SUSE-EL-9-CLIENT-TOOLS-BETA-2024-1821=1 ## Package List: * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 (aarch64 ppc64le s390x x86_64) * mgrctl-0.1.9-3.11.2 * SUSE Manager Client Tools Beta for RHEL, Liberty and Clones 9 (noarch) * spacecmd-5.0.6-4.12.2 * mgrctl-bash-completion-0.1.9-3.11.2 * mgrctl-zsh-completion-0.1.9-3.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:24 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:24 -0000 Subject: SUSE-RU-2024:1820-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <171698582484.26329.11985941895589539490@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1820-1 Rating: moderate References: * bsc#1222277 * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.6-0 * Update translations uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 zypper in -t patch SUSE-Ubuntu-20.04-CLIENT-TOOLS-BETA-2024-1820=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (all) * mgrctl-bash-completion-0.1.9-2.11.6 * mgrctl-fish-completion-0.1.9-2.11.6 * mgrctl-zsh-completion-0.1.9-2.11.6 * spacecmd-5.0.6-2.45.7 * SUSE Manager Client Tools Beta for Ubuntu 20.04 2004 (amd64) * mgrctl-0.1.9-2.11.6 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:26 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:26 -0000 Subject: SUSE-RU-2024:1819-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <171698582615.26329.10826402203294305664@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1819-1 Rating: moderate References: * bsc#1222277 * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.6-0 * Update translations uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 zypper in -t patch SUSE-Ubuntu-22.04-CLIENT-TOOLS-BETA-2024-1819=1 ## Package List: * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 (all) * mgrctl-zsh-completion-0.1.9-2.11.4 * mgrctl-bash-completion-0.1.9-2.11.4 * spacecmd-5.0.6-2.15.4 * mgrctl-fish-completion-0.1.9-2.11.4 * SUSE Manager Client Tools Beta for Ubuntu 22.04 2204 (amd64) * mgrctl-0.1.9-2.11.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:27 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:27 -0000 Subject: SUSE-RU-2024:1818-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <171698582739.26329.4727279928548033844@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1818-1 Rating: moderate References: * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Debian 11 An update that contains one feature can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.6-0 * Update translations ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Debian 11 zypper in -t patch SUSE-Debian-11-CLIENT-TOOLS-BETA-2024-1818=1 ## Package List: * SUSE Manager Client Tools Beta for Debian 11 (all) * spacecmd-5.0.6-2.22.2 ## References: * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:29 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:29 -0000 Subject: SUSE-RU-2024:1817-1: moderate: Recommended Beta update for SUSE Manager Client Tools Message-ID: <171698582976.26329.12083641896085918812@smelt2.prg2.suse.org> # Recommended Beta update for SUSE Manager Client Tools Announcement ID: SUSE-RU-2024:1817-1 Rating: moderate References: * bsc#1222277 * jsc#MSQA-775 Affected Products: * SUSE Manager Client Tools Beta for Debian 12 An update that contains one feature and has one fix can now be installed. ## Description: This update fixes the following issues: spacecmd: * Version 5.0.6-0 * Update translations uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for Debian 12 zypper in -t patch SUSE-Debian-12-CLIENT-TOOLS-BETA-2024-1817=1 ## Package List: * SUSE Manager Client Tools Beta for Debian 12 (all) * spacecmd-5.0.6-3.12.2 * mgrctl-bash-completion-0.1.9-2.11.2 * mgrctl-fish-completion-0.1.9-2.11.2 * mgrctl-zsh-completion-0.1.9-2.11.2 * SUSE Manager Client Tools Beta for Debian 12 (amd64) * mgrctl-0.1.9-2.11.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:35 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:35 -0000 Subject: SUSE-SU-2024:1815-1: moderate: Security Beta update for SUSE Manager Client Tools Message-ID: <171698583543.26329.3540471312522203105@smelt2.prg2.suse.org> # Security Beta update for SUSE Manager Client Tools Announcement ID: SUSE-SU-2024:1815-1 Rating: moderate References: * bsc#1221465 * bsc#1222155 * bsc#1222277 * bsc#1222731 * jsc#MSQA-775 Cross-References: * CVE-2024-1313 CVSS scores: * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise Desktop 12 * SUSE Linux Enterprise Desktop 12 SP1 * SUSE Linux Enterprise Desktop 12 SP2 * SUSE Linux Enterprise Desktop 12 SP3 * SUSE Linux Enterprise Desktop 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 * SUSE Manager Client Tools Beta for SLE 12 An update that solves one vulnerability, contains one feature and has three security fixes can now be installed. ## Description: This update fixes the following issues: grafana: * Packaging improvements: * Changed deprecated `disabled` service mode to `manual` * Drop golang-packaging macros * Drop explicit mod=vendor as it is enabled automatically * Update to version 9.5.18: * [SECURITY] CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155) * Update to version 9.5.17: * [FEATURE] Alerting: Backport use Alertmanager API v2 mgr-push: * Version 5.0.2-0 * Remove unused code from the traditional stack * Use bundle CA certificate in rhnpush (bsc#1222731) spacecmd: * Version 5.0.6-0 * Update translations uyuni-common-libs: * Version 5.0.3-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for SLE 12 zypper in -t patch SUSE-SLE-Manager-Tools-12-BETA-2024-1815=1 ## Package List: * SUSE Manager Client Tools Beta for SLE 12 (aarch64 ppc64le s390x x86_64) * grafana-9.5.18-4.30.4 * python2-uyuni-common-libs-5.0.3-3.39.3 * mgrctl-0.1.9-3.11.4 * SUSE Manager Client Tools Beta for SLE 12 (noarch) * mgr-push-5.0.2-4.24.5 * spacecmd-5.0.6-41.51.3 * mgrctl-bash-completion-0.1.9-3.11.4 * mgrctl-lang-0.1.9-3.11.4 * python2-mgr-push-5.0.2-4.24.5 * mgrctl-zsh-completion-0.1.9-3.11.4 ## References: * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://bugzilla.suse.com/show_bug.cgi?id=1222731 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed May 29 12:30:38 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Wed, 29 May 2024 12:30:38 -0000 Subject: SUSE-SU-2024:1814-1: moderate: Security Beta update for SUSE Manager Client Tools and Salt Message-ID: <171698583875.26329.3797518223731499760@smelt2.prg2.suse.org> # Security Beta update for SUSE Manager Client Tools and Salt Announcement ID: SUSE-SU-2024:1814-1 Rating: moderate References: * bsc#1221465 * bsc#1222155 * bsc#1222277 * bsc#1222731 * jsc#MSQA-775 Cross-References: * CVE-2024-1313 CVSS scores: * CVE-2024-1313 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 * SUSE Linux Enterprise Desktop 15 SP1 * SUSE Linux Enterprise Desktop 15 SP2 * SUSE Linux Enterprise Desktop 15 SP3 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP1 * SUSE Linux Enterprise Real Time 15 SP2 * SUSE Linux Enterprise Real Time 15 SP3 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 * SUSE Linux Enterprise Server 15 SP1 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 * SUSE Linux Enterprise Server for SAP Applications 15 SP1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Client Tools Beta for SLE 15 * SUSE Manager Client Tools Beta for SLE Micro 5 An update that solves one vulnerability, contains one feature and has three security fixes can now be installed. ## Description: This update fixes the following issues: golang-github-prometheus-node_exporter: * Add `device_error` label for filesystem metrics. * Update rtnetlink library to fix errors during ARP metrics collection. * update to 1.7.0 (jsc#PED-7893, jsc#PED-7928): * [FEATURE] Add ZFS freebsd per dataset stats #2753 * [FEATURE] Add cpu vulnerabilities reporting from sysfs #2721 * [ENHANCEMENT] Parallelize stat calls in Linux filesystem collector #1772 * [ENHANCEMENT] Add missing linkspeeds to ethtool collector #2711 * [ENHANCEMENT] Add CPU MHz as the value for node_cpu_info metric #2778 * [ENHANCEMENT] Improve qdisc collector performance #2779 * [ENHANCEMENT] Add include and exclude filter for hwmon collector #2699 * [ENHANCEMENT] Optionally fetch ARP stats via rtnetlink instead of procfs #2777 * [BUGFIX] Fallback to 32-bit stats in netdev #2757 * [BUGFIX] Close btrfs.FS handle after use #2780 * [BUGFIX] Move RO status before error return #2807 * [BUFFIX] Fix promhttp_metric_handler_errors_total being always active #2808 * [BUGFIX] Fix nfsd v4 index miss #2824 * update to 1.6.1: * Rebuild with updated Go version, no source code changes in this release. * update to 1.6.0: * [CHANGE] Fix cpustat when some cpus are offline #2318 * [CHANGE] Remove metrics of offline CPUs in CPU collector #2605 * [CHANGE] Deprecate ntp collector #2603 * [CHANGE] Remove bcache `cache_readaheads_totals` metrics #2583 * [CHANGE] Deprecate supervisord collector #2685 * [FEATURE] Add softirqs collector #2669 * [ENHANCEMENT] Add suspended as a `node_zfs_zpool_state` #2449 * [ENHANCEMENT] Add administrative state of Linux network interfaces #2515 * [ENHANCEMENT] Log current value of GOMAXPROCS #2537 * [ENHANCEMENT] Add profiler options for perf collector #2542 * [ENHANCEMENT] Allow root path as metrics path #2590 * [ENHANCEMENT] Add cpu frequency governor metrics #2569 * [ENHANCEMENT] Add new landing page #2622 * [ENHANCEMENT] Reduce privileges needed for btrfs device stats #2634 * [ENHANCEMENT] Add ZFS `memory_available_bytes` #2687 * [ENHANCEMENT] Use `SCSI_IDENT_SERIAL` as serial in diskstats #2612 * [ENHANCEMENT] Read missing from netlink netclass attributes from sysfs #2669 * [BUGFIX] perf: fixes for automatically detecting the correct tracefs mountpoints #2553 * [BUGFIX] Fix `thermal_zone` collector noise #2554 * [BUGFIX] interrupts: Fix fields on linux aarch64 #2631 * [BUGFIX] Remove metrics of offline CPUs in CPU collector #2605 grafana: * Packaging improvements: * Changed deprecated `disabled` service mode to `manual` * Drop golang-packaging macros * Drop explicit mod=vendor as it is enabled automatically * Update to version 9.5.18: * [SECURITY] CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155) * Update to version 9.5.17: * [FEATURE] Alerting: Backport use Alertmanager API v2 mgr-push: * Version 5.0.2-0 * Remove unused code from the traditional stack * Use bundle CA certificate in rhnpush (bsc#1222731) spacecmd: * Version 5.0.6-0 * Update translations uyuni-common-libs: * Version 5.0.3-0 * Add support for package signature type V4 RSA/SHA384 * Add support for package signature type V4 RSA/SHA512 (bsc#1221465) uyuni-tools: * Version 0.1.9-0 * Redact passwords from the API payload in traces * Fix build on Ubuntu 20.04 due to version change * Version 0.1.8-0 * Add 'mgradm support sql' command * Improve GPG help * podman-mount* flag should be used only on Server installation and migration * Add flag groups in help text * Attach Proxy pod to our Podman network * Create support ptf commands * Create mgrpxy upgrade command * Add domain for internal container network * Stop the Server if first user creation failed * Add localization support * Require Podman 4.5.0 for its --shm-size-systemd parameter * Add --podman-mount-www flag for install and migration * Only colorize output if outputting to a terminal * Fix output missing newlines due to the spinner * Add product version and commit id to the version output * Add missing whitespace between podman common arguments and additional ones * Bump the push tag to 5.0.0-RC * Add gpg command to mgradm * Hide message in stdout if SCCcredentials is missing (bsc#1222277) * Redact password in stdout and uyuni-tools.log * Rework distribution mapping to work with distros without .treeinfo data * Add initial installation support for Confidental Computing attestation container * Allow PAM and LDAP authentication using SSSD * Change pull policy default to Always during upgrade * Allow migration with non-root user on source server ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Client Tools Beta for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-Beta-For-Micro-5-2024-1814=1 * SUSE Manager Client Tools Beta for SLE 15 zypper in -t patch SUSE-SLE-Manager-Tools-15-BETA-2024-1814=1 ## Package List: * SUSE Manager Client Tools Beta for SLE Micro 5 (aarch64 s390x x86_64) * golang-github-prometheus-node_exporter-1.7.0-159000.6.5.5 * mgrctl-0.1.9-159000.3.11.5 * SUSE Manager Client Tools Beta for SLE Micro 5 (noarch) * mgrctl-bash-completion-0.1.9-159000.3.11.5 * mgrctl-zsh-completion-0.1.9-159000.3.11.5 * mgrctl-lang-0.1.9-159000.3.11.5 * SUSE Manager Client Tools Beta for SLE 15 (aarch64 ppc64le s390x x86_64) * python3-uyuni-common-libs-5.0.3-159000.3.39.3 * mgrctl-0.1.9-159000.3.11.5 * grafana-debuginfo-9.5.18-159000.4.33.4 * grafana-9.5.18-159000.4.33.4 * SUSE Manager Client Tools Beta for SLE 15 (noarch) * python3-mgr-push-5.0.2-159000.4.24.5 * mgrctl-lang-0.1.9-159000.3.11.5 * mgrctl-bash-completion-0.1.9-159000.3.11.5 * spacecmd-5.0.6-159000.6.51.4 * mgrctl-zsh-completion-0.1.9-159000.3.11.5 * mgr-push-5.0.2-159000.4.24.5 ## References: * https://www.suse.com/security/cve/CVE-2024-1313.html * https://bugzilla.suse.com/show_bug.cgi?id=1221465 * https://bugzilla.suse.com/show_bug.cgi?id=1222155 * https://bugzilla.suse.com/show_bug.cgi?id=1222277 * https://bugzilla.suse.com/show_bug.cgi?id=1222731 * https://jira.suse.com/browse/MSQA-775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 30 12:30:04 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 30 May 2024 12:30:04 -0000 Subject: SUSE-RU-2024:1851-1: low: Recommended update for dwz Message-ID: <171707220499.3435.8921825089124052687@smelt2.prg2.suse.org> # Recommended update for dwz Announcement ID: SUSE-RU-2024:1851-1 Rating: low References: * bsc#1221634 Affected Products: * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 Module 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 An update that has one fix can now be installed. ## Description: This update for dwz fixes the following issues: * Clean up leftover temporary file (bsc#1221634) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1851=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1851=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1851=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1851=1 * SUSE Manager Proxy 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2024-1851=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1851=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 * SUSE Manager Proxy 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 * SUSE Manager Server 4.3 Module 4.3 (aarch64 ppc64le s390x x86_64) * dwz-debugsource-0.12-150000.3.8.1 * dwz-0.12-150000.3.8.1 * dwz-debuginfo-0.12-150000.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221634 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu May 30 12:30:11 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Thu, 30 May 2024 12:30:11 -0000 Subject: SUSE-RU-2024:1849-1: moderate: Recommended update for desktop-data-SLE Message-ID: <171707221102.3435.5090460220923757771@smelt2.prg2.suse.org> # Recommended update for desktop-data-SLE Announcement ID: SUSE-RU-2024:1849-1 Rating: moderate References: * bsc#1222146 Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP5 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for desktop-data-SLE fixes the following issue: * Fix typo in the desktop files for some of the wallpapers (bsc#1222146) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1849=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1849=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1849=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1849=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1849=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1849=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1849=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1849=1 * SUSE Linux Enterprise Workstation Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-WE-15-SP5-2024-1849=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2024-1849=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1849=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1849=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1849=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1849=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1849=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1849=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1849=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1849=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1849=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1849=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Manager Proxy 4.3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Manager Retail Branch Server 4.3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Manager Server 4.3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Workstation Extension 15 SP5 (noarch) * desktop-data-SLE-extra-15-150000.4.3.11 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * desktop-data-SLE-extra-15-150000.4.3.11 * SUSE Enterprise Storage 7.1 (noarch) * desktop-data-SLE-15-150000.4.3.11 * openSUSE Leap 15.5 (noarch) * desktop-data-SLE-extra-15-150000.4.3.11 * desktop-data-SLE-15-150000.4.3.11 * openSUSE Leap 15.6 (noarch) * desktop-data-SLE-extra-15-150000.4.3.11 * desktop-data-SLE-15-150000.4.3.11 * Basesystem Module 15-SP5 (noarch) * desktop-data-SLE-15-150000.4.3.11 * Basesystem Module 15-SP6 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * desktop-data-SLE-extra-15-150000.4.3.11 * desktop-data-SLE-15-150000.4.3.11 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * desktop-data-SLE-15-150000.4.3.11 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1222146 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 31 08:30:15 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 31 May 2024 08:30:15 -0000 Subject: SUSE-RU-2024:1876-1: moderate: Recommended update for aaa_base Message-ID: <171714421572.22822.14001888423465226784@smelt2.prg2.suse.org> # Recommended update for aaa_base Announcement ID: SUSE-RU-2024:1876-1 Rating: moderate References: * bsc#1221361 Affected Products: * Basesystem Module 15-SP5 * Development Tools Module 15-SP5 * openSUSE Leap 15.3 * openSUSE Leap 15.5 * openSUSE Leap Micro 5.3 * openSUSE Leap Micro 5.4 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for aaa_base fixes the following issues: * Fix the typo to set JAVA_BINDIR in the csh variant of the alljava profile script (bsc#1221361) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2024-1876=1 * openSUSE Leap Micro 5.3 zypper in -t patch openSUSE-Leap-Micro-5.3-2024-1876=1 * openSUSE Leap Micro 5.4 zypper in -t patch openSUSE-Leap-Micro-5.4-2024-1876=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1876=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1876=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-1876=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1876=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-1876=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-1876=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1876=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1876=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1876=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1876=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1876=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1876=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1876=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1876=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1876=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1876=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1876=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1876=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1876=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1876=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1876=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2024-1876=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.20.1 * openSUSE Leap Micro 5.3 (aarch64 x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * openSUSE Leap Micro 5.4 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-wsl-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * Basesystem Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * Development Tools Module 15-SP5 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Manager Proxy 4.3 (x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * aaa_base-extras-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-malloccheck-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * aaa_base-debuginfo-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-84.87+git20180409.04c9dae-150300.10.20.1 * aaa_base-debugsource-84.87+git20180409.04c9dae-150300.10.20.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1221361 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 31 08:30:21 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 31 May 2024 08:30:21 -0000 Subject: SUSE-SU-2024:1874-1: important: Security update for Java Message-ID: <171714422147.22822.1890019926364381092@smelt2.prg2.suse.org> # Security update for Java Announcement ID: SUSE-SU-2024:1874-1 Rating: important References: * bsc#1187446 * bsc#1224410 Cross-References: * CVE-2021-33813 CVSS scores: * CVE-2021-33813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-33813 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP5 * Basesystem Module 15-SP6 * Development Tools Module 15-SP5 * Development Tools Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module 4.3 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for Java fixes thefollowing issues: apiguardian was updated to vesion 1.1.2: * Added LICENSE/NOTICE to the generated jar * Allow @API to be declared at the package level * Explain usage of Status.DEPRECATED * Include OSGi metadata in manifest assertj-core was implemented at version 3.25.3: * New package implementation needed by Junit5 byte-buddy was updated to version v1.14.16: * `byte-buddy` is required by `assertj-core` * Changes in version v1.14.16: * Update ASM and introduce support for Java 23. * Changes in version v1.14.15: * Allow attaching from root on J9. * Changes of v1.14.14: * Adjust type validation to accept additional names that are legal in the class file format. * Fix dynamic attach on Windows when a service user is active. * Avoid failure when using Android's strict mode. dom4j was updated to version 2.1.4: * Improvements and potentially breaking changes: * Added new factory method org.dom4j.io.SAXReader.createDefault(). It has more secure defaults than new SAXReader(), which uses system XMLReaderFactory.createXMLReader() or SAXParserFactory.newInstance().newSAXParser(). * If you use some optional dependency of dom4j (for example Jaxen, xsdlib etc.), you need to specify an explicit dependency on it in your project. They are no longer marked as a mandatory transitive dependency by dom4j. * Following SAX parser features are disabled by default in DocumentHelper.parse() for security reasons (they were enabled in previous versions): * http://xml.org/sax/properties/external-general-entities * http://xml.org/sax/properties/external-parameter-entities * Other changes: * Do not depend on jtidy, since it is not used during build * Fixed license to Plexus * JPMS: Add the Automatic-Module-Name attribute to the manifest. * Make a separate flavour for a minimal `dom4j-bootstrap` package used to build `jaxen` and full `dom4j` * Updated pull-parser version * Reuse the writeAttribute method in writeAttributes * Support build on OS with non-UTF8 as default charset * Gradle: add an automatic module name * Use Correct License Name "Plexus" * Possible vulnerability of DocumentHelper.parseText() to XML injection * CVS directories left in the source tree * XMLWriter does not escape supplementary unicode characters correctly * writer.writeOpen(x) doesn't write namespaces * Fixed concurrency problem with QNameCache * All dependencies are optional * SAXReader: hardcoded namespace features * Validate QNames * StringIndexOutOfBoundsException in XMLWriter.writeElementContent() * TreeNode has grown some generics * QName serialization fix * DocumentException initialize with nested exception * Accidentally occurring error in a multi-threaded test * Added compatibility with W3C DOM Level 3 * Use Java generics hamcrest: * `hamcrest-core` has been replaced by `hamcrest` (no source changes) junit had the following change: * Require hamcrest >= 2.2 junit5 was updated to version 5.10.2: * Conditional execution based on OS architectures * Configurable cleanup mode for @TempDir * Configurable thread mode for @Timeout * Custom class loader support for class/method selectors, @MethodSource, @EnabledIf, and @DisabledIf * Dry-run mode for test execution * Failure threshold for @RepeatedTest * Fixed build with the latest open-test-reporting milestone * Fixed dependencies in module-info.java files * Fixed unreported exception error that is fatal with JDK 21 * Improved configurability of parallel execution * New @SelectMethod support in test @Suite classes. * New ConsoleLauncher subcommand for test discovery without execution * New convenience base classes for implementing ArgumentsProvider and ArgumentConverter * New IterationSelector * New LauncherInterceptor SPI * New NamespacedHierarchicalStore for use in third-party test engines * New TempDirFactory SPI for customizing how temporary directories are created * New testfeed details mode for ConsoleLauncher * New TestInstancePreConstructCallback extension API * Numerous bug fixes and minor improvements * Parameter injection for @MethodSource methods * Promotion of various experimental APIs to stable * Reusable parameter resolution for custom extension methods via ExecutableInvoker * Stacktrace pruning to hide internal JUnit calls * The binaries are compatible with java 1.8 * Various improvements to ConsoleLauncher * XML reports in new Open Test Reporting format jdom: * Security issues fixed: * CVE-2021-33813: Fixed an XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request (bsc#1187446) * Other changes and bugs fixed: * Fixed wrong entries in changelog (bsc#1224410) * The packages `jaxen`, `saxpath` and `xom` are now separate standalone packages instead of being part of `jdom` jaxen was implemented at version 2.0.0: * New standalone RPM package implementation, originally part of `jdom` source package * Classpaths are much smaller and less complex, and will suppress a lot of noise from static analysis tools. * The Jaxen core code is also a little smaller and has fixed a few minor bugs in XPath evaluation * Despite the major version bump, this should be a drop in replacement for almost every project. The two major possible incompatibilities are: * The minimum supported Java version is now 1.5, up from 1.4 in 1.2.0 and 1.3 in 1.1.6. * dom4j, XOM, and JDOM are now optional dependencies so if a project was depending on them to be loaded transitively it will need to add explicit dependencies to build. jopt-simple: * Included jopt-simple to Package Hub 15 SP5 (no source changes) objectweb-asm was updated to version 9.7: * New Opcodes.V23 constant for Java 23 * Bugs fixed * Fixed unit test regression in dex2jar. * Fixed 'ClassNode#outerClass' with incorrect JavaDocs. * asm-bom packaging should be 'pom'. * The Textifier prints a supplementary space at the end of each method that throws at least one exception. open-test-reporting: * Included `open-test-reporting-events` and `open-test-reporting-schema` to the channels as they are runtime dependencies of Junit5 (no source changes) saxpath was implemented at version 1.0 FCS: * New standalone RPM package implementation, originally part of `jdom` source package (openSUSE Leap 15.5 package only) xom was implemented at version 1.3.9: * New standalone RPM package implementation, originally part of `jdom` source package * The Nodes and Elements classes are iterable so you can use the enhanced for loop syntax on instances of these classes. * The copy() method is now covariant. * Adds Automatic-Moduole-Name to jar * Remove direct dependency on xml-apis:xml-apis artifact since these classes are now available in the core runtime. * Eliminate usage of com.sun classes to make XOM compatible with JDK 16. * Replace remaining usages of StringBuffer with StringBuilder to slightly improve performance. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1874=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1874=1 * Basesystem Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP5-2024-1874=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-1874=1 * Development Tools Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP5-2024-1874=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2024-1874=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-1874=1 * SUSE Manager Server 4.3 Module 4.3 zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2024-1874=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1874=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1874=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1874=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1874=1 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1874=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1874=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1874=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1874=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1874=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1874=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1874=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1874=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1874=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1874=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1874=1 ## Package List: * openSUSE Leap 15.5 (noarch) * junit5-minimal-5.10.2-150200.3.10.2 * jopt-simple-javadoc-5.0.4-150200.3.4.3 * junit5-guide-5.10.2-150200.3.10.3 * apiguardian-javadoc-1.1.2-150200.3.10.2 * junit5-5.10.2-150200.3.10.3 * junit5-javadoc-5.10.2-150200.3.10.3 * jopt-simple-5.0.4-150200.3.4.3 * dom4j-demo-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * junit-manual-4.13.2-150200.3.15.2 * byte-buddy-1.14.16-150200.5.7.1 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * objectweb-asm-javadoc-9.7-150200.3.15.2 * saxpath-1.0-150200.5.3.3 * apiguardian-1.1.2-150200.3.10.2 * jaxen-2.0.0-150200.5.3.1 * open-test-reporting-events-0.1.0~M2-150200.5.7.2 * dom4j-2.1.4-150200.12.10.2 * hamcrest-2.2-150200.12.17.2 * assertj-core-3.25.3-150200.5.4.3 * junit5-bom-5.10.2-150200.3.10.3 * junit-4.13.2-150200.3.15.2 * dom4j-javadoc-2.1.4-150200.12.10.2 * open-test-reporting-schema-0.1.0~M2-150200.5.7.2 * junit-javadoc-4.13.2-150200.3.15.2 * hamcrest-javadoc-2.2-150200.12.17.2 * openSUSE Leap 15.6 (noarch) * junit5-minimal-5.10.2-150200.3.10.2 * jopt-simple-javadoc-5.0.4-150200.3.4.3 * junit5-guide-5.10.2-150200.3.10.3 * apiguardian-javadoc-1.1.2-150200.3.10.2 * junit5-5.10.2-150200.3.10.3 * junit5-javadoc-5.10.2-150200.3.10.3 * jopt-simple-5.0.4-150200.3.4.3 * dom4j-demo-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * junit-manual-4.13.2-150200.3.15.2 * byte-buddy-1.14.16-150200.5.7.1 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * objectweb-asm-javadoc-9.7-150200.3.15.2 * saxpath-1.0-150200.5.3.3 * apiguardian-1.1.2-150200.3.10.2 * jaxen-2.0.0-150200.5.3.1 * open-test-reporting-events-0.1.0~M2-150200.5.7.2 * dom4j-2.1.4-150200.12.10.2 * hamcrest-2.2-150200.12.17.2 * assertj-core-3.25.3-150200.5.4.3 * junit5-bom-5.10.2-150200.3.10.3 * junit-4.13.2-150200.3.15.2 * dom4j-javadoc-2.1.4-150200.12.10.2 * open-test-reporting-schema-0.1.0~M2-150200.5.7.2 * junit-javadoc-4.13.2-150200.3.15.2 * hamcrest-javadoc-2.2-150200.12.17.2 * Basesystem Module 15-SP5 (noarch) * objectweb-asm-9.7-150200.3.15.2 * Basesystem Module 15-SP6 (noarch) * objectweb-asm-9.7-150200.3.15.2 * Development Tools Module 15-SP5 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * Development Tools Module 15-SP6 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Package Hub 15 15-SP6 (noarch) * apiguardian-1.1.2-150200.3.10.2 * assertj-core-3.25.3-150200.5.4.3 * open-test-reporting-events-0.1.0~M2-150200.5.7.2 * junit5-minimal-5.10.2-150200.3.10.2 * byte-buddy-1.14.16-150200.5.7.1 * open-test-reporting-schema-0.1.0~M2-150200.5.7.2 * junit5-5.10.2-150200.3.10.3 * jopt-simple-5.0.4-150200.3.4.3 * SUSE Manager Server 4.3 Module 4.3 (noarch) * jaxen-2.0.0-150200.5.3.1 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 * SUSE Manager Proxy 4.3 (noarch) * objectweb-asm-9.7-150200.3.15.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * objectweb-asm-9.7-150200.3.15.2 * SUSE Manager Server 4.3 (noarch) * objectweb-asm-9.7-150200.3.15.2 * SUSE Enterprise Storage 7.1 (noarch) * jaxen-2.0.0-150200.5.3.1 * hamcrest-2.2-150200.12.17.2 * junit-4.13.2-150200.3.15.2 * jdom-1.1.3-150200.12.8.2 * objectweb-asm-9.7-150200.3.15.2 * dom4j-2.1.4-150200.12.10.2 * xom-1.3.9-150200.5.3.3 ## References: * https://www.suse.com/security/cve/CVE-2021-33813.html * https://bugzilla.suse.com/show_bug.cgi?id=1187446 * https://bugzilla.suse.com/show_bug.cgi?id=1224410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri May 31 12:30:03 2024 From: null at suse.de (SUSE-MANAGER-UPDATES) Date: Fri, 31 May 2024 12:30:03 -0000 Subject: SUSE-RU-2024:1885-1: moderate: Recommended update for dhcp-tools Message-ID: <171715860392.29929.17935994883487955962@smelt2.prg2.suse.org> # Recommended update for dhcp-tools Announcement ID: SUSE-RU-2024:1885-1 Rating: moderate References: Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that can now be installed. ## Description: This update for dhcp-tools fixes the following issues: * Fixed license to BSD 2-Clause License ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-1885=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-1885=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1885=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1885=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1885=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1885=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1885=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1885=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1885=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1885=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1885=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1885=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1885=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-1885=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1885=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-1885=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-1885=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-1885=1 ## Package List: * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Manager Proxy 4.3 (x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * dhcp-tools-debugsource-1.6-150000.3.3.2 * dhcp-tools-1.6-150000.3.3.2 * dhcp-tools-debuginfo-1.6-150000.3.3.2 -------------- next part -------------- An HTML attachment was scrubbed... URL: