SUSE-SLE-Module-Server-Applications-15-SP4-2022-2706
Recommended update for postgresql
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql fixes the following issues:
- Fix the pg_server_requires macro on older rpm versions (SLE-12)
- Avoid a dependency on awk in postgresql-script.
- Move the dependency of llvmjit-devel on clang and llvm to the
implementation packages where we can depend on the correct
versions.
- Fix postgresql_has_llvm usage
- First round of changes to make it easier to build extensions for
- add postgresql-llvmjit-devel subpackage:
This package will pull in clang and llvm if the distro has a
recent enough version, otherwise it will just pull
postgresql-server-devel.
- add postgresql macros to the postgresql-server-devel package
those cover all the variables from pg_config and some macros
to remove repitition from the spec files
- Bump version to 14. (bsc#1195680)
postgresql-14-150400.4.3.88.src.rpm
postgresql-contrib-14-150400.4.3.88.noarch.rpm
postgresql-devel-14-150400.4.3.88.noarch.rpm
postgresql-docs-14-150400.4.3.88.noarch.rpm
postgresql-plperl-14-150400.4.3.88.noarch.rpm
postgresql-plpython-14-150400.4.3.88.noarch.rpm
postgresql-pltcl-14-150400.4.3.88.noarch.rpm
postgresql-server-14-150400.4.3.88.noarch.rpm
postgresql-server-devel-14-150400.4.3.88.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2561
Security update for mariadb
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
- Added mariadb-galera (jsc#SLE-22245)
Update to 10.6.8 (bsc#1199928):
- CVE-2021-46669 (bsc#1199928)
- CVE-2022-27376 (bsc#1198628)
- CVE-2022-27377 (bsc#1198603)
- CVE-2022-27378 (bsc#1198604)
- CVE-2022-27379 (bsc#1198605)
- CVE-2022-27380 (bsc#1198606)
- CVE-2022-27381 (bsc#1198607)
- CVE-2022-27382 (bsc#1198609)
- CVE-2022-27383 (bsc#1198610)
- CVE-2022-27384 (bsc#1198611)
- CVE-2022-27386 (bsc#1198612)
- CVE-2022-27387 (bsc#1198613)
- CVE-2022-27444 (bsc#1198634)
- CVE-2022-27445 (bsc#1198629)
- CVE-2022-27446 (bsc#1198630)
- CVE-2022-27447 (bsc#1198631)
- CVE-2022-27448 (bsc#1198632)
- CVE-2022-27449 (bsc#1198633)
- CVE-2022-27451 (bsc#1198639)
- CVE-2022-27452 (bsc#1198640)
- CVE-2022-27455 (bsc#1198638)
- CVE-2022-27456 (bsc#1198635)
- CVE-2022-27457 (bsc#1198636)
- CVE-2022-27458 (bsc#1198637)
- The following issue is not affecting this package: CVE-2022-21427
Update to 10.6.7 (bsc#1196016):
- CVE-2021-46665, CVE-2021-46664, CVE-2021-46661, CVE-2021-46668, CVE-2021-46663
Update to 10.6.6:
- CVE-2022-24052, CVE-2022-24051, CVE-2022-24050, CVE-2022-24048, CVE-2021-46659 (bsc#1195339)
The following issues have been fixed already but didn't have CVE references:
- CVE-2021-46658 (bsc#1195334)
- CVE-2021-46657 (bsc#1195325)
Non security fixes:
- Skip failing tests for s390x, fixes bsc#1195076
External refernences:
- https://mariadb.com/kb/en/library/mariadb-1068-release-notes
- https://mariadb.com/kb/en/library/mariadb-1068-changelog
- https://mariadb.com/kb/en/library/mariadb-1067-release-notes
- https://mariadb.com/kb/en/library/mariadb-1067-changelog
- https://mariadb.com/kb/en/library/mariadb-1066-release-notes
- https://mariadb.com/kb/en/library/mariadb-1066-changelog
libmariadbd-devel-10.6.8-150400.3.7.1.x86_64.rpm
libmariadbd19-10.6.8-150400.3.7.1.x86_64.rpm
mariadb-10.6.8-150400.3.7.1.src.rpm
mariadb-10.6.8-150400.3.7.1.x86_64.rpm
mariadb-client-10.6.8-150400.3.7.1.x86_64.rpm
mariadb-errormessages-10.6.8-150400.3.7.1.noarch.rpm
mariadb-tools-10.6.8-150400.3.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2849
Recommended update for at
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for at fixes the following issues:
- Fixes an issue when an error "Read-only file system" appears when writing to '/dev/kmsg'. (bsc#1196219)
at-3.2.2-150400.4.3.10.src.rpm
at-3.2.2-150400.4.3.10.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-215
Security update for apache2-mod_auth_openidc
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_auth_openidc fixes the following issues:
- CVE-2022-23527: Fixed open redirect in oidc_validate_redirect_url() using tab character (bsc#1206441).
- CVE-2021-39191: Fixed open redirect issue in target_link_uri parameter (bsc#1190223).
apache2-mod_auth_openidc-2.3.8-150100.3.22.1.src.rpm
apache2-mod_auth_openidc-2.3.8-150100.3.22.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1875
Recommended update for grpc
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grpc fixes the following issues:
- grpc won't compile on SP4(bsc#1197726)
- Add conditional to build without python2 if needed
grpc-1.25.0-150200.3.5.1.src.rpm
libgrpc++1-1.25.0-150200.3.5.1.x86_64.rpm
libgrpc8-1.25.0-150200.3.5.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1868
Recommended update for openwsman
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openwsman fixes the following issue:
- fix FTBFS with newer libcurl in SLE 15-SP4 (bsc#1197792)
libwsman-devel-2.6.7-150000.3.12.2.x86_64.rpm
libwsman3-2.6.7-150000.3.12.2.x86_64.rpm
openwsman-2.6.7-150000.3.12.2.src.rpm
openwsman-server-2.6.7-150000.3.12.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1929
Security update for redis
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-24735: Fixed Lua code injection (bsc#1198952).
- CVE-2022-24736: Fixed Lua NULL pointer dereference (bsc#1198953).
redis-6.2.6-150400.3.3.7.src.rpm
redis-6.2.6-150400.3.3.7.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1814
Recommended update for sapconf
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for sapconf fixes the following issues:
Version update from 5.0.3 to 5.0.4:
- Change block device handling to handle multipath devices correctly. Only the DM multipath devices (mpath) will be
used for the settings, but not its paths (bsc#1188743)
- Fixed wrong comparison used for setting force_latency (bsc#1185702)
- SAP Note 1771258 v6 updates nofile values to 1048576 (bsc#1192841)
sapconf-5.0.4-150000.7.21.1.noarch.rpm
sapconf-5.0.4-150000.7.21.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2119
Recommended update for salt
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issue:
- Make sure SaltCacheLoader use correct fileclient (bsc#1199149)
- Fixes for Python 3.10
* Use the same logic in `_compat.py` and `entrypoints.py` to load the same `importlib.metadata.`
salt-3004-150400.8.5.2.src.rpm
True
salt-api-3004-150400.8.5.2.x86_64.rpm
True
salt-cloud-3004-150400.8.5.2.x86_64.rpm
True
salt-fish-completion-3004-150400.8.5.2.noarch.rpm
True
salt-master-3004-150400.8.5.2.x86_64.rpm
True
salt-proxy-3004-150400.8.5.2.x86_64.rpm
True
salt-ssh-3004-150400.8.5.2.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.5.2.x86_64.rpm
True
salt-syndic-3004-150400.8.5.2.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3195
Recommended update for yast2 packages
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This updates for yast2: rmt, network and schema fixes the following issues:
yast2-rmt:
- Adapted unit test to recent changes (bsc#1179893).
- Sync ExcludeArch with rmt-server: whenever rmt-server is not
available, the yast2-rmt module can't be usable neither.
- No longer build as noarch: as the package is not installable on
all architectures, it is by definition not 'architecture
independent'.
- Add rpmlintrc, filtering out "E: no-binary": the package is
intentionally not marked noarch.
yast2-network and yast2-schema:
- Added missing route extrapara element to the networking section (bsc#1201129)
yast2-rmt-1.3.4-150200.3.8.1.src.rpm
yast2-rmt-1.3.4-150200.3.8.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1824
Recommended update for dhcp
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for dhcp fixes the following issues:
- Properly handle DHCRELAY(6)_OPTIONS (bsc#1198657)
dhcp-4.3.6.P1-150000.6.14.1.src.rpm
dhcp-relay-4.3.6.P1-150000.6.14.1.x86_64.rpm
dhcp-server-4.3.6.P1-150000.6.14.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1730
Security update for libslirp
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libslirp fixes the following issues:
- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366).
- Fix a dhcp regression [bsc#1198773]
libslirp-4.3.1-150300.6.2.src.rpm
libslirp-devel-4.3.1-150300.6.2.x86_64.rpm
libslirp0-4.3.1-150300.6.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2688
Recommended update for rmt-server
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rmt-server fixes the following issues:
Version 2.8.0
- Forwarding information of registered systems to SCC more efficiently in batches
- Syncing the systems' most recent last seen timestamps to SCC
- Optional '--no-confirmation' switch to skip user confirmation when cleaning repository data
- Fix "rmt-cli systems list --csv -a" for RMTs with millions of systems (bsc#1191552)
- Enable users with old versions of RMT to sync systems with SCC by default
rmt-server-2.8.0-150400.3.3.1.src.rpm
rmt-server-2.8.0-150400.3.3.1.x86_64.rpm
rmt-server-config-2.8.0-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1900
Recommended update for rabbitmq-c
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rabbitmq-c fixes the following issues:
- Resolve package build issues (bsc#1198202)
librabbitmq-devel-0.10.0-150300.5.3.1.x86_64.rpm
librabbitmq4-0.10.0-150300.5.3.1.x86_64.rpm
rabbitmq-c-0.10.0-150300.5.3.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1908
Security update for postgresql14
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14 fixes the following issues:
- CVE-2022-1552: Confine additional operations within "security restricted operation" sandboxes (bsc#1199475).
libecpg6-14.3-150200.5.12.2.x86_64.rpm
postgresql14-14.3-150200.5.12.1.src.rpm
postgresql14-14.3-150200.5.12.2.src.rpm
postgresql14-contrib-14.3-150200.5.12.2.x86_64.rpm
postgresql14-devel-14.3-150200.5.12.2.x86_64.rpm
postgresql14-docs-14.3-150200.5.12.2.noarch.rpm
postgresql14-plperl-14.3-150200.5.12.2.x86_64.rpm
postgresql14-plpython-14.3-150200.5.12.2.x86_64.rpm
postgresql14-pltcl-14.3-150200.5.12.2.x86_64.rpm
postgresql14-server-14.3-150200.5.12.2.x86_64.rpm
postgresql14-server-devel-14.3-150200.5.12.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-1826
Recommended update for nut
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for nut fixes the following issues:
- Fix package build requirements (bsc#1197789)
nut-2.7.4-150000.6.3.1.src.rpm
nut-2.7.4-150000.6.3.1.x86_64.rpm
nut-devel-2.7.4-150000.6.3.1.x86_64.rpm
nut-drivers-net-2.7.4-150000.6.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2545
Recommended update for system-role-common-criteria
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for system-role-common-criteria fixes the following issues:
- Restore UI layout after Common Criteria confirmation (bsc#1194279)
system-role-common-criteria-15.4.1-150400.3.3.1.src.rpm
system-role-common-criteria-15.4.1-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2035
Security update for grub2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
This update provides security fixes and hardenings for Boothole 3 / Boothole 2022 (bsc#1198581)
- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers (bsc#1198493)
- CVE-2022-28735: Fixed some verifier framework changes (bsc#1198495)
- CVE-2022-28736: Fixed a use-after-free in chainloader command (bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2
- Use boot disks in OpenFirmware, fixing regression caused when the root LV is completely in the boot LUN (bsc#1197948)
grub2-2.06-150400.11.5.2.src.rpm
grub2-x86_64-xen-2.06-150400.11.5.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2295
Security update for 389-ds
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- CVE-2021-4091: Fixed double free in psearch (bsc#1195324).
- CVE-2022-1949: Fixed full access control bypass with simple crafted query (bsc#1199889).
389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1.src.rpm
389-ds-2.0.15~git26.1ea6a6803-150400.3.5.1.x86_64.rpm
389-ds-devel-2.0.15~git26.1ea6a6803-150400.3.5.1.x86_64.rpm
lib389-2.0.15~git26.1ea6a6803-150400.3.5.1.x86_64.rpm
libsvrcore0-2.0.15~git26.1ea6a6803-150400.3.5.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3275
Recommended update for python-aiohttp, python-typing_extensions
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python-aiohttp, python-typing_extensions fixes the following issues:
- Include in SLE-15 (bsc#1197831)
- Fixed required/optional keys with old-style TypedDict
- Test in separate multibuild flavor to break depcycles with full python stdlib
- Clean requirements specifications for python flavors
- Add transitional typing-extensions provides
- Fix tests for Python 3.9
- Official support for Python 3.8 and 3.9
- Fix build without python2 available
- Fix isinstance() with generic protocol subclasses after subscripting
- Fix tests for non-default interpreters
- Use environment marker to specify typing dependency
- Fix unions of protocols on Python 2
python-typing_extensions-3.10.0.0-150400.3.2.1.src.rpm
python3-typing_extensions-3.10.0.0-150400.3.2.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2713
Security update for bind
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
- CVE-2021-25219: Fixed flaw that allowed abusing lame cache to severely degrade resolver performance (bsc#1192146).
- CVE-2021-25220: Fixed potentially incorrect answers by cached forwarders (bsc#1197135).
- CVE-2022-0396: Fixed a incorrect handling of TCP connection slots time frame leading to deny of service (bsc#1197136).
The following non-security bugs were fixed:
- Update to release 9.16.31 (jsc#SLE-24600).
- Logrotation broken since dropping chroot (bsc#1200685).
- A non-existent initialization script (eg a leftorver
"createNamedConfInclude" in /etc/sysconfig/named) may cause named
not to start. A warning message is printed in named.prep and
the fact is ignored.
Also, the return value of a failed script was not handled properly
causing a failed script to not prevent named to start. This
is now fixed properly.
[bsc#1199044, vendor-files.tar.bz2]
bind-9.16.31-150400.5.6.1.src.rpm
bind-9.16.31-150400.5.6.1.x86_64.rpm
bind-doc-9.16.31-150400.5.6.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2296
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-26362: Fixed race condition in typeref acquisition (bsc#1199965)
- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (bsc#1199966)
xen-4.16.1_04-150400.4.5.2.src.rpm
True
xen-4.16.1_04-150400.4.5.2.x86_64.rpm
True
xen-devel-4.16.1_04-150400.4.5.2.x86_64.rpm
True
xen-tools-4.16.1_04-150400.4.5.2.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.1_04-150400.4.5.2.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2260
Security update for qemu
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2022-26354: Fixed missing virtqueue detach on error can lead to memory leak (bsc#1198712)
- CVE-2022-26353: Fixed map leaking on error during receive (bsc#1198711)
- CVE-2021-4207: Fixed double fetch in qxl_cursor() can lead to heap buffer overflow (bsc#1198037)
- CVE-2021-4206: Fixed integer overflow in cursor_alloc() can lead to heap buffer overflow (bsc#1198035)
qemu-6.2.0-150400.37.5.3.src.rpm
qemu-6.2.0-150400.37.5.3.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.5.3.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.5.3.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.5.3.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.5.3.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.5.3.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.5.3.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.5.3.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.5.3.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.5.3.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.5.3.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.5.3.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.5.3.noarch.rpm
qemu-ksm-6.2.0-150400.37.5.3.x86_64.rpm
qemu-kvm-6.2.0-150400.37.5.3.x86_64.rpm
qemu-lang-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.5.3.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.5.3.x86_64.rpm
qemu-x86-6.2.0-150400.37.5.3.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.5.3.noarch.rpm
qemu-sgabios-8-150400.37.5.3.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.5.3.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2297
Security update for python-Twisted
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python-Twisted fixes the following issues:
- CVE-2022-21716: Fixed that ssh server accepts an infinite amount of data using all the available memory (bsc#1196739).
python-Twisted-22.2.0-150400.5.4.1.src.rpm
python3-Twisted-22.2.0-150400.5.4.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2655
Security update for postgresql-jdbc
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql-jdbc fixes the following issues:
- CVE-2022-26520: Fixed arbitrary File Write Vulnerability (bsc#1197356)
postgresql-jdbc-42.2.25-150400.3.3.2.noarch.rpm
postgresql-jdbc-42.2.25-150400.3.3.2.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2302
Security update for apache2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp (bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match() (bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody (bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (bsc#1200348)
apache2-2.4.51-150400.6.3.1.src.rpm
apache2-devel-2.4.51-150400.6.3.1.x86_64.rpm
apache2-doc-2.4.51-150400.6.3.1.noarch.rpm
apache2-worker-2.4.51-150400.6.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2395
Security update for virglrenderer
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for virglrenderer fixes the following issues:
- CVE-2022-0135: Fix OOB in read_transfer_data. (bsc#1195389)
libvirglrenderer1-0.9.1-150400.3.3.1.x86_64.rpm
virglrenderer-0.9.1-150400.3.3.1.src.rpm
virglrenderer-devel-0.9.1-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2880
Security update for dpdk
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of dpdk fixes the following issue:
- Fix to read PCI device name as UTF strings (bsc#1198873)
- Allow configuring thread granularity of Kernel NIC Interface (bsc#1195172)
- Rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
dpdk-19.11.10-150400.4.4.1.src.rpm
dpdk-19.11.10-150400.4.4.1.x86_64.rpm
dpdk-devel-19.11.10-150400.4.4.1.x86_64.rpm
dpdk-kmp-default-19.11.10_k5.14.21_150400.24.11-150400.4.4.1.x86_64.rpm
dpdk-tools-19.11.10-150400.4.4.1.x86_64.rpm
libdpdk-20_0-19.11.10-150400.4.4.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2657
Security update for oracleasm
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of oracleasm fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues (bsc#1198581)
oracleasm-2.0.8-150400.25.2.8.src.rpm
oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.11-150400.25.2.8.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2304
Security update for salt
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
- CVE-2022-22967: Fixed missing check for PAM_ACCT_MGM return value that could be used to bypass authentication when using PAM (bsc#1200566)
salt-3004-150400.8.8.1.src.rpm
True
salt-api-3004-150400.8.8.1.x86_64.rpm
True
salt-cloud-3004-150400.8.8.1.x86_64.rpm
True
salt-fish-completion-3004-150400.8.8.1.noarch.rpm
True
salt-master-3004-150400.8.8.1.x86_64.rpm
True
salt-proxy-3004-150400.8.8.1.x86_64.rpm
True
salt-ssh-3004-150400.8.8.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.8.1.x86_64.rpm
True
salt-syndic-3004-150400.8.8.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2359
Security update for squid
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
- CVE-2021-46784: Fixed DoS when processing gopher server responses. (bsc#1200907)
- Update to 5.6:
- Improve handling of Gopher responses
- Changes in 5.5:
- fixes regression Bug 5192: esi_parser default is incorrect
- Bug 5177: clientca certificates sent to https_port clients
- Bug 5090: Must(!request->pinnedConnection()) violation
- Kid restart leads to persistent queue overflows, delays/timeouts
squid-5.6-150400.3.3.1.src.rpm
squid-5.6-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2426
Recommended update for rsyslog
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rsyslog fixes the following issues:
- Remove inotify watch descriptor in imfile on inode change detected (bsc#1198939)
rsyslog-8.2106.0-150400.5.3.1.src.rpm
rsyslog-module-gssapi-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-gtls-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-mmnormalize-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-mysql-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-pgsql-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-relp-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-snmp-8.2106.0-150400.5.3.1.x86_64.rpm
rsyslog-module-udpspoof-8.2106.0-150400.5.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2581
Security update for libguestfs
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libguestfs fixes the following issues:
- CVE-2022-2211: Fixed a buffer overflow in get_keys (bsc#1201064).
guestfs-data-1.44.2-150400.3.3.1.x86_64.rpm
guestfs-tools-1.44.2-150400.3.3.1.x86_64.rpm
guestfs-winsupport-1.44.2-150400.3.3.1.x86_64.rpm
guestfsd-1.44.2-150400.3.3.1.x86_64.rpm
libguestfs-1.44.2-150400.3.3.1.src.rpm
libguestfs-devel-1.44.2-150400.3.3.1.x86_64.rpm
libguestfs0-1.44.2-150400.3.3.1.x86_64.rpm
perl-Sys-Guestfs-1.44.2-150400.3.3.1.x86_64.rpm
python3-libguestfs-1.44.2-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2447
Recommended update for virt-manager
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for virt-manager fixes the following issues:
- Add support for AMD Secure Encrypted Virtualization-Encrypted State (SEV-ES) (bsc#1196806, jsc#SLE-18732)
- Add firmware features to description tooltip when mouse hovers over the selected firmware file
- SLES 15 SP4 GMC --os-variant tag shouldn't be mandatory on s390x (bsc#1200691, bsc#1200422)
- Make package xorriso a required dependency
virt-install-4.0.0-150400.3.3.1.noarch.rpm
virt-manager-4.0.0-150400.3.3.1.noarch.rpm
virt-manager-4.0.0-150400.3.3.1.src.rpm
virt-manager-common-4.0.0-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2448
Security update for dovecot23
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for dovecot23 fixes the following issues:
- CVE-2022-30550: Fixed privilege escalation in dovecot when similar master and non-master passdbs are used (bsc#1201267).
dovecot23-2.3.15-150200.62.1.src.rpm
dovecot23-2.3.15-150200.62.1.x86_64.rpm
dovecot23-backend-mysql-2.3.15-150200.62.1.x86_64.rpm
dovecot23-backend-pgsql-2.3.15-150200.62.1.x86_64.rpm
dovecot23-backend-sqlite-2.3.15-150200.62.1.x86_64.rpm
dovecot23-devel-2.3.15-150200.62.1.x86_64.rpm
dovecot23-fts-2.3.15-150200.62.1.x86_64.rpm
dovecot23-fts-lucene-2.3.15-150200.62.1.x86_64.rpm
dovecot23-fts-solr-2.3.15-150200.62.1.x86_64.rpm
dovecot23-fts-squat-2.3.15-150200.62.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2626
Recommended update for openCryptoki
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openCryptoki fixes the following issues:
- Add the installation of the configuration file p11sak_defined_attrs.conf (bsc#1199862)
openCryptoki-3.17.0-150400.4.3.1.src.rpm
openCryptoki-3.17.0-150400.4.3.1.x86_64.rpm
openCryptoki-devel-3.17.0-150400.4.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3199
Security update for yast2-samba-provision
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for yast2-samba-provision fixes the following issues:
Security issue fixed:
- CVE-2018-17956: Fixed a credentials leak (bsc#1117597).
Non-Security issues fixed:
- Stop packaging docdir, it only contained the license which is now in licensedir. (bsc#1184897)
- Catch and show internal python exceptions. (bsc#1140548)
- Show a dialog with provision details or errors. (bsc#1132676)
- Add metainfo (fate#319035)
yast2-samba-provision-1.0.5-150400.9.3.3.noarch.rpm
yast2-samba-provision-1.0.5-150400.9.3.3.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2597
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-26363, CVE-2022-26364: Fixed insufficient care with non-coherent mappings (XSA-402) (bsc#1199966).
- CVE-2022-21123, CVE-2022-21125, CVE-2022-21166: Fixed MMIO stale data vulnerabilities on x86 (XSA-404) (bsc#1200549).
- CVE-2022-26362: Fixed a race condition in typeref acquisition (XSA-401) (bsc#1199965).
- CVE-2022-33745: Fixed insufficient TLB flush for x86 PV guests in shadow mode (XSA-408) (bsc#1201394).
- CVE-2022-23816, CVE-2022-23825, CVE-2022-29900: Fixed RETBLEED vulnerability, arbitrary speculative code execution with return instructions (XSA-407) (bsc#1201469).
Fixed several upstream bugs (bsc#1027519).
xen-4.16.1_06-150400.4.8.1.src.rpm
True
xen-4.16.1_06-150400.4.8.1.x86_64.rpm
True
xen-devel-4.16.1_06-150400.4.8.1.x86_64.rpm
True
xen-tools-4.16.1_06-150400.4.8.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.1_06-150400.4.8.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2989
Security update for postgresql14
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14 fixes the following issues:
- Upgrade to version 14.5:
- CVE-2022-2625: Fixed an issue where extension scripts would replace objects not belonging to that extension (bsc#1202368).
- Upgrade to version 14.4 (bsc#1200437)
- Release notes: https://www.postgresql.org/docs/release/14.4/
- Release announcement: https://www.postgresql.org/about/news/p-2470/
- Prevent possible corruption of indexes created or rebuilt with the CONCURRENTLY option (bsc#1200437)
- Pin to llvm13 until the next patchlevel update (bsc#1198166)
libecpg6-14.5-150200.5.17.1.x86_64.rpm
postgresql14-14.5-150200.5.17.1.src.rpm
postgresql14-contrib-14.5-150200.5.17.1.x86_64.rpm
postgresql14-devel-14.5-150200.5.17.1.x86_64.rpm
postgresql14-docs-14.5-150200.5.17.1.noarch.rpm
postgresql14-plperl-14.5-150200.5.17.1.x86_64.rpm
postgresql14-plpython-14.5-150200.5.17.1.x86_64.rpm
postgresql14-pltcl-14.5-150200.5.17.1.x86_64.rpm
postgresql14-server-14.5-150200.5.17.1.x86_64.rpm
postgresql14-server-devel-14.5-150200.5.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3258
Recommended update for sca-appliance-broker
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for sca-appliance-broker fixes the following issues:
- Update setup-sca checks for php8 (bsc#1201011)
sca-appliance-broker-1.3.2-150300.3.3.1.noarch.rpm
sca-appliance-broker-1.3.2-150300.3.3.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2977
Recommended update for util-linux
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for util-linux fixes the following issues:
- agetty: Resolve tty name even if stdin is specified (bsc#1197178)
- libmount: When moving a mount point, update all sub mount entries in utab (bsc#1198731)
util-linux-systemd-2.37.2-150400.8.3.1.src.rpm
uuidd-2.37.2-150400.8.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3009
Recommended update for rsyslog
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rsyslog fixes the following issues:
-Fix memory access violation issue in qDeqLinkedList during shutdown (bsc#1199283)
rsyslog-8.2106.0-150400.5.6.1.src.rpm
rsyslog-module-gssapi-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-gtls-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-mmnormalize-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-mysql-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-pgsql-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-relp-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-snmp-8.2106.0-150400.5.6.1.x86_64.rpm
rsyslog-module-udpspoof-8.2106.0-150400.5.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2941
Security update for libslirp
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libslirp fixes the following issues:
- CVE-2021-3593: Fixed invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365).
Non-security fixes:
- Fix the version header (bsc#1201551)
libslirp-4.3.1-150300.11.1.src.rpm
libslirp-devel-4.3.1-150300.11.1.x86_64.rpm
libslirp0-4.3.1-150300.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3188
Recommended update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This recommended update for salt fixes the following issues:
- Add support for gpgautoimport in zypperpkg module
- Update Salt to work with Jinja >= and <= 3.1.0 (bsc#1198744)
- Fix salt.states.file.managed() for follow_symlinks=True and test=True (bsc#1199372)
- Make Salt 3004 compatible with pyzmq >= 23.0.0 (bsc#1201082)
- Add support for name, pkgs and diff_attr parameters to upgrade function for zypper and yum (bsc#1198489)
- Fix ownership of salt thin directory when using the Salt Bundle
- Set default target for pip from VENV_PIP_TARGET environment variable
- Normalize package names once with pkg.installed/removed using yum (bsc#1195895)
- Save log to logfile with docker.build
- Use Salt Bundle in dockermod
- Ignore errors on reading license files with dpkg_lowpkg (bsc#1197288)
salt-3004-150400.8.11.1.src.rpm
True
salt-api-3004-150400.8.11.1.x86_64.rpm
True
salt-cloud-3004-150400.8.11.1.x86_64.rpm
True
salt-fish-completion-3004-150400.8.11.1.noarch.rpm
True
salt-master-3004-150400.8.11.1.x86_64.rpm
True
salt-proxy-3004-150400.8.11.1.x86_64.rpm
True
salt-ssh-3004-150400.8.11.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.11.1.x86_64.rpm
True
salt-syndic-3004-150400.8.11.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3286
Security update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- CVE-2022-2850: Fixed an application crash when running a sync_repl client that could be triggered via a malformed cookie (bsc#1202470).
Non-security fixes:
- Update to version 2.0.16~git20.219f047ae:
* Fix missing 'not' in description
* CI - makes replication/acceptance_test.py::test_modify_entry more robust
* fix repl keep alive event interval
* Sync_repl may crash while managing invalid cookie
* Hostname when set to localhost causing failures in other tests
* lib389 - do not set backend name to lowercase
* keep alive update event starts too soon
* Fix various memory leaks
* UI - LDAP Editor is not updated when we switch instances
* Supplier should do periodic updates
- Update sudoers schema to support UTF-8 (bsc#1197998)
- Update to version 2.0.16~git9.e2a858a86:
* UI - Various fixes and RFE's for UI
* Remove problematic language from source code
* CI - disable TLS hostname checking
* Update npm and cargo packages
* Support ECDSA private keys for TLS
389-ds-2.0.16~git20.219f047ae-150400.3.10.1.src.rpm
389-ds-2.0.16~git20.219f047ae-150400.3.10.1.x86_64.rpm
389-ds-devel-2.0.16~git20.219f047ae-150400.3.10.1.x86_64.rpm
lib389-2.0.16~git20.219f047ae-150400.3.10.1.x86_64.rpm
libsvrcore0-2.0.16~git20.219f047ae-150400.3.10.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3261
Recommended update for openCryptoki
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openCryptoki fixes the following issues:
- Fix C_GetMechanismList returning CKR_BUFFER_TOO_SMALL in the EP11 token (bsc#1202028)
openCryptoki-3.17.0-150400.4.6.1.src.rpm
openCryptoki-3.17.0-150400.4.6.1.x86_64.rpm
openCryptoki-devel-3.17.0-150400.4.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-2922
Security update for libyang
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libyang fixes the following issues:
- CVE-2021-28905: Fixed a reachable assertion which could be exploited
by an attacker to cause a denial of service (bsc#1186377).
libyang-1.0.184-150300.3.3.1.src.rpm
libyang-extentions-1.0.184-150300.3.3.1.x86_64.rpm
libyang1-1.0.184-150300.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3099
Security update for openvswitch
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openvswitch fixes the following issues:
- CVE-2021-36980: Fixed a use-after-free issue during the decoding of
a RAW_ENCAP action (bsc#1188524).
libopenvswitch-2_14-0-2.14.2-150400.24.3.1.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.3.1.x86_64.rpm
openvswitch-2.14.2-150400.24.3.1.src.rpm
openvswitch-2.14.2-150400.24.3.1.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.3.1.x86_64.rpm
openvswitch-ipsec-2.14.2-150400.24.3.1.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.3.1.x86_64.rpm
openvswitch-test-2.14.2-150400.24.3.1.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.3.1.x86_64.rpm
ovn-20.06.2-150400.24.3.1.x86_64.rpm
ovn-central-20.06.2-150400.24.3.1.x86_64.rpm
ovn-devel-20.06.2-150400.24.3.1.x86_64.rpm
ovn-docker-20.06.2-150400.24.3.1.x86_64.rpm
ovn-host-20.06.2-150400.24.3.1.x86_64.rpm
ovn-vtep-20.06.2-150400.24.3.1.x86_64.rpm
python3-ovs-2.14.2-150400.24.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3481
Recommended update for libvirt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libvirt fixes the following issues:
- spec: Include aarch64 in the list of architectures that 'Require' dmidecode (bsc#1202608)
- qemu: Support memory allocation threads (bsc#1197084)
libvirt-7.1.0-150300.6.35.2.src.rpm
libvirt-bash-completion-7.1.0-150300.6.35.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3159
Security update for mariadb
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
- Updated to 10.6.9:
- CVE-2022-32082: Fixed a reachable assertion that would crash the server (bsc#1201162).
- CVE-2022-32089: Fixed a segmentation fault that coudl be triggered via a crafted query (bsc#1201169).
- CVE-2022-32081: Fixed a buffer overflow on instant ADD/DROP of generated column (bsc#1201161).
- CVE-2022-32091: Fixed a memory corruption issue that could be triggered via a crafted query (bsc#1201170).
- CVE-2022-32084: Fixed a segmentation fault on INSERT SELECT queries (bsc#1201164).
- Additionaly, the following issues were previously fixed:
- CVE-2022-32088: Fixed a server crash when using ORDER BY with window function and UNION(bsc#1201168).
- CVE-2022-32087: Fixed a segmentation fault that could be triggered via a crafted query (bsc#1201167).
- CVE-2022-32086: Fixed a server crash on INSERT SELECT queries (bsc#1201166).
- CVE-2022-32085: Fixed a segmentation fault that could be triggered via a crafted query (bsc#1201165).
- CVE-2022-32083: Fixed a segmentation fault that could be triggered via a crafted query (bsc#1201163).
Bugfixes:
- Update mysql-systemd-helper to be aware of custom group (bsc#1200105).
libmariadbd-devel-10.6.9-150400.3.12.1.x86_64.rpm
libmariadbd19-10.6.9-150400.3.12.1.x86_64.rpm
mariadb-10.6.9-150400.3.12.1.src.rpm
mariadb-10.6.9-150400.3.12.1.x86_64.rpm
mariadb-client-10.6.9-150400.3.12.1.x86_64.rpm
mariadb-errormessages-10.6.9-150400.3.12.1.noarch.rpm
mariadb-tools-10.6.9-150400.3.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4308
Security update for virt-v2v
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for virt-v2v fixes the following issues:
- CVE-2022-2211: Fixed buffer overflow in get_keys (bsc#1201064).
virt-v2v-1.44.2-150400.3.3.1.src.rpm
virt-v2v-1.44.2-150400.3.3.1.x86_64.rpm
virt-v2v-bash-completion-1.44.2-150400.3.3.1.noarch.rpm
virt-v2v-man-pages-ja-1.44.2-150400.3.3.1.noarch.rpm
virt-v2v-man-pages-uk-1.44.2-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3245
Security update for libyang
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libyang fixes the following issues:
- CVE-2021-28906: Fixed missing check in read_yin_leaf that can lead to DoS (bsc#1186378)
- CVE-2021-28904: Fixed missing check in ext_get_plugin that lead to DoS (bsc#1186376).
- CVE-2021-28903: Fixed stack overflow in lyxml_parse_mem (bsc#1186375).
- CVE-2021-28902: Fixed missing check in read_yin_container that can lead to DoS (bsc#1186374).
libyang-1.0.184-150300.3.6.1.src.rpm
libyang-extentions-1.0.184-150300.3.6.1.x86_64.rpm
libyang1-1.0.184-150300.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3246
Security update for frr
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for frr fixes the following issues:
- CVE-2022-37032: Fixed out-of-bounds read in the BGP daemon that may lead to information disclosure or denial of service (bsc#1202023).
- CVE-2019-25074: Fixed a memory leak in the IS-IS daemon that may lead to server memory exhaustion (bsc#1202022).
frr-7.4-150300.4.7.1.src.rpm
frr-7.4-150300.4.7.1.x86_64.rpm
frr-devel-7.4-150300.4.7.1.x86_64.rpm
libfrr0-7.4-150300.4.7.1.x86_64.rpm
libfrr_pb0-7.4-150300.4.7.1.x86_64.rpm
libfrrcares0-7.4-150300.4.7.1.x86_64.rpm
libfrrfpm_pb0-7.4-150300.4.7.1.x86_64.rpm
libfrrgrpc_pb0-7.4-150300.4.7.1.x86_64.rpm
libfrrospfapiclient0-7.4-150300.4.7.1.x86_64.rpm
libfrrsnmp0-7.4-150300.4.7.1.x86_64.rpm
libfrrzmq0-7.4-150300.4.7.1.x86_64.rpm
libmlag_pb0-7.4-150300.4.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3767
Recommended update for bind
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
Update to release 9.16.33:
- CVE-2022-2795: Fixed potential performance degredation due to missing database lookup limits when processing large delegations (bsc#1203614).
- CVE-2022-3080: Fixed assertion failure when there was a stale CNAME in the cache for the incoming query and the stale-answer-client-timeout option is set to 0 (bsc#1203618).
- CVE-2022-38177: Fixed a memory leak that could be externally triggered in the DNSSEC verification code for the ECDSA algorithm (bsc#1203619).
- CVE-2022-38178: Fixed memory leaks that could be externally triggered in the DNSSEC verification code for the EdDSA algorithm (bsc#1203620).
- Add systemd drop-in directory for named service (bsc#1201689).
- Add modified createNamedConfInclude script and README-bind.chrootenv (bsc#1203250).
- Feature Changes:
- Response Rate Limiting (RRL) code now treats all QNAMEs that are
subject to wildcard processing within a given zone as the same
name, to prevent circumventing the limits enforced by RRL.
- Zones using dnssec-policy now require dynamic DNS or
inline-signing to be configured explicitly.
- A backward-compatible approach was implemented for encoding
internationalized domain names (IDN) in dig and converting the
domain to IDNA2008 form; if that fails,
BIND tries an IDNA2003 conversion.
- The DNSSEC algorithms RSASHA1 and NSEC3RSASHA1 are now automatically
disabled on systems where they are disallowed by the security policy.
Primary zones using those algorithms need to be migrated to new algorithms
prior to running on these systems, as graceful migration to different DNSSEC
algorithms is not possible when RSASHA1 is disallowed by the operating system.
- Log messages related to fetch limiting have been improved to provide
more complete information. Specifically, the final counts of allowed
and spilled fetches are now logged before the counter object is destroyed.
- Non-dynamic zones that inherit dnssec-policy from the view or options
blocks were not marked as inline-signed and therefore never scheduled
to be re-signed. This has been fixed.
- The old max-zone-ttl zone option was meant to be superseded by
the max-zone-ttl option in dnssec-policy; however, the latter option
was not fully effective. This has been corrected: zones no longer load
if they contain TTLs greater than the limit configured in dnssec-policy.
For zones with both the old max-zone-ttl option and dnssec-policy
configured, the old option is ignored, and a warning is generated.
- rndc dumpdb -expired was fixed to include expired RRsets,
even if stale-cache-enable is set to no and the cache-cleaning time
window has passed. (jsc#SLE-24600)
bind-9.16.33-150400.5.11.1.src.rpm
bind-9.16.33-150400.5.11.1.x86_64.rpm
bind-doc-9.16.33-150400.5.11.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4019
Recommended update for apparmor
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apparmor fixes the following issues:
- profiles: permit php-fpm pid files directly under run/ (bsc#1202344)
apache2-mod_apparmor-3.0.4-150400.5.3.1.x86_64.rpm
apparmor-3.0.4-150400.5.3.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3667
Security update for clone-master-clean-up
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for clone-master-clean-up fixes the following issues:
- CVE-2021-32000: Fixed some potentially dangerous file system operations (bsc#1181050).
Bugfixes:
- Fixed clone-master-clean-up failing to remove btrfs snapshots (bsc#1203651).
clone-master-clean-up-1.8-150100.3.14.1.noarch.rpm
clone-master-clean-up-1.8-150100.3.14.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3341
Security update for dpdk
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for dpdk fixes the following issues:
- CVE-2022-2132: Fixed DoS when a vhost header crosses more than two descriptors and exhausts all mbufs (bsc#1202903).
- CVE-2022-28199: Fixed buffer overflow in the vhost code (bsc#1202956).
dpdk-19.11.10-150400.4.7.1.src.rpm
dpdk-19.11.10-150400.4.7.1.x86_64.rpm
dpdk-devel-19.11.10-150400.4.7.1.x86_64.rpm
dpdk-kmp-default-19.11.10_k5.14.21_150400.24.18-150400.4.7.1.x86_64.rpm
dpdk-tools-19.11.10-150400.4.7.1.x86_64.rpm
libdpdk-20_0-19.11.10-150400.4.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3588
Recommended update for rmt-server
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rmt-server fixes the following issues:
- Implement `System-Token` header handling to improve unique system reporting.
- Add --proxy-byos flag to rmt-cli systems command to filter BYOS systems using RMT as a proxy
- Retry failed http requests automatically (bsc#1197405, bsc#1188578, bsc#1198721, bsc#1199961)
- Improved rmt-client-setup-res script for CentOS8.x and RHEL/RES8.x (bsc#1197038)
rmt-server-2.9-150400.3.6.1.src.rpm
rmt-server-2.9-150400.3.6.1.x86_64.rpm
rmt-server-config-2.9-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3811
Recommended update for ovmf
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for ovmf fixes the following issues:
- Disable option ROM on sev (bsc#1199156)
- Fix detection issue of NVME controller (bsc#1203825)
ovmf-202202-150400.5.5.1.src.rpm
ovmf-202202-150400.5.5.1.x86_64.rpm
ovmf-tools-202202-150400.5.5.1.x86_64.rpm
qemu-ovmf-x86_64-202202-150400.5.5.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3685
Optional update for monitoring-plugins and its dependencies
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This optional update for monitoring-plugins and its dependencies provides:
freeradius-client:
- Deliver missing freeradius-client to SUSE Package Hub 15 SP4 and solve migration issues from 15 SP3. (ijsc#MSC-399)
- There are NO code changes.
monitoring-plugins:
- Deliver missing monitoring plugins to SUSE Package Hub 15 SP4 and solve migration issues from 15 SP3. (ijsc#MSC-399)
- There are NO code changes.
perl-Crypt-DES:
- Deliver missing perl-Crypt-DES to SUSE Package Hub 15 SP4 and solve migration issues from 15 SP3. (ijsc#MSC-399)
- There are NO code changes.
perl-Crypt-Rijndael:
- Deliver missing perl-Crypt-Rijndaelto SUSE Package Hub 15 SP4 and solve migration issues from 15 SP3. (ijsc#MSC-399)
- There are NO code changes.
perl-Net-SNMP:
- Deliver missing perl-Net-SNMP to SUSE Package Hub 15 SP4 and solve migration issues from 15 SP3. (ijsc#MSC-399)
- There are NO code changes.
freeradius-client-1.1.7-150400.14.2.1.src.rpm
freeradius-client-1.1.7-150400.14.2.1.x86_64.rpm
freeradius-client-devel-1.1.7-150400.14.2.1.x86_64.rpm
freeradius-client-libs-1.1.7-150400.14.2.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3320
Security update for vsftpd
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for vsftpd fixes the following issues:
- CVE-2021-3618: Enforced security checks against ALPACA attack (bsc#1187678, bsc#1187686, PM-3322).
Bugfixes:
- Fixed a seccomp failure in FIPS mode when SSL was enabled (bsc#1052900).
- Allowed wait4() to be called so that the broker can wait for its child processes (bsc#1021387).
- Allowed sendto() syscall when /dev/log support is enabled (bsc#786024).
vsftpd-3.0.5-150400.3.3.1.src.rpm
vsftpd-3.0.5-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3437
Recommended update for mariadb-galera
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This recommended update for mariadb-galera provides:
- Deliver missing mariadb-galera to SUSE Linux Enterprise 15 Service Pack 4 PackageHub
- There are NO code changes
libmariadbd-devel-10.6.9-150400.3.14.1.x86_64.rpm
libmariadbd19-10.6.9-150400.3.14.1.x86_64.rpm
mariadb-10.6.9-150400.3.14.1.src.rpm
mariadb-10.6.9-150400.3.14.1.x86_64.rpm
mariadb-client-10.6.9-150400.3.14.1.x86_64.rpm
mariadb-errormessages-10.6.9-150400.3.14.1.noarch.rpm
mariadb-tools-10.6.9-150400.3.14.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4370
Recommended update for rsyslog
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rsyslog fixes the following issues:
- Parsing of legacy config syntax (bsc#1205275)
- Remove $klogConsoleLogLevel setting from rsyslog.conf as this legacy setting from pre-systemd times is obsolete and
can block important systemd messages (bsc#1191833)
rsyslog-8.2106.0-150400.5.11.1.src.rpm
rsyslog-module-gssapi-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-gtls-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-mmnormalize-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-mysql-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-pgsql-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-relp-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-snmp-8.2106.0-150400.5.11.1.x86_64.rpm
rsyslog-module-udpspoof-8.2106.0-150400.5.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4387
Recommended update for libteam
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libteam fixes the following issues:
- Set ports priority to local and kernel configurations (bsc#1200505)
libteam-1.27-150000.4.6.1.src.rpm
libteam-tools-1.27-150000.4.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3845
Feature update for grub2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This feature update for grub2 fixes the following issues:
- Include loopback into signed grub2 image (jsc#PED-2151, jsc#PED-2150)
- Enable "Automatic TPM Disk Unlock" mechanism (jsc#PED-1423, jsc#PED-1091, bsc#1196668)
- Fix installation failure due to unavailable nvram device on ppc64le (bsc#1201361)
grub2-2.06-150400.11.12.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.12.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3974
Recommended update for util-linux
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for util-linux fixes the following issues:
- Fix file conflict during upgrade (bsc#1204211)
- libuuid improvements (bsc#1201959, PED-1150):
libuuid: Fix range when parsing UUIDs.
Improve cache handling for short running applications-increment the cache size over runtime.
Implement continuous clock handling for time based UUIDs.
Check clock value from clock file to provide seamless libuuid.
util-linux-systemd-2.37.2-150400.8.8.1.src.rpm
uuidd-2.37.2-150400.8.8.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3748
Recommended update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
- Add Amazon EC2 detection for virtual grains (bsc#1195624)
- Change the delimiters to prevent possible tracebacks on some packages with dpkg_lowpkg
- Fix 'test_ipc' unit test
- Fix Syndic authentication errors (bsc#1199562)
- Fix state.apply in test mode with file state module on user/group checking (bsc#1202167)
- Fix the regression in schedule module released in version 3004 (bsc#1202631)
- Handle non-UTF-8 bytes in core grains generation (bsc#1202165)
- Make zypperpkg to retry if RPM lock is temporarily unavailable (bsc#1200596)
salt-3004-150400.8.14.1.src.rpm
True
salt-api-3004-150400.8.14.1.x86_64.rpm
True
salt-cloud-3004-150400.8.14.1.x86_64.rpm
True
salt-fish-completion-3004-150400.8.14.1.noarch.rpm
True
salt-master-3004-150400.8.14.1.x86_64.rpm
True
salt-proxy-3004-150400.8.14.1.x86_64.rpm
True
salt-ssh-3004-150400.8.14.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.14.1.x86_64.rpm
True
salt-syndic-3004-150400.8.14.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3996
Security update for 389-ds
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- CVE-2021-45710: Fixed tokio data race with memory corruption (bsc#1194119).
- Update to version 2.0.16~git56.d15a0a7:
- Failure to migrate from openldap if pwdPolicyChecker present (bsc#1205146).
- Resolve issue with checklist post migration when dds is present (bsc#1204748).
- Improve reliability of migrations from openldap when dynamic directory services is configured (bsc#1204493).
389-ds-2.0.16~git56.d15a0a7-150400.3.15.1.src.rpm
389-ds-2.0.16~git56.d15a0a7-150400.3.15.1.x86_64.rpm
389-ds-devel-2.0.16~git56.d15a0a7-150400.3.15.1.x86_64.rpm
lib389-2.0.16~git56.d15a0a7-150400.3.15.1.x86_64.rpm
libsvrcore0-2.0.16~git56.d15a0a7-150400.3.15.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3531
Security update for squid
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
Updated squid to version 5.7:
- CVE-2022-41317: Fixed exposure of sensitive information in cache manager (bsc#1203677).
- CVE-2022-41318: Fixed buffer overread in SSPI and SMB Authentication (bsc#1203680).
squid-5.7-150400.3.6.1.src.rpm
squid-5.7-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3537
Security update for postgresql-jdbc
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql-jdbc fixes the following issues:
- CVE-2022-31197: Fixed SQL injection vulnerability (bsc#1202170).
postgresql-jdbc-42.2.25-150400.3.6.1.noarch.rpm
postgresql-jdbc-42.2.25-150400.3.6.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4488
Security update for apache2-mod_wsgi
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_wsgi fixes the following issues:
- CVE-2022-2255: Hardened the trusted proxy header filter to avoid bypass. (bsc#1201634)
apache2-mod_wsgi-python3-4.5.18-150000.4.6.1.src.rpm
apache2-mod_wsgi-python3-4.5.18-150000.4.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3795
Security update for qemu
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2022-0216: Fixed a use after free issue found in hw/scsi/lsi53c895a.c. (bsc#1198038)
- CVE-2022-35414: Fixed an uninitialized read during address translation that leads to a crash. (bsc#1201367)
qemu-6.2.0-150400.37.8.2.src.rpm
qemu-6.2.0-150400.37.8.2.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.8.2.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.8.2.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.8.2.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.8.2.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.8.2.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.8.2.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.8.2.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.8.2.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.8.2.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.8.2.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.8.2.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.8.2.noarch.rpm
qemu-ksm-6.2.0-150400.37.8.2.x86_64.rpm
qemu-kvm-6.2.0-150400.37.8.2.x86_64.rpm
qemu-lang-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.8.2.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.8.2.x86_64.rpm
qemu-x86-6.2.0-150400.37.8.2.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.8.2.noarch.rpm
qemu-sgabios-8-150400.37.8.2.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.8.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3991
Security update for dhcp
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for dhcp fixes the following issues:
- CVE-2022-2928: Fixed an option refcount overflow (bsc#1203988).
- CVE-2022-2929: Fixed a DHCP memory leak (bsc#1203989).
dhcp-4.3.6.P1-150000.6.17.1.src.rpm
dhcp-relay-4.3.6.P1-150000.6.17.1.x86_64.rpm
dhcp-server-4.3.6.P1-150000.6.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3727
Security update for xen
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
Updated to version 4.16.2 (bsc#1027519):
- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806).
- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
Bugfixes:
- Fixed Xen DomU unable to emulate audio device (bsc#1201994).
- Fixed logic error in built-in default of max_event_channels (bsc#1167608, bsc#1201631).
xen-4.16.2_06-150400.4.11.1.src.rpm
xen-4.16.2_06-150400.4.11.1.x86_64.rpm
xen-devel-4.16.2_06-150400.4.11.1.x86_64.rpm
xen-tools-4.16.2_06-150400.4.11.1.x86_64.rpm
xen-tools-xendomains-wait-disk-4.16.2_06-150400.4.11.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3915
Security update for vsftpd
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for vsftpd fixes the following issues:
Bugfixes:
- Removed unsupported systemd hardening options (bsc#1196918).
vsftpd-3.0.5-150400.3.6.1.src.rpm
vsftpd-3.0.5-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3855
Recommended update for mariadb
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
Update version from 10.6.9 to 10.6.10:
- Fix regression causing full text index corruption if shutdown before changes are fully flushed
- Fix regression causing frequent "Data structure corruption" in InnoDB after OOM
- Fix incorrect recovery or backup of instant ALTER TABLE
- Fix issue with InnoDB Temporary Tablespace (ibtmp1) causing it to continuously grow in size until the disk is full
- For full list of changes please check https://mariadb.com/kb/en/library/mariadb-10610-release-notes and
https://mariadb.com/kb/en/library/mariadb-10610-changelog
libmariadbd-devel-10.6.10-150400.3.17.1.x86_64.rpm
libmariadbd19-10.6.10-150400.3.17.1.x86_64.rpm
mariadb-10.6.10-150400.3.17.1.src.rpm
mariadb-10.6.10-150400.3.17.1.x86_64.rpm
mariadb-client-10.6.10-150400.3.17.1.x86_64.rpm
mariadb-errormessages-10.6.10-150400.3.17.1.noarch.rpm
mariadb-tools-10.6.10-150400.3.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-3818
Recommended update for rabbitmq-server
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rabbitmq-server fixes the following issues:
- Ensure maintenance mode state table exists after node [re]boot (bsc#1199431)
erlang-rabbitmq-client-3.8.11-150300.3.6.1.x86_64.rpm
rabbitmq-server-3.8.11-150300.3.6.1.src.rpm
rabbitmq-server-3.8.11-150300.3.6.1.x86_64.rpm
rabbitmq-server-plugins-3.8.11-150300.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4018
Recommended update for python-service_identity
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python-service_identity fixes the following issues:
- Loose the filelist for the package info to avoid build failure (bsc#1203743)
python-service_identity-18.1.0-150200.3.5.1.src.rpm
python3-service_identity-18.1.0-150200.3.5.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4168
Security update for redis
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-3647: Fixed crash in sigsegvHandler debug function (bsc#1204633).
redis-6.2.6-150400.3.6.1.src.rpm
redis-6.2.6-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4061
Recommended update for sapconf
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for sapconf fixes the following issues:
- Adapt check of an active saptune service during the initial package installation to work in a chroot environment and
fix the missing enablement of sapconf (bsc#1190736, bsc#1190787)
sapconf-5.0.5-150000.7.24.1.noarch.rpm
sapconf-5.0.5-150000.7.24.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4040
Recommended update for libvirt
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libvirt fixes the following issues:
- apparmor: Fix QEMU access for UEFI variable files (bsc#1203976)
- qemu: Don't assume that /usr/libexec/qemu-kvm exists (bsc#1158430, bsc#1196087)
- qemu: Support memory allocation threads (bsc#1197084)
- spec: Include aarch64 in the list of architectures that 'Require' dmidecode (bsc#1202608)
- vmx: Require networkName for bridged and custom NICs (bsc#1202630)
libvirt-8.0.0-150400.7.3.1.src.rpm
libvirt-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-client-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-config-network-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-config-nwfilter-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-interface-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-libxl-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-network-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-nodedev-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-qemu-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-secret-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-core-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-hooks-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-qemu-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-daemon-xen-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-devel-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-doc-8.0.0-150400.7.3.1.noarch.rpm
libvirt-lock-sanlock-8.0.0-150400.7.3.1.x86_64.rpm
libvirt-nss-8.0.0-150400.7.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4007
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-33746: Fixed DoS due to excessively long P2M pool freeing (bsc#1203806).
- CVE-2022-33748: Fixed DoS due to race in locking (bsc#1203807).
- CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318: xen: Xenstore: Guests can let xenstored run out of memory (bsc#1204482)
- CVE-2022-42309: xen: Xenstore: Guests can crash xenstored (bsc#1204485)
- CVE-2022-42310: xen: Xenstore: Guests can create orphaned Xenstore nodes (bsc#1204487)
- CVE-2022-42319: xen: Xenstore: Guests can cause Xenstore to not free temporary memory (bsc#1204488)
- CVE-2022-42320: xen: Xenstore: Guests can get access to Xenstore nodes of deleted domains (bsc#1204489)
- CVE-2022-42321: xen: Xenstore: Guests can crash xenstored via exhausting the stack (bsc#1204490)
- CVE-2022-42322,CVE-2022-42323: xen: Xenstore: cooperating guests can create arbitrary numbers of nodes (bsc#1204494)
- CVE-2022-42325,CVE-2022-42326: xen: Xenstore: Guests can create arbitrary number of nodes via transactions (bsc#1204496)
- xen: Frontends vulnerable to backends (bsc#1193923).
xen-4.16.2_08-150400.4.16.1.src.rpm
True
xen-4.16.2_08-150400.4.16.1.x86_64.rpm
True
xen-devel-4.16.2_08-150400.4.16.1.x86_64.rpm
True
xen-tools-4.16.2_08-150400.4.16.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.2_08-150400.4.16.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4601
Feature update for GNOME 41
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for GNOME 41 fixes the following issues:
atkmm1_6:
- Version update from 2.28.1 to 2.28.3 (jsc#PED-2235):
* Meson build: Avoid unnecessary configuration warnings
* Meson build: Perl is not required by new versions of mm-common
* Meson build: Require meson >= 0.55.0
* Meson build: Specify 'check' option in run_command(). Will be necessary with future versions of Meson.
* Require atk >= 2.12.0 Not a new requirement, but previously it was not specified in configure.ac and meson.build
* Support building with Visual Studio 2022
eog:
- Version update from 41.1 to 41.2 (jsc#PED-2235):
* eog-window: use correct type for display_profile
* Fix discovery of Evince for multi-page images
evince:
- Version update 41.3 to 41.4 (jsc#PED-2235):
* shell: Fix failures when thumbnail extraction takes too long
* Fix build with meson 0.60.0 and newer
evolution:
- Ensure evolution-devel is forward compatible with evolution-data-server-devel in a same major version (jsc#PED-2235)
evolution-data-center:
- Version update from 3.42.4 to 3.42.5 (jsc#PED-2235):
* Google OAuth out-of-band (oob) flow will be deprecated
folks:
- Version update 0.15.3 to 0.15.5 (jsc#PED-2235):
* vapi: Add missing generic type argument
* Fix docs build against newer eds version
* Fix build against newer eds version
* Remove volatile keyword from tests
gcr:
- Version update 3.41.0 to 3.41.1 (jsc#PED-2235):
* Add G_SPAWN_CLOEXEC_PIPES flag to all the g_spawn commands
* Add gi-docgen dependency which is needed by the docs
* Fix build with meson 0.60.0 and newer
* Fix build without systemd
* Several CI fixes
geocode-glib:
- Version update from 3.26.2 to 3.26.4 (jsc#PED-2235):
* Fix to a test data file not being installed, and a bug fix for a bug in the libsoup3 port
* Add support for libsoup 3.x
gjs:
- Version update from 1.70.1 to 1.70.2 (jsc#PED-2235):
* Build and compatibility fixes backported from the development branch
* Reverse order of running-from-source checks
- Require xorg-x11-Xvfb for proper package build (bsc#1203274)
glib2:
- Version update from 2.70.4 to 2.70.5 (jsc#PED-2235):
* Bugs fixed: glgo#GNOME/GLib#2620, glgo#GNOME/GLib!2537, glgo#GNOME/GLib!2555
* Split gtk-docs from -devel package, these are not needed during building projects using glib2
gnome-control-center:
- Fix the size of logo icon in About system (bsc#1200581)
- Version update from 41.4 to 41.7 (jsc#PED-2235):
* Cellular: Remove duplicate line from .desktop
* Info: Allow changing "Device Name" by pressing "Enter"
* Info: Remove trailing space after CPU name
* Keyboard: Fix crash resetting all keyboard shortcuts
* Keyboard: Fix leaks
* Network: Fix saving passwords for non-wifi connections
* Network: Fix critical when opening VPN details page
* Wacom: Fix leaks
gnome-desktop:
- Version update from 41.2 to 41.8 (jsc#PED-2235):
* Version increase but no actual changes
gnome-music:
- Version update from 41.0 to 41.1 (jsc#PED-2235):
* Ensure the correct album is played
* Fix build with meson 0.61.0 and newer
* Fix crash on empty selection
* Fix incorrect playlist import
* Fix time displayed in RTL languages
* Improve async queue work
* Make random shuffle actually random
* Make shuffle random
* Speed increase on first startup on larger collections
* Time is reversed in RTL
gnome-remote-desktop:
- Version update from 41.2 to 41.3 (jsc#PED-2235):
* Add Icelandic translation
gnome-session:
- Clear error messages that can be ignored because expected to happen for GDM sessions (bsc#1204867)
- Add fix for gnome-session to exit immediately when lost name on bus (bsc#1175622, bsc#1188882)
gnome-shell:
- Disable offline update suggestion before shutdown/reboot in SLE and openSUSE Leap (bsc#944832)
- Version update from 41.4 to 41.9 (jsc#PED-2235):
* Allow extension updates with only Extension Manager installed
* Allow more intermediate icon sizes in app grid
* Disable workspace switching while in search.
* Do not create systemd scope for D-Bus activated apps
* Fix calendar to correctly align world clocks header in RTL
* Fix drag placeholder position in dash in RTL locales
* Fix edge case where windows stay dimmed after a modal is closed
* Fix feedback when turning on a11y features by keyboard
* Fix focus tracking in magnifier on wayland
* Fix fractional timezone offsets in world clock
* Fix glitches in overview transition
* Fix logging in with realmd
* Fix memory leak
* Fix opening device settings for enterprise WPA networks
* Fix programatically set scrollview fade
* Fix regression in ibus support
* Fix unresponsive top bar in overview when in fullscreen
* Handle monitor changes during startup animation
* Hide overview after 'Show Details' from app context menu
* Improve Belgian on-screen keyboard layout
* Improve CSS shadow appearance
* Make sure startup animation completes
* Misc. bug fixes and cleanups
* Only close messages via delete key if they can be closed
* Respect IM hint for candidates list in on-screen keyboard
gnome-software:
- Disable offline update feature in SUSE Linux Enterprise and openSUSE Leap (bsc#944832)
- Version update from 41.4 to 41.5 (jsc#PED-2235):
* Added several appstream-related fixed
* Disable scroll-by-mouse-wheel on featured carousel
* Ensure details page shows app provided on command line
gnome-terminal:
- Version update from 3.42.2 to 3.42.3 (jsc#PED-2235):
* Fix build with meson 0.61.0 and newer
* window: Use a normal menu for the popup menu
gnome-user-docs:
- Version update from 41.1 to 41.5 (jsc#PED-2235):
* Added missing icon for network-wired-symbolic
gspell:
- Version update from 1.8.4 to 1.10.0 (jsc#PED-2235):
* Build: distribute more files in tarballs
* Documentation improvements
gtkmm3:
- Version update from 3.24.5 to 3.24.6 (jsc#PED-2235):
* Build with Meson: MSVC build: Support Visual Studio 2022
* Check if Perl is required for building documentation
* Don't use deprecated python3.path() and execute (..., gui_app...)
* GTK: TreeValueProxy: Declare copy constructor = default, avoiding warnings from the claing++ compiler
* Object::_release_c_instance(): Unref orphan managed widgets
* SizeGroup demo: Set active items in the combo boxs, so something is shown
* Specify 'check' option in run_command()
gtk-vnc:
- Version update from 1.3.0 to 1.3.1 (jsc#PED-2235):
* Add 'check' arg to meson run_command()
* Fix invalid use of subprojects with meson
* Support ZRLE encoding for zero size alpha cursors
gupnp-av:
- Version update from 0.12.11 to 0.14.1 (jsc#PED-2235):
* Add utility function to format GDateTime to the iso variant DIDL expects
* Allow to be used as a subproject
* Drop autotools
* Fix stripping @refID
* Fix unsetting subtitleFileType
* Make Feature derivable again
* Obsolete code removal.
* Port to modern GObject
* Remove hand-written ref-counting, use RcBox/AtomicRcBox instead.
* Switch to meson build system, following upstream
- Rename libgupnp-av-1_0-2 subpackage to libgupnp-av-1_0-3, correcting the package name to match the provided library
- Conflict with the wrongly provided libgupnp-av-1_0-2
gvfs:
- Version update from 1.48.1 to 1.48.2 (jsc#PED-2235):
* sftp: Adapt on new OpenSSH password prompts
* smb: Rework anonymous handling to avoid EINVAL
* smb: Ignore EINVAL for kerberos/ccache login
libgsf:
- Version update from 1.14.48 to 1.14.50 (jsc#PED-2235):
* Fix error handling problem when writing ole files
* Fix problems with non-western text in OLE properties
* Use g_date_time_new_from_iso8601 and g_date_time_format_iso8601 when available
libmediaart:
- Version update from 1.9.5 to 1.9.6 (jsc#PED-2235):
* build: Add introspection/vapi/tests options
* build: Use library() to optionally build a static library
libnma:
- Version update from 1.8.32 to 1.8.40 (jsc#PED-2235):
* Ad-Hoc networks now default to using WPA2 instead of WEP
* Add possibility of building libnma-gtk4 library with Gtk4 support
* Do not allow setting empty 802.1x domain for EAP TLS
* Fixed keyboard accelerator for certificate chooser
* Fixed libnma-gtk4 version of mobile-wizard
* Include OWE wireless security option
* The GtkBuilder files for Gtk4 are now included in the release tarball
* WEP is no longer provided as an option for connecting to hidden networks due to its deprecated status
- New sub-packages libnma-gtk4-0, typelib-1_0-NMA4-1_0 and libnma-gtk4-devel
- Split out documentation files in own docs sub-package
libnotify:
- Version update from 0.7.10 to 0.7.12 (jsc#PED-2235):
* Delete unused notifynotification.xml
* Fix potential build errors with old glib version we require
* docs/notify-send: Add --transient option to manpage
* notification: Bookend calling NotifyActionCallback with temporary reference
* notification: Include sender-pid hint by default if not provided
* notify-send: Add debug message about server not supporting persistence
* notify-send: Add explicit option to create transient notifications
* notify-send: Add support for boolean hints
* notify-send: Move server capabilities check to a separate function
* notify-send: Support passing any hint value, by parsing variant strings
libpeas:
- Version update from 1.30.0 to 1.32.0 (jsc#PED-2235):
* Icon licenses have been corrected
* Parallel build system operation fixes
* Use gi-docgen for documentation
* Various build warnings squashed
* Various GIR data that should not have been exported was removed
- Stop packaging the demo files/sub-package
librsvg:
- Version update from 2.52.6 to 2.52.9 (jsc#PED-2235):
* Catch circular references when rendering patterns
* Fix regressions when computing element geometries
* Fix regression outputting all text as paths
libsecret:
- Version update from 0.20.4 to 0.20.5 (jsc#PED-2235):
* Add bash-completion for secret-tool
* Add locking capabilities to secret tool
* Add support for TPM2 based secret storage
* Create default collection after DBus.Error.UnknownObject
* Detect local storage in snaps in the same way as flatpaks
* Drop autotools-based build
* GI annotation and documentation fixes
* Port documentation to gi-docgen
* Use G_GNUC_NULL_TERMINATED where appropriate collection, methods, prompt: Port to GTask
* secret-file-backend: Avoid closing the same file descriptor twice
mutter:
- Version update from 41.5 to 41.9 (jsc#PED-2235):
* Fix '--replace option'
* Fix missing root window properties after XWayland start
* Fix night light without GAMMA_LUT property
* KMS: Survive missing GAMMA_LUT property
* wayland: Fix rotation transform
* Misc. bug fixes
nautilus:
- Version update from 41.2 to 41.5(jsc#PED-2235):
* Drag-and-drop bugfixes
* HighContrast style fixes
orca:
- Version update from 41.1 to 41.3 (jsc#PED-2235):
* Add more event-flood detection and handling for improved performance
* Fix bug causing accessing preferences to fail for Esperanto
* Web: Fix bug causing widgets descending from off-screen label elements to be skipped over
* Web: Fix presentation of the FluentUI react dialog (and any other dialog which has an ARIA document-role descendant)
* WebKitGtk: Fail gracefully when structural navigation commands are used in WebKitGtk 2.36.x
python-cairo:
- Add python3-cairo to SUSE Linux Enterprise Micro 5.3 as it is now required by python3-gobject-cairo
python-gobject:
- Add dependency on python-cairo to python-gobject-cairo: The introspection wrapper needs pycairo (bsc#1179584)
- Version update from 3.42.0 to 3.42.2 (jsc#PED-2235):
* Add a workaround for a PyPy 3.9+ bug when threads are used
* Do not error out for unknown scopes
* Prompt an error instead of crashing when marshaling unsupported fundamental types in some cases
* Fix a crash/refcounting error in case marshaling a hash table fails
* Fix crashes when marshaling zero terminated arrays for certain item types
* Implement DynamicImporter.find_spec() to silence deprecation warning
* Make the test suite pass again with PyPy
* Some test/CI fixes
* gtk overrides: Do not override Treeview.enable_model_drag_xx for GTK4
* gtk overrides: restore Gtk.ListStore.insert_with_valuesv with newer GTK4
* interface: Fix leak when overriding GInterfaceInfo
* setup.py: look up pycairo headers without importing the module
trackers-python:
- Allow system calls used by gstreamer (bsc#1196205)
- Version update from 3.2.2 to 3.2.1 (jsc#PED-2235):
* Backport seccomp rules for rseq and mbind syscalls
vala:
- Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Add missing TraverseVisitor.visit_data_type()
* Add support for "copy_/free_function" metadata for compact classes
* Catch and throw possible inner error of lock statements
* Clear SemanticAnalyzer.current_{symbol,source_file} when not needed anymore
* Don't count instance-parameter when checking for backwards closure reference
* Fix a few binding errors
* Free empty stack list for code contexts
* Handle duplicated and unnamed symbols.
* Improve UI parsing and handling of nested objects and properties
* Make sure to drop our "trap" jump target in case of an error
* Move dynamic property errors to semantic analyzer pass
* Require lvalue access of delegate target/destroy "fields"
* Show source location when reporting deprecations
* Transform assignment of an array element as needed
* manual: Update from wiki.gnome.org
* parser: Improve handling of nullable VarType in with-statement
* parser: Reduce the source reference of main block method to its beginning
xdg-desktop-portal-gnome:
- Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Properly bind property in Lockdown portal
gtk-vnc-1.3.1-150400.3.3.1.src.rpm
gtk-vnc-devel-1.3.1-150400.3.3.1.x86_64.rpm
libgvncpulse-1_0-0-1.3.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GVnc-1_0-1.3.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GVncPulse-1_0-1.3.1-150400.3.3.1.x86_64.rpm
typelib-1_0-GtkVnc-2_0-1.3.1-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4000
Security update for python-Twisted
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python-Twisted fixes the following issues:
- CVE-2022-39348: Fixed NameVirtualHost Host header injection (bsc#1204781).
python-Twisted-22.2.0-150400.5.7.1.src.rpm
python3-Twisted-22.2.0-150400.5.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4130
Security update for frr
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for frr fixes the following issues:
- CVE-2022-37035: Fixed a possible use-after-free due to a race condition related to bgp_notify_send_with_data() and bgp_process_packet() (bsc#1202085).
- CVE-2022-42917: Fixed a privilege escalation from frr to root in frr config creation (bsc#1204124).
frr-7.4-150300.4.10.1.src.rpm
frr-7.4-150300.4.10.1.x86_64.rpm
frr-devel-7.4-150300.4.10.1.x86_64.rpm
libfrr0-7.4-150300.4.10.1.x86_64.rpm
libfrr_pb0-7.4-150300.4.10.1.x86_64.rpm
libfrrcares0-7.4-150300.4.10.1.x86_64.rpm
libfrrfpm_pb0-7.4-150300.4.10.1.x86_64.rpm
libfrrgrpc_pb0-7.4-150300.4.10.1.x86_64.rpm
libfrrospfapiclient0-7.4-150300.4.10.1.x86_64.rpm
libfrrsnmp0-7.4-150300.4.10.1.x86_64.rpm
libfrrzmq0-7.4-150300.4.10.1.x86_64.rpm
libmlag_pb0-7.4-150300.4.10.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4153
Security update for krb5
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for krb5 fixes the following issues:
- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
krb5-1.19.2-150400.3.3.1.src.rpm
krb5-plugin-kdb-ldap-1.19.2-150400.3.3.1.x86_64.rpm
krb5-server-1.19.2-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4141
Security update for grub2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
Other:
- Bump upstream SBAT generation to 3
grub2-2.06-150400.11.17.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.17.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4645
Security update for postgresql14, postgresql15
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14, postgresql15 fixes the following issues:
postgresql15 is shipped in version 15.1.
* https://www.postgresql.org/about/news/2543/
* https://www.postgresql.org/docs/15/release-15-1.html
Update to 15.0:
* https://www.postgresql.org/about/news/p-2526/
* https://www.postgresql.org/docs/15/release-15.html
postgresql14 was updated to 14.6. (bsc#1205300)
* https://www.postgresql.org/about/news/2543/
* https://www.postgresql.org/docs/14/release-14-6.html
The libpq5 and libecpg6 libraries are now provided by postgresql15.
libecpg6-15.1-150200.5.3.2.x86_64.rpm
postgresql-15-150400.4.6.2.src.rpm
postgresql-contrib-15-150400.4.6.2.noarch.rpm
postgresql-devel-15-150400.4.6.2.noarch.rpm
postgresql-docs-15-150400.4.6.2.noarch.rpm
postgresql-plperl-15-150400.4.6.2.noarch.rpm
postgresql-plpython-15-150400.4.6.2.noarch.rpm
postgresql-pltcl-15-150400.4.6.2.noarch.rpm
postgresql-server-15-150400.4.6.2.noarch.rpm
postgresql-server-devel-15-150400.4.6.2.noarch.rpm
postgresql14-14.6-150200.5.20.2.src.rpm
postgresql14-contrib-14.6-150200.5.20.2.x86_64.rpm
postgresql14-devel-14.6-150200.5.20.2.x86_64.rpm
postgresql14-docs-14.6-150200.5.20.2.noarch.rpm
postgresql14-plperl-14.6-150200.5.20.2.x86_64.rpm
postgresql14-plpython-14.6-150200.5.20.2.x86_64.rpm
postgresql14-pltcl-14.6-150200.5.20.2.x86_64.rpm
postgresql14-server-14.6-150200.5.20.2.x86_64.rpm
postgresql14-server-devel-14.6-150200.5.20.2.x86_64.rpm
postgresql15-15.1-150200.5.3.2.src.rpm
postgresql15-contrib-15.1-150200.5.3.2.x86_64.rpm
postgresql15-devel-15.1-150200.5.3.2.x86_64.rpm
postgresql15-docs-15.1-150200.5.3.2.noarch.rpm
postgresql15-plperl-15.1-150200.5.3.2.x86_64.rpm
postgresql15-plpython-15.1-150200.5.3.2.x86_64.rpm
postgresql15-pltcl-15.1-150200.5.3.2.x86_64.rpm
postgresql15-server-15.1-150200.5.3.2.x86_64.rpm
postgresql15-server-devel-15.1-150200.5.3.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4420
Recommended update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
- Pass the context to pillar ext modules
- Align Amazon EC2 (Nitro) grains with upstream (bsc#1203685)
- Detect module run syntax version
- Implement automated patches alignment for the Salt Bundle
- Ignore extend declarations from excluded SLS files (bsc#1203886)
- Clarify pkg.installed pkg_verify documentation
- Enhance capture of error messages for Zypper calls in zypperpkg module
- Make pass renderer configurable and fix detected issues
- Workaround fopen line buffering for binary mode (bsc#1203834)
salt-3004-150400.8.17.7.src.rpm
True
salt-api-3004-150400.8.17.7.x86_64.rpm
True
salt-cloud-3004-150400.8.17.7.x86_64.rpm
True
salt-fish-completion-3004-150400.8.17.7.noarch.rpm
True
salt-master-3004-150400.8.17.7.x86_64.rpm
True
salt-proxy-3004-150400.8.17.7.x86_64.rpm
True
salt-ssh-3004-150400.8.17.7.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.17.7.x86_64.rpm
True
salt-syndic-3004-150400.8.17.7.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4383
Recommended update for iputils
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for iputils fixes the following issues:
- Fix occasional memory access violation when using `ping` (bsc#1203957)
iputils-20211215-150400.3.3.2.src.rpm
rarpd-20211215-150400.3.3.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4385
Recommended update for clone-master-clean-up
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for clone-master-clean-up fixes the following issues:
Version update from 1.8 to 1.10:
- Fix failure if postfix is not installed by adding a check for the directory's existance (bsc#1204835)
- Clean up initiatorname.iscsi (bsc#1203024)
clone-master-clean-up-1.10-150100.3.17.1.noarch.rpm
clone-master-clean-up-1.10-150100.3.17.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4215
Security update for erlang
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for erlang fixes the following issues:
- CVE-2022-37026: fixed a client authorization bypass vulnerability for SSL,
TLS, and DTLS in Erlang/OTP. [bsc#1205318]
erlang-22.3-150300.3.3.1.src.rpm
erlang-22.3-150300.3.3.1.x86_64.rpm
erlang-epmd-22.3-150300.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4384
Recommended update for migrate-sles-to-sles4sap
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for migrate-sles-to-sles4sap fixes the following issues:
- Add missing required package dependencies to wget, coreutils, openssl and SUSE Connect (bsc#1205281)
migrate-sles-to-sles4sap-15.1.2-150100.3.12.1.noarch.rpm
migrate-sles-to-sles4sap-15.1.2-150100.3.12.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4396
Recommended update for frr
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of frr fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
frr-7.4-150300.4.12.1.src.rpm
frr-7.4-150300.4.12.1.x86_64.rpm
frr-devel-7.4-150300.4.12.1.x86_64.rpm
libfrr0-7.4-150300.4.12.1.x86_64.rpm
libfrr_pb0-7.4-150300.4.12.1.x86_64.rpm
libfrrcares0-7.4-150300.4.12.1.x86_64.rpm
libfrrfpm_pb0-7.4-150300.4.12.1.x86_64.rpm
libfrrgrpc_pb0-7.4-150300.4.12.1.x86_64.rpm
libfrrospfapiclient0-7.4-150300.4.12.1.x86_64.rpm
libfrrsnmp0-7.4-150300.4.12.1.x86_64.rpm
libfrrzmq0-7.4-150300.4.12.1.x86_64.rpm
libmlag_pb0-7.4-150300.4.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4457
Security update for libtpms
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libtpms fixes the following issues:
- CVE-2021-3623: Fixed out-of-bounds access when trying to resume the
state of the vTPM (bsc#1187767)
libtpms-0.8.2-150300.3.6.1.src.rpm
libtpms-devel-0.8.2-150300.3.6.1.x86_64.rpm
libtpms0-0.8.2-150300.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4365
Recommended update for powerman
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of powerman fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
libpowerman0-2.3.26-150400.3.2.1.x86_64.rpm
powerman-2.3.26-150400.3.2.1.src.rpm
powerman-2.3.26-150400.3.2.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4378
Security update for rabbitmq-server
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rabbitmq-server fixes the following issues:
- CVE-2022-31008: Fixed predictable secret seed in URI encryption (bsc#1205267).
erlang-rabbitmq-client-3.8.11-150300.3.11.1.x86_64.rpm
rabbitmq-server-3.8.11-150300.3.11.1.src.rpm
rabbitmq-server-3.8.11-150300.3.11.1.x86_64.rpm
rabbitmq-server-plugins-3.8.11-150300.3.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4338
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of 389-ds fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
389-ds-2.0.16~git56.d15a0a7-150400.3.17.1.src.rpm
389-ds-2.0.16~git56.d15a0a7-150400.3.17.1.x86_64.rpm
389-ds-devel-2.0.16~git56.d15a0a7-150400.3.17.1.x86_64.rpm
lib389-2.0.16~git56.d15a0a7-150400.3.17.1.x86_64.rpm
libsvrcore0-2.0.16~git56.d15a0a7-150400.3.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4626
Security update for freeradius-server
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for freeradius-server fixes the following issues:
- CVE-2022-41859: Fixes an information leakage in EAP-PWD (bsc#1206204).
- CVE-2022-41860: Fixes a crash on unknown option in EAP-SIM (bsc#1206205).
- CVE-2022-41861: Fixes a crash on invalid abinary data (bsc#1206206).
- rebuild against the new net-snmp (jsc#SLE-11203).
freeradius-server-3.0.25-150400.4.4.1.src.rpm
freeradius-server-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-devel-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-krb5-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-ldap-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-libs-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-mysql-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-perl-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-postgresql-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-python3-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-sqlite-3.0.25-150400.4.4.1.x86_64.rpm
freeradius-server-utils-3.0.25-150400.4.4.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1913
Recommended update for libslirp, slirp4netns
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libslirp and slirp4netns fixes the following issues:
libslirp was updated to version 4.7.0+44 (current git master):
* Fix vmstate regression
* Align outgoing packets
* Bump incoming packet alignment to 8 bytes
* vmstate: only enable when building under GNU C
* ncsitest: Fix build with msvc
* Separate out SLIRP_PACKED to SLIRP_PACKED_BEGIN/END
* ncsi: Add Mellanox Get Mac Address handler
* slirp: Add out-of-band ethernet address
* ncsi: Add OEM command handler
* ncsi: Add basic test for Get Version ID response
* ncsi: Use response header for payload length
* ncsi: Pass command header to response handlers
* ncsi: Add Get Version ID command
* ncsi: Pass Slirp structure to response handlers
* slirp: Add manufacturer's ID
Release v4.7.0
* slirp: invoke client callback before creating timers
* pingtest: port to timer_new_opaque
* introduce timer_new_opaque callback
* introduce slirp_timer_new wrapper
* icmp6: make ndp_send_ra static
* socket: Handle ECONNABORTED from recv
* bootp: fix g_str_has_prefix warning/critical
* slirp: Don't duplicate packet in tcp_reass
* Rename insque/remque -> slirp_[ins|rem]que
* mbuf: Use SLIRP_DEBUG to enable mbuf debugging instead of DEBUG
* Replace inet_ntoa() with safer inet_ntop()
* Add VMS_END marker
* bootp: add support for UEFI HTTP boot
* IPv6 DNS proxying support
* Add missing scope_id in caching
* socket: Move closesocket(so->s_aux) to sofree
* socket: Check so_type instead of so_tcpcb for Unix-to-inet translation
* socket: Add s_aux field to struct socket for storing auxilliary socket
* socket: Initialize so_type in socreate
* socket: Allocate Unix-to-TCP hostfwd port from OS by binding to port 0
* Allow to disable internal DHCP server
* slirp_pollfds_fill: Explain why dividing so_snd.sb_datalen by two
* CI: run integration tests with slirp4netns
* socket: Check address family for Unix-to-inet accept translation
* socket: Add debug args for tcpx_listen (inet and Unix sockets)
* socket: Restore original definition of fhost
* socket: Move <sys/un.h> include to socket.h
* Support Unix sockets in hostfwd
* resolv: fix IPv6 resolution on Darwin
* Use the exact sockaddr size in getnameinfo call
* Initialize sin6_scope_id to zero
* slirp_socketpair_with_oob: Connect pair through 127.0.0.1
* resolv: fix memory leak when using libresolv
* pingtest: Add a trivial ping test
* icmp: Support falling back on trying a SOCK_RAW socket
Update to version 4.6.1+7:
* Haiku: proper path to resolv.conf for DNS server
* Fix for Haiku
* dhcp: Always send DHCP_OPT_LEN bytes in options
Update to version 4.6.1:
* Fix "DHCP broken in libslirp v4.6.0"
Update to version 4.6.0:
* udp: check upd_input buffer size
* tftp: introduce a header structure
* tftp: check tftp_input buffer size
* upd6: check udp6_input buffer size
* bootp: check bootp_input buffer size
* bootp: limit vendor-specific area to input packet memory buffer
Update to version 4.4.0:
* socket: consume empty packets
* slirp: check pkt_len before reading protocol header
* Add DNS resolving for iOS
* sosendoob: better document what urgc is used for
* TCPIPHDR_DELTA: Fix potential negative value
* udp, udp6, icmp, icmp6: Enable forwarding errors on Linux
* icmp, icmp6: Add icmp_forward_error and icmp6_forward_error
* udp, udp6, icmp: handle TTL value
* ip_stripoptions use memmove
slirp4netns was updated to 1.2.0:
* Add slirp4netns --target-type=bess /path/to/bess.sock for supporting UML (#281)
* Explicitly support DHCP (#270)
* Update parson to v1.1.3 (#273) kgabis/parson@70dc239...2d7b3dd
Update to version 1.1.11:
* Add --macaddress option to specify the MAC address of the tap interface.
* Updated the man page.
Update to version 1.1.8:
Update to 1.0.0:
* --enable-sandbox is now out of experimental
libslirp-4.7.0+44-150300.15.2.src.rpm
libslirp-devel-4.7.0+44-150300.15.2.x86_64.rpm
libslirp0-4.7.0+44-150300.15.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2022-4455
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- support pam_saslauthd for authentication pass through
requirements. (jsc#PED-2701 bsc#1205974)
Update to version 2.0.17~git7.959d36e:
* RFE - split pass through auth cli
* BUG - Pam PTA multiple issues
* Increase default task TTL
Update to version 2.0.17~git4.9447f5f:
* Fix typo in `lib389.cli_conf.backend._get_backend` (#5542)
* Make logger's parameter name unified (#5540)
* Bump VERSION.sh to 2.0.17
* Fix a rebase typo (#5537)
* Bump version ot 2.0.17
* Add copyright text to the repository files
* Make db compaction TOD day more robust.
* UI - Fix npm vulnerability in loader-utils
* UI - fix audit issue with npm loader-utils (#5514)
* Fix dsctl tls ca-certfiicate add-cert arg requirement
* RFE - CLI allow adding CA certificate bundles
* memberof is slow on update/fixup if there are several 'groupattr' (#5455)
389-ds-2.0.17~git7.959d36e-150400.3.20.1.src.rpm
389-ds-2.0.17~git7.959d36e-150400.3.20.1.x86_64.rpm
389-ds-devel-2.0.17~git7.959d36e-150400.3.20.1.x86_64.rpm
lib389-2.0.17~git7.959d36e-150400.3.20.1.x86_64.rpm
libsvrcore0-2.0.17~git7.959d36e-150400.3.20.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-19
Security update for rmt-server
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rmt-server fixes the following issues:
Update to version 2.10:
- Add option to turn off system token support (bsc#1205089)
- Update the `last_seen_at` column on zypper service refresh
- Do not retry to import non-existing files in air-gapped mode (bsc#1204769)
- CVE-2022-31254: Fixed a local privilege escalation related to the packaging of rmt-server (bsc#1204285).
rmt-server-2.10-150400.3.9.1.src.rpm
rmt-server-2.10-150400.3.9.1.x86_64.rpm
rmt-server-config-2.10-150400.3.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-142
Feature update for bind
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
Version update from 9.16.33 to 9.16.35 (jsc#SLE-24801, jsc#SLE-24600)
- New Features:
* Support for parsing and validating the dohpath service
parameter in SVCB records was added.
* named now logs the supported cryptographic algorithms during
startup and in the output of named -V
- Bug Fixes:
* A crash was fixed that happened when a dnssec-policy zone that
used NSEC3 was reconfigured to enable inline-signing.
* In certain resolution scenarios, quotas could be erroneously
reached for servers, including any configured forwarders,
resulting in SERVFAIL answers being sent to clients.
* rpz-ip rules in response-policy zones could be ineffective in
some cases if a query had the CD (Checking Disabled) bit set to
1.
* Previously, if Internet connectivity issues were experienced
during the initial startup of named, a BIND resolver with
dnssec-validation set to auto could enter into a state where it
would not recover without stopping named, manually deleting the
managed-keys.bind and managed-keys.bind.jnl files, and starting
named again.
* The statistics counter representing the current number of
clients awaiting recursive resolution results (RecursClients)
could overflow in certain resolution scenarios.
* Previously, BIND failed to start on Solaris-based systems with
hundreds of CPUs.
* When a DNS resource records TTL value was equal to the
resolver configured prefetch eligibility value, the record
was erroneously not treated as eligible for prefetching.
* Changing just the TSIG key names for primaries in catalog
zones member zones was not effective. This has been fixed.
- Known Issues:
* Upgrading from BIND 9.16.32 or any older version may require a
manual configuration change. The following configurations are
affected:
+ type primary zones configured with dnssec-policy but without
either allow-update or update-policy
+ type secondary zones configured with dnssec-policy
In these cases please add inline-signing yes; to the individual
zone configuration(s). Without applying this change, named will
fail to start. For more details, see
https://kb.isc.org/docs/dnssec-policy-requires-dynamic-dns-or-inline-signing
bind-9.16.35-150400.5.14.1.src.rpm
bind-9.16.35-150400.5.14.1.x86_64.rpm
bind-doc-9.16.35-150400.5.14.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-177
Recommended update for util-linux
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for util-linux fixes the following issues:
- Fix tests not passing when '@' character is in build path:
Fixes rpmbuild %checks fail when @ in the directory path (bsc#1194038).
- libuuid continuous clock handling for time based UUIDs:
Prevent use of the new libuuid ABI by uuidd %post before update
of libuuid1 (bsc#1205646).
util-linux-systemd-2.37.2-150400.8.14.1.src.rpm
uuidd-2.37.2-150400.8.14.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-103
Security update for postgresql-jdbc
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql-jdbc fixes the following issues:
- CVE-2022-41946: Fixed a local information disclosure issue due to
improper handling of temporary files (bsc#1206921).
postgresql-jdbc-42.2.25-150400.3.9.2.noarch.rpm
postgresql-jdbc-42.2.25-150400.3.9.2.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-346
Recommended update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
- Control the collection of lvm grains via config (bsc#1204939)
salt-3004-150400.8.20.1.src.rpm
True
salt-api-3004-150400.8.20.1.x86_64.rpm
True
salt-cloud-3004-150400.8.20.1.x86_64.rpm
True
salt-fish-completion-3004-150400.8.20.1.noarch.rpm
True
salt-master-3004-150400.8.20.1.x86_64.rpm
True
salt-proxy-3004-150400.8.20.1.x86_64.rpm
True
salt-ssh-3004-150400.8.20.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.20.1.x86_64.rpm
True
salt-syndic-3004-150400.8.20.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-295
Security update for redis
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-35977: Fixed an integer overflow that could allow
authenticated users to cause a crash (bsc#1207202).
- CVE-2023-22458: Fixed a missing check that could allow authenticated
users to cause a crash (bsc#1207203).
redis-6.2.6-150400.3.11.1.src.rpm
redis-6.2.6-150400.3.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-169
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-23824: Fixed multiple speculative execution issues (bnc#1205209).
Non-security fixes:
- Updated to version 4.16.3 (bsc#1027519).
xen-4.16.3_02-150400.4.19.1.src.rpm
True
xen-4.16.3_02-150400.4.19.1.x86_64.rpm
True
xen-devel-4.16.3_02-150400.4.19.1.x86_64.rpm
True
xen-tools-4.16.3_02-150400.4.19.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.3_02-150400.4.19.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-322
Security update for apache2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2 fixes the following issues:
- CVE-2022-37436: Fixed an issue in mod_proxy where a malicious
backend could cause the response headers to be truncated early,
resulting in some headers being incorporated into the response body
(bsc#1207251).
- CVE-2022-36760: Fixed an issue in mod_proxy_ajp that could allow
request smuggling attacks (bsc#1207250).
- CVE-2006-20001: Fixed an issue in mod_proxy_ajp where a request
header could cause memory corruption (bsc#1207247).
apache2-2.4.51-150400.6.6.1.src.rpm
apache2-devel-2.4.51-150400.6.6.1.x86_64.rpm
apache2-doc-2.4.51-150400.6.6.1.noarch.rpm
apache2-worker-2.4.51-150400.6.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-212
Security update for nginx
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for nginx fixes the following issues:
- CVE-2022-41741: Handle duplicated atoms in mp4 streams, to mitigate out-of-bound reads. (bsc#1204526)
- CVE-2022-41742: Handle duplicated atoms in mp4 streams, to mitigate out-of-bound reads. (bsc#1204527)
nginx-1.21.5-150400.3.3.1.src.rpm
nginx-1.21.5-150400.3.3.1.x86_64.rpm
nginx-source-1.21.5-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-314
Security update for apache2-mod_security2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_security2 fixes the following issues:
- CVE-2022-48279: Fixed a potential firewall bypass due to an
incorrect parsing of HTTP multipart requests (bsc#1207378).
apache2-mod_security2-2.9.4-150400.3.3.1.src.rpm
apache2-mod_security2-2.9.4-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-341
Security update for bind
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
- Updated to version 9.16.37 (jsc#SLE-24600):
- CVE-2022-3094: Fixed an issue where a message flood could exhaust
all available memory (bsc#1207471).
- CVE-2022-3736: Fixed a potential crash upon receiving an RRSIG in
configurations with stale cache and stale answers enabled and
stale-answer-client-timeout set to a positive value (bsc#1207473).
- CVE-2022-3924: Fixed a potential crash upon reaching the
recursive-clients soft quota in configurations with stale answers
enabled and stale-answer-client-timeout set to a positive value
(bsc#1207475).
bind-9.16.37-150400.5.17.1.src.rpm
bind-9.16.37-150400.5.17.1.x86_64.rpm
bind-doc-9.16.37-150400.5.17.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-389
Security update for apr-util
critical
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apr-util fixes the following issues:
- CVE-2022-25147: Fixed a buffer overflow possible with specially crafted input during base64 encoding (bsc#1207866)
apr-util-1.6.1-150300.18.5.1.src.rpm
libapr-util1-dbd-mysql-1.6.1-150300.18.5.1.x86_64.rpm
libapr-util1-dbd-pgsql-1.6.1-150300.18.5.1.x86_64.rpm
libapr-util1-dbd-sqlite3-1.6.1-150300.18.5.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-785
Recommended update for grub2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
- Remove zfs modules (bsc#1205554)
- Make grub.cfg invariant to efi and legacy platforms (bsc#1205200)
grub2-2.06-150400.11.23.2.src.rpm
grub2-x86_64-xen-2.06-150400.11.23.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-473
Recommended update for libica, openssl-ibmca, openCryptoki
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libica fixes the following issues:
libica was upgraded to version 4.2.0 (jsc#PED-581, bsc#1202365).
Note that the major library versions was changed from libica.so.3 to libica.so.4.
Features:
- Display build info via icainfo -v
- New API function ica_get_build_version()
- Display fips indication via icainfo -f
- New API function ica_get_fips_indicator()
- New API function ica_aes_gcm_initialize_fips()
- New API function ica_aes_gcm_kma_get_iv()
- New API function ica_get_msa_level()
Upgrade to version 4.1.1 (jsc#PED-581, bsc#1202365).
v4.1.1:
- Fix aes-xts multi-part operations
v4.1.0
- FIPS: make libica FIPS 140-3 compliant
- New API function ica_ecdsa_sign_ex()
- New icainfo output option -r
Upgraded to version 4.0.3 (jsc#PED-581, jsc#PED-621, jsc#PED-629)
v4.0.3
- Reduce the number of open file descriptors
- Various bug fixes
v4.0.2
- Various bug fixes
v4.0.1
- Various bug fixes
- Compute HMAC from installed library
v4.0.0
- NO_SW_FALLBACKS is now the default for libica.so
- Removed deprecated API functions including tests
- Introduced 'const' for some API function parameters
- icastats: new parm -k to display detailed counters
This update also provides rebuilds of openssl-ibmca and openCryptoki against the new libica.
openssl-ibmca was updated:
- Upgraded to version 2.3.1 (jsc#PED-597)
- Adjustments for libica 4.1.0
- First version including the provider
- Fix for engine build without OpenSSL 3.0 sources
- Fix PKEY segfault with OpenSSL 3.0
- Build against libica 4.0
openCryptoki-3.17.0-150400.4.8.1.src.rpm
openCryptoki-3.17.0-150400.4.8.1.x86_64.rpm
openCryptoki-devel-3.17.0-150400.4.8.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-605
Recommended update for quagga
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of quagga fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
libfpm_pb0-1.1.1-150400.12.2.1.x86_64.rpm
libospf0-1.1.1-150400.12.2.1.x86_64.rpm
libospfapiclient0-1.1.1-150400.12.2.1.x86_64.rpm
libquagga_pb0-1.1.1-150400.12.2.1.x86_64.rpm
libzebra1-1.1.1-150400.12.2.1.x86_64.rpm
quagga-1.1.1-150400.12.2.1.src.rpm
quagga-1.1.1-150400.12.2.1.x86_64.rpm
quagga-devel-1.1.1-150400.12.2.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1727
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- Prevent memory access violation in `cl5configtrim` (bsc#1205996)
- Improve pam_saslauthd migration handling from openldap (bsc#1206563)
- Add functionality to do bulk updates to entries
- Improve `saslauthd` migration options
- Update plugins for new split PAM and LDAP pass thru auth
- Add specialized group edit modal to the UI
- 'dsidm' now asks for the old password on password reset
- Prevent virtual attribute indexing
- Allow mutliple MemberOf fixup tasks with different bases/filters
389-ds-2.0.17~git20.ff6dbd9-150400.3.23.1.src.rpm
389-ds-2.0.17~git20.ff6dbd9-150400.3.23.1.x86_64.rpm
389-ds-devel-2.0.17~git20.ff6dbd9-150400.3.23.1.x86_64.rpm
lib389-2.0.17~git20.ff6dbd9-150400.3.23.1.x86_64.rpm
libsvrcore0-2.0.17~git20.ff6dbd9-150400.3.23.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-569
Security update for postgresql15
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql15 fixes the following issues:
Update to 15.2:
- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
libecpg6-15.2-150200.5.6.1.x86_64.rpm
postgresql15-15.2-150200.5.6.1.src.rpm
postgresql15-contrib-15.2-150200.5.6.1.x86_64.rpm
postgresql15-devel-15.2-150200.5.6.1.x86_64.rpm
postgresql15-docs-15.2-150200.5.6.1.noarch.rpm
postgresql15-plperl-15.2-150200.5.6.1.x86_64.rpm
postgresql15-plpython-15.2-150200.5.6.1.x86_64.rpm
postgresql15-pltcl-15.2-150200.5.6.1.x86_64.rpm
postgresql15-server-15.2-150200.5.6.1.x86_64.rpm
postgresql15-server-devel-15.2-150200.5.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-431
Security update for apache2-mod_security2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_security2 fixes the following issues:
- CVE-2023-24021: Fixed FILES_TMP_CONTENT missing complete content (bsc#1207379).
apache2-mod_security2-2.9.4-150400.3.6.1.src.rpm
apache2-mod_security2-2.9.4-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-692
Security update for xen
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-27672: Fixed speculative execution vulnerability due to RAS being dynamically partitioned between non-idle threads (bsc#1208286).
Bugfixes:
- Fixed launch-xenstore error (bsc#1205792)
- Fixed issues in VMX (bsc#1027519).
xen-4.16.3_04-150400.4.22.1.src.rpm
xen-4.16.3_04-150400.4.22.1.x86_64.rpm
xen-devel-4.16.3_04-150400.4.22.1.x86_64.rpm
xen-tools-4.16.3_04-150400.4.22.1.x86_64.rpm
xen-tools-xendomains-wait-disk-4.16.3_04-150400.4.22.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1593
Recommended update for certification-sles-eal4
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for certification-sles-eal4 fixes the following issues:
- Update to version 15.2+git20230219.8d115ca:
* fixed setenv syntax for CSH configuration script (bsc#1199905)
certification-sles-eal4-15.2+git20230219.8d115ca-150200.5.18.1.src.rpm
certification-sles-eal4-15.2+git20230219.8d115ca-150200.5.18.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-517
Recommended update for openhpi
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of openhpi fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
libopenhpi4-3.8.0-150400.10.2.1.x86_64.rpm
openhpi-3.8.0-150400.10.2.1.src.rpm
openhpi-3.8.0-150400.10.2.1.x86_64.rpm
openhpi-clients-3.8.0-150400.10.2.1.x86_64.rpm
openhpi-daemon-3.8.0-150400.10.2.1.x86_64.rpm
openhpi-devel-3.8.0-150400.10.2.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1658
Security update for apache2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2 fixes the following issues:
- CVE-2023-27522: Fixed HTTP response splitting in mod_proxy_uwsgi (bsc#1209049).
- CVE-2023-25690: Fixed HTTP request splitting with mod_rewrite and mod_proxy (bsc#1209047).
The following non-security bugs were fixed:
- Fixed mod_proxy handling of very long urls (bsc#1207327)
- Fixed passing health check does not recover worker from its error state (bsc#1208708).
apache2-2.4.51-150400.6.11.1.src.rpm
apache2-devel-2.4.51-150400.6.11.1.x86_64.rpm
apache2-doc-2.4.51-150400.6.11.1.noarch.rpm
apache2-worker-2.4.51-150400.6.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-614
Recommended update for nut
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of nut fixes the following issues:
- rebuild against the new net-snmp (jsc#SLE-11203).
nut-2.7.4-150400.15.2.1.src.rpm
nut-2.7.4-150400.15.2.1.x86_64.rpm
nut-devel-2.7.4-150400.15.2.1.x86_64.rpm
nut-drivers-net-2.7.4-150400.15.2.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-807
Recommended update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
- Fix problem with detecting PTF packages (bsc#1208691)
- Fix pkg.version_cmp on openEuler systems and a few other OS flavors
- Make pkg.remove function from zypperpkg module to handle also PTF packages
salt-3004-150400.8.25.1.src.rpm
True
salt-api-3004-150400.8.25.1.x86_64.rpm
True
salt-cloud-3004-150400.8.25.1.x86_64.rpm
True
salt-fish-completion-3004-150400.8.25.1.noarch.rpm
True
salt-master-3004-150400.8.25.1.x86_64.rpm
True
salt-proxy-3004-150400.8.25.1.x86_64.rpm
True
salt-ssh-3004-150400.8.25.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3004-150400.8.25.1.x86_64.rpm
True
salt-syndic-3004-150400.8.25.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-671
Security update for qemu
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2022-4144: Fixed qxl_phys2virt unsafe address translation that can lead to out-of-bounds read (bsc#1205808).
- CVE-2022-3165: Fixed integer underflow in vnc_client_cut_text_ext() (bsc#1203788).
- CVE-2022-1050: Fixed use-after-free issue in pvrdma_exec_cmd() (bsc#1197653).
Bugfixes:
- Fixed deviation of guest clock (bsc#1206527).
- Fixed broken "block limits" VPD emulation (bsc#1202364).
qemu-6.2.0-150400.37.11.1.src.rpm
qemu-6.2.0-150400.37.11.1.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.11.1.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.11.1.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.11.1.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.11.1.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.11.1.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.11.1.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.11.1.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.11.1.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.11.1.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.11.1.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.11.1.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.11.1.noarch.rpm
qemu-ksm-6.2.0-150400.37.11.1.x86_64.rpm
qemu-kvm-6.2.0-150400.37.11.1.x86_64.rpm
qemu-lang-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.11.1.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.11.1.x86_64.rpm
qemu-x86-6.2.0-150400.37.11.1.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.11.1.noarch.rpm
qemu-sgabios-8-150400.37.11.1.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.11.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1751
Recommended update for clone-master-clean-up
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for clone-master-clean-up fixes the following issue:
- clone-master-clean-up fails when /etc/iscsi/initiatorname.iscsi doesn't exist (bsc#1207993)
clone-master-clean-up-1.11-150100.3.20.1.noarch.rpm
clone-master-clean-up-1.11-150100.3.20.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1697
Recommended update for bind
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
- A constant stream of zone additions and deletions via rndc reconfig could cause increased memory consumption due to
delayed cleaning of view memory.
- The speed of the message digest algorithms (MD5, SHA-1, SHA-2) and of NSEC3 hashing has been improved.
- Building BIND 9 failed when the --enable-dnsrps switch for ./configure was used. (jsc#SLE-24600)
- Updated keyring and signature
bind-9.16.38-150400.5.20.2.src.rpm
bind-9.16.38-150400.5.20.2.x86_64.rpm
bind-doc-9.16.38-150400.5.20.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-705
Security update for postgresql14
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14 fixes the following issues:
Update to 14.7:
- CVE-2022-41862: Fixed memory leak in libpq (bsc#1208102).
postgresql14-14.7-150200.5.23.1.src.rpm
postgresql14-contrib-14.7-150200.5.23.1.x86_64.rpm
postgresql14-devel-14.7-150200.5.23.1.x86_64.rpm
postgresql14-docs-14.7-150200.5.23.1.noarch.rpm
postgresql14-plperl-14.7-150200.5.23.1.x86_64.rpm
postgresql14-plpython-14.7-150200.5.23.1.x86_64.rpm
postgresql14-pltcl-14.7-150200.5.23.1.x86_64.rpm
postgresql14-server-14.7-150200.5.23.1.x86_64.rpm
postgresql14-server-devel-14.7-150200.5.23.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-633
Recommended update for oracleasm
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for oracleasm fixes the following issue:
- Installation and stability issues such as kernel panics caused by compatibility issues. (bsc#1202844)
oracleasm-2.0.8-150400.25.5.1.src.rpm
oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.46-150400.25.5.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-694
Security update for redis
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-36021: Fixed integer overflow in RANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands (bsc#1208790).
- CVE-2023-25155: Fixed integer Overflow in RAND commands can lead to assertion (bsc#1208793).
The following non-security bug was fixed:
- Fixed redis-sentinel not starting due to the hardening in the systemd service (bsc#1208235).
redis-6.2.6-150400.3.16.1.src.rpm
redis-6.2.6-150400.3.16.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1739
Security update for pgadmin4
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for pgadmin4 fixes the following issues:
- CVE-2023-22298: Fixed an open redirect vulnerability (bsc#1207238).
pgadmin4-4.30-150300.3.6.1.src.rpm
pgadmin4-4.30-150300.3.6.1.x86_64.rpm
pgadmin4-doc-4.30-150300.3.6.1.noarch.rpm
pgadmin4-web-4.30-150300.3.6.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1298
Recommended update for ndctl
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for ndctl fixes the following issues:
- Fix parsing of environment variable NDCTL_TIMEOUT (bsc#1208548)
ndctl-71.1-150400.10.3.1.src.rpm
ndctl-71.1-150400.10.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-879
Security update for qemu
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2021-3507: Fixed heap buffer overflow in DMA read data transfers in fdc (bsc#1185000).
- CVE-2020-14394: Fixed infinite loop in xhci_ring_chain_length() (bsc#1180207).
qemu-6.2.0-150400.37.14.2.src.rpm
qemu-6.2.0-150400.37.14.2.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.14.2.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.14.2.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.14.2.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.14.2.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.14.2.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.14.2.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.14.2.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.14.2.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.14.2.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.14.2.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.14.2.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.14.2.noarch.rpm
qemu-ksm-6.2.0-150400.37.14.2.x86_64.rpm
qemu-kvm-6.2.0-150400.37.14.2.x86_64.rpm
qemu-lang-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.14.2.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.14.2.x86_64.rpm
qemu-x86-6.2.0-150400.37.14.2.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.14.2.noarch.rpm
qemu-sgabios-8-150400.37.14.2.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.14.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-848
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2022-42332: Fixed use-after-free in x86 shadow plus log-dirty mode (bsc#1209017).
- CVE-2022-42333,CVE-2022-42334: Fixed x86/HVM pinned cache attributes mis-handling (bsc#1209018).
- CVE-2022-42331: Fixed speculative vulnerability in 32bit SYSCALL path on x86 (bsc#1209019).
xen-4.16.3_06-150400.4.25.1.src.rpm
True
xen-4.16.3_06-150400.4.25.1.x86_64.rpm
True
xen-devel-4.16.3_06-150400.4.25.1.x86_64.rpm
True
xen-tools-4.16.3_06-150400.4.25.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.3_06-150400.4.25.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1759
Security update for dpdk
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of dpdk fixes the following issues:
- rebuild the package with the new secure boot key (bsc#1209188).
dpdk-19.11.10-150400.4.9.1.src.rpm
dpdk-19.11.10-150400.4.9.1.x86_64.rpm
dpdk-devel-19.11.10-150400.4.9.1.x86_64.rpm
dpdk-kmp-default-19.11.10_k5.14.21_150400.24.46-150400.4.9.1.x86_64.rpm
dpdk-tools-19.11.10-150400.4.9.1.x86_64.rpm
libdpdk-20_0-19.11.10-150400.4.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1760
Security update for oracleasm
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of oracleasm fixes the following issues:
- rebuild the package with the new secure boot key (bsc#1209188).
oracleasm-2.0.8-150400.25.7.1.src.rpm
oracleasm-kmp-default-2.0.8_k5.14.21_150400.24.46-150400.25.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1717
Security update for grub2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of grub2 fixes the following issues:
- rebuild the package with the new secure boot key (bsc#1209188).
grub2-2.06-150400.11.25.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.25.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2783
Security update for grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python-cryptography-vectors, python-google-api-core, python-googleapis-common-protos, python-grpcio-gcp, python-humanfriendly, python-jsondiff, python-knack, python-opencensus, python-opencensus-context, python-opencensus-ext-threading, python-opentelemetry-api, python-psutil, python-pytest-asyncio, python-requests, python-websocket-client, python-websockets
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python-cryptography-vectors, python-google-api-core, python-googleapis-common-protos, python-grpcio-gcp, python-humanfriendly, python-jsondiff, python-knack, python-opencensus, python-opencensus-context, python-opencensus-ext-threading, python-opentelemetry-api, python-psutil, python-pytest-asyncio, python-requests, python-websocket-client, python-websockets fixes the following issues:
grpc:
- Update in SLE-15 (bsc#1197726, bsc#1144068)
protobuf:
- Fix a potential DoS issue in protobuf-cpp and protobuf-python, CVE-2022-1941, bsc#1203681
- Fix a potential DoS issue when parsing with binary data in protobuf-java, CVE-2022-3171, bsc#1204256
- Fix potential Denial of Service in protobuf-java in the parsing procedure for binary data, CVE-2021-22569, bsc#1194530
- Add missing dependency of python subpackages on python-six (bsc#1177127)
- Updated to version 3.9.2 (bsc#1162343)
* Remove OSReadLittle* due to alignment requirements.
* Don't use unions and instead use memcpy for the type swaps.
- Disable LTO (bsc#1133277)
python-aiocontextvars:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
python-avro:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
python-cryptography:
- update to 3.3.2 (bsc#1182066, CVE-2020-36242, bsc#1198331)
* SECURITY ISSUE: Fixed a bug where certain sequences of update()
calls when symmetrically encrypting very large payloads (>2GB) could
result in an integer overflow, leading to buffer overflows.
CVE-2020-36242
python-cryptography-vectors:
- update to 3.2 (bsc#1178168, CVE-2020-25659):
* CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more constant time,
to protect against Bleichenbacher vulnerabilities. Due to limitations imposed
by our API, we cannot completely mitigate this vulnerability.
* Support for OpenSSL 1.0.2 has been removed.
* Added basic support for PKCS7 signing (including SMIME) via PKCS7SignatureBuilder.
- update to 3.3.2 (bsc#1198331)
python-Deprecated:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- update to 1.2.13:
python-google-api-core:
- Update to 1.14.2
python-googleapis-common-protos:
- Update to 1.6.0
python-grpcio-gcp:
- Initial spec for v0.2.2
python-humanfriendly:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Update to 10.0
python-jsondiff:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Update to version 1.3.0
python-knack:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Update to version 0.9.0
python-opencensus:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Disable Python2 build
- Update to 0.8.0
python-opencensus-context:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
python-opencensus-ext-threading:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Initial build version 0.1.2
python-opentelemetry-api:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Version update to 1.5.0
python-psutil:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- update to 5.9.1
- remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS. (bsc#1184753)
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
python-PyGithub:
- Update to 1.43.5:
python-pytest-asyncio:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Initial release of python-pytest-asyncio 0.8.0
python-requests:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
python-websocket-client:
- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- Update to version 1.3.2
python-websockets:
- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629)
- update to 9.1:
python-constantly-15.1.0-150000.3.4.1.src.rpm
python-hyperlink-17.2.1-150000.3.4.1.src.rpm
python-zope.interface-4.4.2-150000.3.4.1.src.rpm
python3-constantly-15.1.0-150000.3.4.1.noarch.rpm
python3-hyperlink-17.2.1-150000.3.4.1.noarch.rpm
python3-zope.interface-4.4.2-150000.3.4.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1955
Recommended update for mariadb
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
- Update to 10.6.12:
libmariadbd-devel-10.6.12-150400.3.20.5.x86_64.rpm
libmariadbd19-10.6.12-150400.3.20.5.x86_64.rpm
mariadb-10.6.12-150400.3.20.5.src.rpm
mariadb-10.6.12-150400.3.20.5.x86_64.rpm
mariadb-client-10.6.12-150400.3.20.5.x86_64.rpm
mariadb-errormessages-10.6.12-150400.3.20.5.noarch.rpm
mariadb-tools-10.6.12-150400.3.20.5.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1963
Recommended update for grub2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
- Fix aarch64 kiwi image's file not found due to '/@' prepended to path in btrfs filesystem. (bsc#1209165)
- Make grub more robust against storage race condition causing system boot failures (bsc#1189036)
- Fix unknown filesystem error on disks with 4096 sector size (bsc#1207064, bsc#1209234)
- Fix installation over serial console ends up in infinite boot loop (bsc#1187810, bsc#1209667, bsc#1209372)
grub2-2.06-150400.11.30.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.30.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1849
Security update for apache2-mod_auth_openidc
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_auth_openidc fixes the following issues:
- CVE-2023-28625: Fixed NULL pointer dereference when OIDCStripCookies was set and a crafted Cookie header was supplied (bsc#1210073).
apache2-mod_auth_openidc-2.3.8-150100.3.25.1.src.rpm
apache2-mod_auth_openidc-2.3.8-150100.3.25.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-1877
Security update for pgadmin4
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for pgadmin4 fixes the following issues:
- CVE-2023-0241: Fixed a directory traversal vulnerability (bsc#1207464).
pgadmin4-4.30-150300.3.9.1.src.rpm
pgadmin4-4.30-150300.3.9.1.x86_64.rpm
pgadmin4-doc-4.30-150300.3.9.1.noarch.rpm
pgadmin4-web-4.30-150300.3.9.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2063
Recommended update for davfs2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for davfs2 fixes the following issues:
- Do not download the update_cache_file on each lookup. It is enough to get the latest file size when a file is not
open or not dirty to detect if it has been changed on the server, so next FUSE read will have the correct size.
(bsc#1198576, bsc#1188967).
davfs2-1.5.4-150000.3.11.1.src.rpm
davfs2-1.5.4-150000.3.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2089
Recommended update for sapconf
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for sapconf fixes the following issues:
- version update from 5.0.5 to 5.0.6
- add parameter IGNORE_RELOAD to /etc/sysconfig/sapconf to prevent
sapconf from changing any system tunables during package update
(bsc#1209408)
- fix for a race condition which leads to a missing start/restart
of sapconf, which ends up with restored kernel parameters to
defaults
(bsc#1207899)
correctly. Only the DM multipath devices (mpath) will be used for
sapconf-5.0.6-150000.7.27.1.noarch.rpm
sapconf-5.0.6-150000.7.27.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2051
Security update for libtpms
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libtpms fixes the following issues:
- CVE-2023-1017: Fixed out-of-bounds write in CryptParameterDecryption (bsc#1206022).
- CVE-2023-1018: Fixed out-of-bounds read in CryptParameterDecryption (bsc#1206023).
libtpms-0.8.2-150300.3.9.1.src.rpm
libtpms-devel-0.8.2-150300.3.9.1.x86_64.rpm
libtpms0-0.8.2-150300.3.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2122
Security update for redis
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-36021: Fixed possible integer overflow via specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands (bsc#1208790).
- CVE-2023-28856: Fixed possible DoS when using HINCRBYFLOAT to create an hash field (bsc#1210548).
- CVE-2023-25155: Fixed integer overflow in RAND commands that can lead to assertion (bsc#1208793).
redis-6.2.6-150400.3.19.1.src.rpm
redis-6.2.6-150400.3.19.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2317
Recommended update for util-linux
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for util-linux fixes the following issue:
- Add upstream patch to prevent possible performance degradation of libuuid (bsc#1210164)
util-linux-systemd-2.37.2-150400.8.17.1.src.rpm
uuidd-2.37.2-150400.8.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2234
Security update for ovmf
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for ovmf fixes the following issues:
- CVE-2021-38578: Fixed potential underflow in SmmEntryPointwhen computing BufferSize (bsc#1196741).
- CVE-2019-14560: Fixed potential secure boot bypass caused by improper check of GetEfiGlobalVariable2() return value (bsc#1174246).
- revert a patch to fix xen boot problems (bsc#1205613)
ovmf-202202-150400.5.10.1.src.rpm
ovmf-202202-150400.5.10.1.x86_64.rpm
ovmf-tools-202202-150400.5.10.1.x86_64.rpm
qemu-ovmf-x86_64-202202-150400.5.10.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2355
Recommended update for librelp
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for librelp fixes the following issues:
- update to librelp 1.11.0 (bsc#1210649)
librelp-1.11.0-150000.3.3.1.src.rpm
librelp-devel-1.11.0-150000.3.3.1.x86_64.rpm
librelp0-1.11.0-150000.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2667
Security update for bind
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
Update to release 9.16.42
Security Fixes:
* The overmem cleaning process has been improved, to prevent the
cache from significantly exceeding the configured
max-cache-size limit. (CVE-2023-2828)
* A query that prioritizes stale data over lookup triggers a
fetch to refresh the stale data in cache. If the fetch is
aborted for exceeding the recursion quota, it was possible for
named to enter an infinite callback loop and crash due to stack
overflow. This has been fixed. (CVE-2023-2911)
Bug Fixes:
* Previously, it was possible for a delegation from cache to be
returned to the client after the stale-answer-client-timeout
duration. This has been fixed. [bsc#1212544, bsc#1212567, jsc#SLE-24600]
Update to release 9.16.41
Bug Fixes:
* When removing delegations from an opt-out range,
empty-non-terminal NSEC3 records generated by those delegations
were not cleaned up. This has been fixed. [jsc#SLE-24600]
Update to release 9.16.40
Bug Fixes:
* Logfiles using timestamp-style suffixes were not always
correctly removed when the number of files exceeded the limit
set by versions. This has been fixed for configurations which
do not explicitly specify a directory path as part of the file
argument in the channel specification.
* Performance of DNSSEC validation in zones with many DNSKEY
records has been improved.
Update to release 9.16.39
Feature Changes:
* libuv support for receiving multiple UDP messages in a single
recvmmsg() system call has been tweaked several times between
libuv versions 1.35.0 and 1.40.0; the current recommended libuv
version is 1.40.0 or higher. New rules are now in effect for
running with a different version of libuv than the one used at
compilation time. These rules may trigger a fatal error at
startup:
- Building against or running with libuv versions 1.35.0 and
1.36.0 is now a fatal error.
- Running with libuv version higher than 1.34.2 is now a
fatal error when named is built against libuv version
1.34.2 or lower.
- Running with libuv version higher than 1.39.0 is now a
fatal error when named is built against libuv version
1.37.0, 1.38.0, 1.38.1, or 1.39.0.
* This prevents the use of libuv versions that may trigger an
assertion failure when receiving multiple UDP messages in a
single system call.
Bug Fixes:
* named could crash with an assertion failure when adding a new
zone into the configuration file for a name which was already
configured as a member zone for a catalog zone. This has been
fixed.
* When named starts up, it sends a query for the DNSSEC key for
each configured trust anchor to determine whether the key has
changed. In some unusual cases, the query might depend on a
zone for which the server is itself authoritative, and would
have failed if it were sent before the zone was fully loaded.
This has now been fixed by delaying the key queries until all
zones have finished loading. [jsc#SLE-24600]
bind-9.16.42-150400.5.27.1.src.rpm
bind-9.16.42-150400.5.27.1.x86_64.rpm
bind-doc-9.16.42-150400.5.27.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2571
Security update for Salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
salt:
- Update to Salt release version 3006.0 (jsc#PED-4361)
* See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html
- Add missing patch after rebase to fix collections Mapping issues
- Add python3-looseversion as new dependency for salt
- Add python3-packaging as new dependency for salt
- Allow entrypoint compatibility for "importlib-metadata>=5.0.0" (bsc#1207071)
- Avoid conflicts with Salt dependencies versions (bsc#1211612)
- Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754)
- Create new salt-tests subpackage containing Salt tests
- Drop conflictive patch dicarded from upstream
- Fix package build with old setuptools versions
- Fix SLS rendering error when Jinja macros are used
- Fix version detection and avoid building and testing failures
- Prevent deadlocks in salt-ssh executions
- Require python3-jmespath runtime dependency (bsc#1209233)
- Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517)
python-jmespath:
- Deliver python3-jmespath to SUSE Linux Enterprise Micro on s390x architecture as it is now required by Salt
(no source changes)
python-ply:
- Deliver python3-ply to SUSE Linux Enterprise Micro on s390x architecture as it is a requirement for python-jmespath
(no source changes)
salt-3006.0-150400.8.34.2.src.rpm
True
salt-api-3006.0-150400.8.34.2.x86_64.rpm
True
salt-cloud-3006.0-150400.8.34.2.x86_64.rpm
True
salt-fish-completion-3006.0-150400.8.34.2.noarch.rpm
True
salt-master-3006.0-150400.8.34.2.x86_64.rpm
True
salt-proxy-3006.0-150400.8.34.2.x86_64.rpm
True
salt-ssh-3006.0-150400.8.34.2.x86_64.rpm
True
salt-standalone-formulas-configuration-3006.0-150400.8.34.2.x86_64.rpm
True
salt-syndic-3006.0-150400.8.34.2.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2207
Security update for postgresql15
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql15 fixes the following issues:
Updated to version 15.3:
- CVE-2023-2454: Fixed an issue where a user having permission to
create a schema could hijack the privileges of a security definer
function or extension script (bsc#1211228).
- CVE-2023-2455: Fixed an issue that could allow a user to see or
modify rows that should have been invisible (bsc#1211229).
- Internal fixes (bsc#1210303).
libecpg6-15.3-150200.5.9.1.x86_64.rpm
postgresql15-15.3-150200.5.9.1.src.rpm
postgresql15-contrib-15.3-150200.5.9.1.x86_64.rpm
postgresql15-devel-15.3-150200.5.9.1.x86_64.rpm
postgresql15-docs-15.3-150200.5.9.1.noarch.rpm
postgresql15-plperl-15.3-150200.5.9.1.x86_64.rpm
postgresql15-plpython-15.3-150200.5.9.1.x86_64.rpm
postgresql15-pltcl-15.3-150200.5.9.1.x86_64.rpm
postgresql15-server-15.3-150200.5.9.1.x86_64.rpm
postgresql15-server-devel-15.3-150200.5.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2205
Security update for postgresql14
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14 fixes the following issues:
Updated to version 14.8:
- CVE-2023-2454: Fixed an issue where a user having permission to
create a schema could hijack the privileges of a security definer
function or extension script (bsc#1211228).
- CVE-2023-2455: Fixed an issue that could allow a user to see or
modify rows that should have been invisible (bsc#1211229).
- Internal fixes (bsc#1210303).
postgresql14-14.8-150200.5.26.1.src.rpm
postgresql14-contrib-14.8-150200.5.26.1.x86_64.rpm
postgresql14-devel-14.8-150200.5.26.1.x86_64.rpm
postgresql14-docs-14.8-150200.5.26.1.noarch.rpm
postgresql14-plperl-14.8-150200.5.26.1.x86_64.rpm
postgresql14-plpython-14.8-150200.5.26.1.x86_64.rpm
postgresql14-pltcl-14.8-150200.5.26.1.x86_64.rpm
postgresql14-server-14.8-150200.5.26.1.x86_64.rpm
postgresql14-server-devel-14.8-150200.5.26.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2250
Security update for openvswitch
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openvswitch fixes the following issues:
- CVE-2022-4338: Fixed Integer Underflow in Organization Specific TLV (bsc#1206580).
- CVE-2022-4337: Fixed Out-of-Bounds Read in Organization Specific TLV (bsc#1206581).
libopenvswitch-2_14-0-2.14.2-150400.24.6.1.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.6.1.x86_64.rpm
openvswitch-2.14.2-150400.24.6.1.src.rpm
openvswitch-2.14.2-150400.24.6.1.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.6.1.x86_64.rpm
openvswitch-ipsec-2.14.2-150400.24.6.1.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.6.1.x86_64.rpm
openvswitch-test-2.14.2-150400.24.6.1.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.6.1.x86_64.rpm
ovn-20.06.2-150400.24.6.1.x86_64.rpm
ovn-central-20.06.2-150400.24.6.1.x86_64.rpm
ovn-devel-20.06.2-150400.24.6.1.x86_64.rpm
ovn-docker-20.06.2-150400.24.6.1.x86_64.rpm
ovn-host-20.06.2-150400.24.6.1.x86_64.rpm
ovn-vtep-20.06.2-150400.24.6.1.x86_64.rpm
python3-ovs-2.14.2-150400.24.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2276
Recommended update for grub2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
- grub2-once: Fix 'sh: terminal_output: command not found' error (bsc#1204563)
- Fix PowerVS deployment fails to boot with 90 cores (bsc#1208581)
grub2-2.06-150400.11.33.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.33.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2296
Security update for openvswitch
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openvswitch fixes the following issues:
- CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).
libopenvswitch-2_14-0-2.14.2-150400.24.9.1.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.9.1.x86_64.rpm
openvswitch-2.14.2-150400.24.9.1.src.rpm
openvswitch-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-ipsec-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-test-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.9.1.x86_64.rpm
ovn-20.06.2-150400.24.9.1.x86_64.rpm
ovn-central-20.06.2-150400.24.9.1.x86_64.rpm
ovn-devel-20.06.2-150400.24.9.1.x86_64.rpm
ovn-docker-20.06.2-150400.24.9.1.x86_64.rpm
ovn-host-20.06.2-150400.24.9.1.x86_64.rpm
ovn-vtep-20.06.2-150400.24.9.1.x86_64.rpm
python3-ovs-2.14.2-150400.24.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2366
Recommended update for xen
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- Added debug-info to xen-syms (bsc#1209237)
- Update to Xen 4.16.4 bug fix release (bsc#1027519)
- Added upstream bug fixes (bsc#1027519)
- Fix host-assisted kexec/kdump for HVM domUs (bsc#1209245)
- Drop patches contained in new tarball and switch to upstream backports for some patches
xen-4.16.4_02-150400.4.28.1.src.rpm
xen-4.16.4_02-150400.4.28.1.x86_64.rpm
xen-devel-4.16.4_02-150400.4.28.1.x86_64.rpm
xen-tools-4.16.4_02-150400.4.28.1.x86_64.rpm
xen-tools-xendomains-wait-disk-4.16.4_02-150400.4.28.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2295
Security update for rmt-server
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rmt-server fixes the following issues:
Updated to version 2.13:
- CVE-2023-28120: Fixed a potential XSS issue in an embedded
dependency (bsc#1209507).
- CVE-2023-27530: Fixed a denial of service issue in multipart request
parsing (bsc#1209096).
Non-security fixes:
- Fixed transactional update on GCE (bsc#1211398).
- Use HTTPS in rmt-client-setup-res (bsc#1209825).
- Various build fixes (bsc#1207670, bsc#1203171, bsc#1206593,
bsc#1202053).
rmt-server-2.13-150400.3.12.1.src.rpm
rmt-server-2.13-150400.3.12.1.x86_64.rpm
rmt-server-config-2.13-150400.3.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2479
Security update for mariadb
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
Updated to version 10.6.13:
- CVE-2022-47015: Fixed a denial of service that could be triggered by
a crafted SQL query (bsc#1207404).
libmariadbd-devel-10.6.13-150400.3.23.1.x86_64.rpm
libmariadbd19-10.6.13-150400.3.23.1.x86_64.rpm
mariadb-10.6.13-150400.3.23.1.src.rpm
mariadb-10.6.13-150400.3.23.1.x86_64.rpm
mariadb-client-10.6.13-150400.3.23.1.x86_64.rpm
mariadb-errormessages-10.6.13-150400.3.23.1.noarch.rpm
mariadb-tools-10.6.13-150400.3.23.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2356
Security update for libvirt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libvirt fixes the following issues:
- CVE-2023-2700: Fixed a memory leak that could be triggered by
repeatedly querying an SR-IOV PCI device's capabilities
(bsc#1211390).
Non-security fixes:
- Fixed a potential crash during driver cleanup (bsc#1209861).
- Added Apparmor support for SUSE edk2 firmware paths (boo#1208567).
- Fixed lxc container initialization with systemd and hybrid groups
(boo#1183247).
- Added the option to specify the virtual CPU address size in bits for
qemu (bsc#1199583).
libvirt-8.0.0-150400.7.6.1.src.rpm
libvirt-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-client-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-config-network-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-config-nwfilter-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-interface-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-libxl-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-network-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-nodedev-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-nwfilter-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-qemu-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-secret-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-core-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-disk-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-iscsi-direct-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-logical-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-mpath-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-rbd-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-driver-storage-scsi-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-hooks-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-qemu-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-daemon-xen-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-devel-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-doc-8.0.0-150400.7.6.1.noarch.rpm
libvirt-lock-sanlock-8.0.0-150400.7.6.1.x86_64.rpm
libvirt-nss-8.0.0-150400.7.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2547
Recommended update for qemu
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- vCPU stalls in Qemu with NFS storage (bsc#1211000)
qemu-6.2.0-150400.37.17.1.src.rpm
qemu-6.2.0-150400.37.17.1.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.17.1.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.17.1.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.17.1.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.17.1.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.17.1.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.17.1.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.17.1.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.17.1.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.17.1.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.17.1.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.17.1.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.17.1.noarch.rpm
qemu-ksm-6.2.0-150400.37.17.1.x86_64.rpm
qemu-kvm-6.2.0-150400.37.17.1.x86_64.rpm
qemu-lang-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.17.1.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.17.1.x86_64.rpm
qemu-x86-6.2.0-150400.37.17.1.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.17.1.noarch.rpm
qemu-sgabios-8-150400.37.17.1.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.17.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2851
Recommended update for rdma-core
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rdma-core fixes the following issues:
- Update to rdma-core v38.3 (bsc#1204271, bsc#1212069)
ibacm-38.3-150400.6.3.1.x86_64.rpm
iwpmd-38.3-150400.6.3.1.x86_64.rpm
libibverbs-utils-38.3-150400.6.3.1.x86_64.rpm
librdmacm-utils-38.3-150400.6.3.1.x86_64.rpm
rdma-core-38.3-150400.6.3.1.src.rpm
rdma-ndd-38.3-150400.6.3.1.x86_64.rpm
srp_daemon-38.3-150400.6.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2792
Recommended update for mariadb
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
- Update to 10.6.14
libmariadbd-devel-10.6.14-150400.3.26.1.x86_64.rpm
libmariadbd19-10.6.14-150400.3.26.1.x86_64.rpm
mariadb-10.6.14-150400.3.26.1.src.rpm
mariadb-10.6.14-150400.3.26.1.x86_64.rpm
mariadb-client-10.6.14-150400.3.26.1.x86_64.rpm
mariadb-errormessages-10.6.14-150400.3.26.1.noarch.rpm
mariadb-tools-10.6.14-150400.3.26.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2854
Recommended update for libvirt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libvirt fixes the following issues:
- Fix potential crash during driver cleanup (bsc#1209861)
libvirt-7.1.0-150300.6.38.1.src.rpm
libvirt-bash-completion-7.1.0-150300.6.38.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3089
Security update for xmltooling
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xmltooling fixes the following issues:
- CVE-2023-36661: Fix server-side request forgery vulnerability (bsc#1212359)
libxmltooling-devel-3.1.0-150300.3.3.1.x86_64.rpm
libxmltooling-lite9-3.1.0-150300.3.3.1.x86_64.rpm
libxmltooling9-3.1.0-150300.3.3.1.x86_64.rpm
xmltooling-3.1.0-150300.3.3.1.src.rpm
xmltooling-schemas-3.1.0-150300.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3468
Recommended update for python3
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python3 fixes the following issue:
- Rename sources in preparation of python3.11 (jsc#PED-68)
python3-Automat-20.2.0-150400.5.69.noarch.rpm
python3-Automat-20.2.0-150400.5.69.src.rpm
python3-Twisted-22.2.0-150400.12.32.src.rpm
python3-Twisted-22.2.0-150400.12.32.x86_64.rpm
python3-evtx-0.5.3b-150400.20.30.noarch.rpm
python3-evtx-0.5.3b-150400.20.30.src.rpm
python3-incremental-21.3.0-150400.5.69.noarch.rpm
python3-incremental-21.3.0-150400.5.69.src.rpm
python3-python-slugify-5.0.2-150400.5.69.noarch.rpm
python3-python-slugify-5.0.2-150400.5.69.src.rpm
python3-text-unidecode-1.3-150400.5.69.noarch.rpm
python3-text-unidecode-1.3-150400.5.69.src.rpm
python3-typing_extensions-3.10.0.0-150400.7.69.noarch.rpm
python3-typing_extensions-3.10.0.0-150400.7.69.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2774
Recommended update for vsftpd
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for vsftpd fixes the following issues:
- Fix the documentation of the strict_ssl_read_eof option. The
documentation says option would be disabled by default, but it is
in fact enabled. [bsc#1200075]
- Use valid separator for logrotate config file. [bsc#1192179]
vsftpd-3.0.5-150400.3.9.1.src.rpm
vsftpd-3.0.5-150400.3.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2823
Security update for rabbitmq-c
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rabbitmq-c fixes the following issues:
- CVE-2023-35789: Fixed insecure credentials submission (bsc#1212499).
librabbitmq-devel-0.10.0-150300.5.6.1.x86_64.rpm
librabbitmq4-0.10.0-150300.5.6.1.x86_64.rpm
rabbitmq-c-0.10.0-150300.5.6.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3145
Security update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
Security fixes:
- CVE-2023-28370: Fix an open redirect vulnerability in 'StaticFileHandler' under certain configurations (bsc#1211741)
Bug fixes:
- Prevent error loading 'known_hosts' when '$HOME' is not set (bsc#1210994)
- Fix ModuleNotFoundError and other issues raised by salt-support module (bsc#1211591)
salt-3006.0-150400.8.37.2.src.rpm
True
salt-api-3006.0-150400.8.37.2.x86_64.rpm
True
salt-cloud-3006.0-150400.8.37.2.x86_64.rpm
True
salt-fish-completion-3006.0-150400.8.37.2.noarch.rpm
True
salt-master-3006.0-150400.8.37.2.x86_64.rpm
True
salt-proxy-3006.0-150400.8.37.2.x86_64.rpm
True
salt-ssh-3006.0-150400.8.37.2.x86_64.rpm
True
salt-standalone-formulas-configuration-3006.0-150400.8.37.2.x86_64.rpm
True
salt-syndic-3006.0-150400.8.37.2.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2832
Recommended update for squid
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
- Move pidfile back to /run/squid.pid (bsc#1210960)
squid-5.7-150400.3.9.1.src.rpm
squid-5.7-150400.3.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2779
Recommended update for system-role-common-criteria, yast2-storage-ng
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for system-role-common-criteria, yast2-storage-ng fixes the following issues:
system-role-common-criteria was updated to 15.4.2:
- Set the encryption password directly from the role dialog
(jsc#PED-4166, jsc#PED-4474)
yast2-storage-ng was updated to 4.4.44:
- Honor encryption settings if they are set into ProductFeatures
by the Common Critera role (jsc#PED-4166, jsc#PED-4474).
- Prevent setting the volume label for a mounted btrfs or swap
(bsc#1211337)
system-role-common-criteria-15.4.2-150400.3.6.1.src.rpm
system-role-common-criteria-15.4.2-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3027
Recommended update for libteam
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libteam fixes the following issues:
- Add option to change evaluation logic of multiple link-watchers (jsc#PED-2209)
libteam-1.27-150000.4.9.1.src.rpm
libteam-tools-1.27-150000.4.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3381
Feature update for scc-hypervisor-collector, python-pyvmomi, virtual-host-gatherer
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for scc-hypervisor-collector, python-pyvmomi, virtual-host-gatherer fixes the following issues:
scc-hypervisor-collector:
- New package for the implementation of Hypervisor Topology Data to SCC (jsc#PED-3623)
python-pyvmomi:
- Submission to SUSE Linux Enterprise condestream as dependency for `scc-hypervisor-collector` (jsc#PED-3623)
virtual-host-gatherer:
- Submission to SUSE Linux Enterprise condestream as dependency for `scc-hypervisor-collector` (jsc#PED-3623)
python-pyvmomi-6.7.3-150200.3.5.5.src.rpm
python3-pyvmomi-6.7.3-150200.3.5.5.noarch.rpm
scc-hypervisor-collector-0.1.0~git0.90e575f-150300.7.3.2.noarch.rpm
scc-hypervisor-collector-0.1.0~git0.90e575f-150300.7.3.2.src.rpm
scc-hypervisor-collector-common-0.1.0~git0.90e575f-150300.7.3.2.noarch.rpm
virtual-host-gatherer-1.0.26-150300.7.3.3.noarch.rpm
virtual-host-gatherer-1.0.26-150300.7.3.3.src.rpm
virtual-host-gatherer-Kubernetes-1.0.26-150300.7.3.3.noarch.rpm
virtual-host-gatherer-Libvirt-1.0.26-150300.7.3.3.noarch.rpm
virtual-host-gatherer-Nutanix-1.0.26-150300.7.3.3.noarch.rpm
virtual-host-gatherer-VMware-1.0.26-150300.7.3.3.noarch.rpm
virtual-host-gatherer-libcloud-1.0.26-150300.7.3.3.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3484
Feature update for bind
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
- Add dnstap support (jsc#PED-4852, jsc#PED-4853)
- Log named-checkconf output (bsc#1213049)
- Update to release 9.16.43
bind-9.16.43-150400.5.34.1.src.rpm
bind-9.16.43-150400.5.34.1.x86_64.rpm
bind-doc-9.16.43-150400.5.34.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3286
Recommended update for util-linux
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for util-linux fixes the following issues:
- Fix blkid for floppy drives (bsc#1194900)
- Fix rpmbuild %checks fail when @ in the directory path (bsc#1194038)
util-linux-systemd-2.37.2-150400.8.20.1.src.rpm
uuidd-2.37.2-150400.8.20.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3279
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- Update for stability patches (bsc#1213191)
- OpenLDAP to 389-ds migration - exclude unsupported attributes (bsc#1210462)
- SSSD client performance improvements (bsc#1212726)
389-ds-2.0.17~git71.35ef59e-150400.3.28.1.src.rpm
389-ds-2.0.17~git71.35ef59e-150400.3.28.1.x86_64.rpm
389-ds-devel-2.0.17~git71.35ef59e-150400.3.28.1.x86_64.rpm
lib389-2.0.17~git71.35ef59e-150400.3.28.1.x86_64.rpm
libsvrcore0-2.0.17~git71.35ef59e-150400.3.28.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3372
Recommended update for rsyslog
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rsyslog fixes the following issues:
- Fix removal of imfile state files (bsc#1213212)
- Fix segfaults in modExit() of imklog.c (bsc#1211757)
rsyslog-8.2306.0-150400.5.18.1.src.rpm
rsyslog-module-gssapi-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-gtls-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-mmnormalize-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-mysql-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-pgsql-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-relp-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-snmp-8.2306.0-150400.5.18.1.x86_64.rpm
rsyslog-module-udpspoof-8.2306.0-150400.5.18.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-2924
Security update for redis
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2022-24834: Fixed heap overflow in the cjson and cmsgpack libraries (bsc#1213193).
redis-6.2.6-150400.3.22.1.src.rpm
redis-6.2.6-150400.3.22.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3230
Security update for cjose
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for cjose fixes the following issues:
- CVE-2023-37464: Fixed AES GCM decryption uses the Tag length from the actual Authentication Tag (bsc#1213385).
cjose-0.6.1-150100.4.6.1.src.rpm
libcjose-devel-0.6.1-150100.4.6.1.x86_64.rpm
libcjose0-0.6.1-150100.4.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3340
Recommended update for tcmu-runner
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for tcmu-runner fixes the following issues:
- Adjust handler path to RPM macros (bsc#1212636)
libtcmu2-1.5.4-150400.3.3.1.x86_64.rpm
tcmu-runner-1.5.4-150400.3.3.1.src.rpm
tcmu-runner-1.5.4-150400.3.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3231
Recommended update for grpc
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update ships grpc to the Basesystem module, as dependency for open-vm-tools container info plugin. (jsc#PED-4509)
grpc-1.25.0-150200.3.7.1.src.rpm
libgrpc++1-1.25.0-150200.3.7.1.x86_64.rpm
libgrpc8-1.25.0-150200.3.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3101
Recommended update for rmt-server
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rmt-server fixes the following issues:
- Version 2.14
- Add command 'rmt-cli clean packages', which removes dangling packages no longer
referenced in the available metadata files and their database entries. (gh#662)
- Fix the SUSE Liberty registration script to allow registering with RMT servers that
self-sign certificates and enable both old and new singing keys for SLL8 (bsc#1209825)
- Fix a regression in the local import of packages with special characters (bsc#1213002)
rmt-server-2.14-150400.3.15.1.src.rpm
rmt-server-2.14-150400.3.15.1.x86_64.rpm
rmt-server-config-2.14-150400.3.15.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3275
Recommended update for apparmor
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apparmor fixes the following issues:
- Add pam_apparmor README (bsc#1213472)
apache2-mod_apparmor-3.0.4-150400.5.6.1.x86_64.rpm
apparmor-3.0.4-150400.5.6.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3335
Recommended update for ipmitool
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for ipmitool fixes the following issues:
- ipmitool duplicates the timestamp (bsc#1213390)
ipmitool-1.8.18.238.gb7adc1d-150400.3.3.1.src.rpm
ipmitool-bmc-snmp-proxy-1.8.18.238.gb7adc1d-150400.3.3.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3234
Security update for qemu
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2023-2861: Fixed improper access control on special files in 9pfs (bsc#1212968).
- CVE-2023-3301: Fixed NULL pointer dereference in vhost_vdpa_get_vhost_net() (bsc#1213414).
- CVE-2023-3255: Fixed infinite loop in inflate_buffer() leads to denial of service (bsc#1213001).
qemu-6.2.0-150400.37.20.1.src.rpm
qemu-6.2.0-150400.37.20.1.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.20.1.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.20.1.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.20.1.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.20.1.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.20.1.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.20.1.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.20.1.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.20.1.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.20.1.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.20.1.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.20.1.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.20.1.noarch.rpm
qemu-ksm-6.2.0-150400.37.20.1.x86_64.rpm
qemu-kvm-6.2.0-150400.37.20.1.x86_64.rpm
qemu-lang-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.20.1.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.20.1.x86_64.rpm
qemu-x86-6.2.0-150400.37.20.1.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.20.1.noarch.rpm
qemu-sgabios-8-150400.37.20.1.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.20.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3363
Security update for krb5
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for krb5 fixes the following issues:
- CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)
krb5-1.19.2-150400.3.6.1.src.rpm
krb5-plugin-kdb-ldap-1.19.2-150400.3.6.1.x86_64.rpm
krb5-server-1.19.2-150400.3.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3347
Security update for postgresql15
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql15 fixes the following issues:
- Update to 15.4
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
- CVE-2023-39418: Fix MERGE to enforce row security. (bsc#1214061)
libecpg6-15.4-150200.5.12.1.x86_64.rpm
postgresql15-15.4-150200.5.12.1.src.rpm
postgresql15-contrib-15.4-150200.5.12.1.x86_64.rpm
postgresql15-devel-15.4-150200.5.12.1.x86_64.rpm
postgresql15-docs-15.4-150200.5.12.1.noarch.rpm
postgresql15-plperl-15.4-150200.5.12.1.x86_64.rpm
postgresql15-plpython-15.4-150200.5.12.1.x86_64.rpm
postgresql15-pltcl-15.4-150200.5.12.1.x86_64.rpm
postgresql15-server-15.4-150200.5.12.1.x86_64.rpm
postgresql15-server-devel-15.4-150200.5.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3348
Security update for postgresql15
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql15 fixes the following issues:
- Update to 14.9
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
postgresql14-14.9-150200.5.29.1.src.rpm
postgresql14-contrib-14.9-150200.5.29.1.x86_64.rpm
postgresql14-devel-14.9-150200.5.29.1.x86_64.rpm
postgresql14-docs-14.9-150200.5.29.1.noarch.rpm
postgresql14-plperl-14.9-150200.5.29.1.x86_64.rpm
postgresql14-plpython-14.9-150200.5.29.1.x86_64.rpm
postgresql14-pltcl-14.9-150200.5.29.1.x86_64.rpm
postgresql14-server-14.9-150200.5.29.1.x86_64.rpm
postgresql14-server-devel-14.9-150200.5.29.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3401
Security update for erlang
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for erlang fixes the following issues:
- Replaced the CVE-2022-37026 patch with the one released by the upstream to fix a regression in the previous one. (bsc#1205318)
erlang-22.3-150300.3.8.1.src.rpm
erlang-22.3-150300.3.8.1.x86_64.rpm
erlang-epmd-22.3-150300.3.8.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3395
Security update for xen
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2023-20569: Fixed side channel attack Inception or RAS Poisoning. (bsc#1214082, XSA-434)
- CVE-2022-40982: Fixed transient execution attack called "Gather Data Sampling". (bsc#1214083, XSA-435)
- CVE-2023-20593: Fixed a ZenBleed issue in "Zen 2" CPUs that could allow an attacker to potentially access sensitive information. (bsc#1213616, XSA-433)
xen-4.16.5_02-150400.4.31.1.src.rpm
xen-4.16.5_02-150400.4.31.1.x86_64.rpm
xen-devel-4.16.5_02-150400.4.31.1.x86_64.rpm
xen-tools-4.16.5_02-150400.4.31.1.x86_64.rpm
xen-tools-xendomains-wait-disk-4.16.5_02-150400.4.31.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3412
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- SSSD client performance improvements (bsc#1212726)
- Update to version 2.0.17~git81.849cc42
389-ds-2.0.17~git81.849cc42-150400.3.31.1.src.rpm
389-ds-2.0.17~git81.849cc42-150400.3.31.1.x86_64.rpm
389-ds-devel-2.0.17~git81.849cc42-150400.3.31.1.x86_64.rpm
lib389-2.0.17~git81.849cc42-150400.3.31.1.x86_64.rpm
libsvrcore0-2.0.17~git81.849cc42-150400.3.31.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3979
Recommended update for mariadb
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb fixes the following issues:
- Update mariadb to 10.6.15:
https://mariadb.com/kb/en/mariadb-10-6-15-release-notes/
https://mariadb.com/kb/en/mariadb-10-6-15-changelog/
libmariadbd-devel-10.6.15-150400.3.29.3.x86_64.rpm
libmariadbd19-10.6.15-150400.3.29.3.x86_64.rpm
mariadb-10.6.15-150400.3.29.3.src.rpm
mariadb-10.6.15-150400.3.29.3.x86_64.rpm
mariadb-client-10.6.15-150400.3.29.3.x86_64.rpm
mariadb-errormessages-10.6.15-150400.3.29.3.noarch.rpm
mariadb-tools-10.6.15-150400.3.29.3.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3863
Security update for salt
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
Security issues fixed:
- CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441)
- CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base
name. (bsc#1214797, bsc#1193948)
Bugs fixed:
- Create minion_id with reproducible mtime
- Fix broken tests to make them running in the testsuite
- Fix detection of Salt codename by "salt_version" execution module
- Fix inconsistency in reported version by egg-info metadata (bsc#1215489)
- Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844)
- Fix the regression of user.present state when group is unset (bsc#1212855)
- Fix utf8 handling in 'pass' renderer and make it more robust
- Fix zypper repositories always being reconfigured
- Make sure configured user is properly set by Salt (bsc#1210994)
- Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794)
- Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses
(bsc#1213960, bsc#1213630, bsc#1213257)
salt-3006.0-150400.8.44.1.src.rpm
True
salt-api-3006.0-150400.8.44.1.x86_64.rpm
True
salt-cloud-3006.0-150400.8.44.1.x86_64.rpm
True
salt-fish-completion-3006.0-150400.8.44.1.noarch.rpm
True
salt-master-3006.0-150400.8.44.1.x86_64.rpm
True
salt-proxy-3006.0-150400.8.44.1.x86_64.rpm
True
salt-ssh-3006.0-150400.8.44.1.x86_64.rpm
True
salt-standalone-formulas-configuration-3006.0-150400.8.44.1.x86_64.rpm
True
salt-syndic-3006.0-150400.8.44.1.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3762
Security update for frr
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for frr fixes the following issues:
- CVE-2023-38802: Fixed bad length handling when processing BGP attributes. (bsc#1213284)
- CVE-2023-41358: Fixed a possible crash when processing NLRIs with an attribute length of zero. (bsc#1214735)
- CVE-2023-41909: Fixed NULL pointer dereference due to processing in bgp_nlri_parse_flowspec (bsc#1215065).
frr-7.4-150300.4.17.1.src.rpm
frr-7.4-150300.4.17.1.x86_64.rpm
frr-devel-7.4-150300.4.17.1.x86_64.rpm
libfrr0-7.4-150300.4.17.1.x86_64.rpm
libfrr_pb0-7.4-150300.4.17.1.x86_64.rpm
libfrrcares0-7.4-150300.4.17.1.x86_64.rpm
libfrrfpm_pb0-7.4-150300.4.17.1.x86_64.rpm
libfrrgrpc_pb0-7.4-150300.4.17.1.x86_64.rpm
libfrrospfapiclient0-7.4-150300.4.17.1.x86_64.rpm
libfrrsnmp0-7.4-150300.4.17.1.x86_64.rpm
libfrrzmq0-7.4-150300.4.17.1.x86_64.rpm
libmlag_pb0-7.4-150300.4.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3856
Recommended update for apparmor
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apparmor fixes the following issues:
- Update zgrep profile to allow egrep helper use (bsc#1214458)
apache2-mod_apparmor-3.0.4-150400.5.9.1.x86_64.rpm
apparmor-3.0.4-150400.5.9.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4195
Recommended update for mariadb-connector-c
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb-connector-c fixes the following issues:
- Update to release 3.1.21:
* https://mariadb.com/kb/en/mariadb-connector-c-3-1-21-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3-1-20-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3-1-19-release-notes/
* https://mariadb.com/kb/en/mariadb-connectorc-3-1-18-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3117-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3116-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3115-release-notes/
* https://mariadb.com/kb/en/mariadb-connector-c-3114-release-notes/
libmariadb-devel-3.1.21-150000.3.33.3.x86_64.rpm
libmariadb_plugins-3.1.21-150000.3.33.3.x86_64.rpm
mariadb-connector-c-3.1.21-150000.3.33.3.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3737
Security update for bind
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for bind fixes the following issues:
Update to release 9.16.44:
- CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly (bsc#1215472).
bind-9.16.44-150400.5.37.2.src.rpm
bind-9.16.44-150400.5.37.2.x86_64.rpm
bind-doc-9.16.44-150400.5.37.2.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3945
Security update for postfix
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postfix fixes the following issues:
Security fixes:
- CVE-2023-32182: Fixed config_postfix SUSE specific script using potentially bad /tmp file (bsc#1211196).
Other fixes:
- postfix: config.postfix causes too tight permission on main.cf (bsc#1215372).
postfix-3.5.9-150300.5.12.2.src.rpm
postfix-mysql-3.5.9-150300.5.12.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3832
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
xen-4.16.5_04-150400.4.34.1.src.rpm
True
xen-4.16.5_04-150400.4.34.1.x86_64.rpm
True
xen-devel-4.16.5_04-150400.4.34.1.x86_64.rpm
True
xen-tools-4.16.5_04-150400.4.34.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.5_04-150400.4.34.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4140
Security update for grub2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
Security fixes:
- CVE-2023-4692: Fixed an out-of-bounds write at fs/ntfs.c which may lead to unsigned code execution. (bsc#1215935)
- CVE-2023-4693: Fixed an out-of-bounds read at fs/ntfs.c which may lead to leak sensitive information. (bsc#1215936)
Other fixes:
- Fix a boot delay issue in PowerPC PXE boot (bsc#1201300)
grub2-2.06-150400.11.38.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.38.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-3839
Security update for quagga
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for quagga fixes the following issues:
- CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284).
- CVE-2023-41358: Fixed possible crash when processing NLRIs if the attribute length is zero
(bsc#1214735).
libfpm_pb0-1.1.1-150400.12.5.1.x86_64.rpm
libospf0-1.1.1-150400.12.5.1.x86_64.rpm
libospfapiclient0-1.1.1-150400.12.5.1.x86_64.rpm
libquagga_pb0-1.1.1-150400.12.5.1.x86_64.rpm
libzebra1-1.1.1-150400.12.5.1.x86_64.rpm
quagga-1.1.1-150400.12.5.1.src.rpm
quagga-1.1.1-150400.12.5.1.x86_64.rpm
quagga-devel-1.1.1-150400.12.5.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128
Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report fixes the following issues:
sca-patterns-base was updated to version 1.5.2:
+ Fixed scatool email failure with python3 (bsc#1192315)
+ Allow batch mode that does not have progress bar issue#13 (pr#14)
+ Added quiet and debug modes issue#11
sca-patterns-sle11 was updated to version 1.5.2
+ Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
+ Changes to python/SUSE.py version 1.0.1
- Changed name from getScInfo to getSCInfo
- Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
- Updated SLES version constants
Changes to version 1.5.1
+ Fixed UnicodeDecodeError when reading files (bsc#1204723)
Changes in version 1.5.5
- New patterns (2) (bsc#1214837):
+ sle15sp4/kabi-000021148.py: Pattern for TID000021148
+ sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151
- New security announcement patterns as of Aug 2023 (140).
- New security announcement patterns as of May 2023 (881).
Changes in version 1.5.3
- New regular patterns (3)
+ sle15sp2/freeused-000020894.py: Pattern for TID000020894
+ sle15sp3/freeused-000020894.py: Pattern for TID000020894
+ sle15sp4/freeused-000020894.py: Pattern for TID000020894
Changes in version 1.5.3
- Updated category in btrfsmaster-000018779.py (bsc#1188138)
- sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
- sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
- New regular patterns (7)
+ sle15all/vimerr-000020735.py: Pattern for TID000020735
+ sle15all/nmiconfig-000020754.py: Pattern for TID000020754
+ sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
+ sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
+ sle15sp3/sssdad-000020793.py: Pattern for TID000020793
+ sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
+ sle15sp4/sssdad-000020793.py: Pattern for TID000020793
- New security announcement patterns (1426)
Additional patterns in version 1.5.2
+ sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
+ sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)
Changes in version 1.5.2
+ Check setup-sca php version mismatch (bsc#1201011)
+ SCA schema pattern check (tid#000020689)
+ kernel crashes at nfs4_get_valid_delegation (tid#000020688)
Changes in version 1.5.1
+ IRQ vectory affinity issue
+ TID000020653 NFS mount attempt with vers=n returns invalid argument or incorrect mount option
Changes in version 1.5.5
- New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
- New security announcement patterns as of May 2023 (543).
Changes in version 1.5.3
- Updated category in btrfsmaster-000018779.py (bsc#1188138)
- Fixed invalid link in lvm-00003.pl (bsc#1186148)
- Removed invalid pattern dst-00001.pl (bsc#1188137)
- Removed or fixed patterns with no valid solution links (bsc#1204772)
- New regular patterns (1)
+ sle12all/nmiconfig-000020754.py: Pattern for TID000020754
- New security announcement patterns (831)
Additional patterns in version 1.5.2
+ sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
+ sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)
Changes in version 1.5.2
+ SCA schema pattern check
Changes in version 1.5.3
- New security announcement patterns as of Aug 2023 (12) (bsc#1214837)
Changes in version 1.5.2
- New security announcement patterns (14)
Changes in version 1.5.2
- Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)
sca-patterns-base-1.5.2-150400.3.3.1.noarch.rpm
sca-patterns-base-1.5.2-150400.3.3.1.src.rpm
sca-patterns-sle11-1.5.3-150400.3.3.1.noarch.rpm
sca-patterns-sle11-1.5.3-150400.3.3.1.src.rpm
sca-patterns-sle12-1.5.5-150400.3.3.1.noarch.rpm
sca-patterns-sle12-1.5.5-150400.3.3.1.src.rpm
sca-patterns-sle15-1.5.5-150400.3.3.1.noarch.rpm
sca-patterns-sle15-1.5.5-150400.3.3.1.src.rpm
sca-server-report-1.5.2-150400.3.3.1.noarch.rpm
sca-server-report-1.5.2-150400.3.3.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4552
Recommended update for libteam
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for libteam fixes the following issues:
- Document ARP Ping link_watch.vlanid option in teamd.conf man page (bsc#1215527)
libteam-1.27-150000.4.12.1.src.rpm
libteam-tools-1.27-150000.4.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4109
Security update for erlang
critical
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for erlang fixes the following issues:
- Updated to version 23.3.4.19 (jsc#PED-6209):
- CVE-2022-37026: Complete a previous insufficient fix for an
authentication bypass (bsc#1205318).
erlang-23.3.4.19-150300.3.11.1.src.rpm
erlang-23.3.4.19-150300.3.11.1.x86_64.rpm
erlang-epmd-23.3.4.19-150300.3.11.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4056
Security update for qemu
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- CVE-2023-3180: Fixed a buffer overflow in the virtio-crypto device
(bsc#1213925).
- CVE-2021-3750: Fixed a DMA reentrancy in the USB EHCI device that
could lead to use-after-free (bsc#1190011).
- CVE-2021-3638: Fixed a buffer overflow in the ati-vga device
(bsc#1188609).
- CVE-2023-3354: Fixed an issue when performing a TLS handshake that
could lead to remote denial of service via VNC connection
(bsc#1212850).
- CVE-2023-0330: Fixed a DMA reentrancy issue in the lsi53c895a device
that could lead to a stack overflow (bsc#1207205).
Non-security fixes:
- Fixed a potential build issue in the librm subcomponent
(bsc#1215311).
- Fixed a potential crash during VM migration (bsc#1213663).
- Fixed potential issues during installation on a Xen host
(bsc#1179993, bsc#1181740).
qemu-6.2.0-150400.37.23.1.src.rpm
qemu-6.2.0-150400.37.23.1.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.23.1.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.23.1.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.23.1.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.23.1.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.23.1.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.23.1.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.23.1.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.23.1.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.23.1.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.23.1.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.23.1.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.23.1.noarch.rpm
qemu-ksm-6.2.0-150400.37.23.1.x86_64.rpm
qemu-kvm-6.2.0-150400.37.23.1.x86_64.rpm
qemu-lang-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.23.1.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.23.1.x86_64.rpm
qemu-x86-6.2.0-150400.37.23.1.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.23.1.noarch.rpm
qemu-sgabios-8-150400.37.23.1.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.23.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4055
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)
- CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)
- CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)
- CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)
xen-4.16.5_06-150400.4.37.1.src.rpm
xen-4.16.5_06-150400.4.37.1.x86_64.rpm
xen-devel-4.16.5_06-150400.4.37.1.x86_64.rpm
xen-tools-4.16.5_06-150400.4.37.1.x86_64.rpm
xen-tools-xendomains-wait-disk-4.16.5_06-150400.4.37.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4460
Recommended update for rsyslog
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rsyslog fixes the following issue:
- fix rsyslog crash in imrelp (bsc#1210286)
rsyslog-8.2306.0-150400.5.21.1.src.rpm
rsyslog-module-gssapi-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-gtls-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-mmnormalize-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-mysql-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-pgsql-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-relp-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-snmp-8.2306.0-150400.5.21.1.x86_64.rpm
rsyslog-module-udpspoof-8.2306.0-150400.5.21.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4387
Security update for salt
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for salt fixes the following issues:
Security issues fixed:
- CVE-2023-34049: arbitrary code execution via symlink attack (bsc#1215157)
Bugs fixed:
- Fix optimization_order opt to prevent testsuite fails
- Improve salt.utils.json.find_json to avoid fails (bsc#1213293)
- Use salt-call from salt bundle with transactional_update
- Only call native_str on curl_debug message in tornado when needed
- Implement the calling for batch async from the salt CLI
- Fix calculation of SLS context vars when trailing dots
on targetted sls/state (bsc#1213518)
- Rename salt-tests to python3-salt-testsuite
- Allow all primitive grain types for autosign_grains (bsc#1214477)
salt-3006.0-150400.8.49.2.src.rpm
True
salt-api-3006.0-150400.8.49.2.x86_64.rpm
True
salt-cloud-3006.0-150400.8.49.2.x86_64.rpm
True
salt-fish-completion-3006.0-150400.8.49.2.noarch.rpm
True
salt-master-3006.0-150400.8.49.2.x86_64.rpm
True
salt-proxy-3006.0-150400.8.49.2.x86_64.rpm
True
salt-ssh-3006.0-150400.8.49.2.x86_64.rpm
True
salt-standalone-formulas-configuration-3006.0-150400.8.49.2.x86_64.rpm
True
salt-syndic-3006.0-150400.8.49.2.x86_64.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4897
Optional update for openslp
low
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openslp bumps the version number to ensure a clean upgrade path from SLE-12 to SLE-15.
This is a no-change rebuild of the packages already available in SLE-15.
openslp-2.0.0-150000.6.17.1.src.rpm
openslp-server-2.0.0-150000.6.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4673
Recommended update for patterns-server-enterprise
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for patterns-server-enterprise fixes the following issue:
- [aarch64] install system with all patterns, nothing provides 'sapconf' when installing 'sap_server'. (bsc#1214811)
patterns-server-enterprise-20171206-150100.12.9.1.src.rpm
patterns-server-enterprise-oracle_server-20171206-150100.12.9.1.x86_64.rpm
patterns-server-enterprise-oracle_server-32bit-20171206-150100.12.9.1.x86_64.rpm
patterns-server-enterprise-sap_server-20230902-150100.12.9.1.x86_64.rpm
patterns-server-enterprise-sap_server-32bit-20171206-150100.12.9.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4290
Security update for redis
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for redis fixes the following issues:
- CVE-2023-45145: Fixed a potential permission bypass due to a race
condition during UNIX socket creation (bsc#1216376).
redis-6.2.6-150400.3.25.1.src.rpm
redis-6.2.6-150400.3.25.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2024-106
Security update for postgresql, postgresql15, postgresql16
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql, postgresql15, postgresql16 fixes the following issues:
This update ships postgresql 16.
Security issues fixed:
* CVE-2023-5868: Fix handling of unknown-type
arguments in DISTINCT "any" aggregate functions. This error led
to a text-type value being interpreted as an unknown-type value
(that is, a zero-terminated string) at runtime. This could
result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
computing new array dimensions. When assigning new elements to
array subscripts that are outside the current array bounds, an
undetected integer overflow could occur in edge cases. Memory
stomps that are potentially exploitable for arbitrary code
execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
from signalling background workers and autovacuum processes.
The documentation says that pg_signal_backend cannot issue
signals to superuser-owned processes. It was able to signal
these background processes, though, because they advertise a
role OID of zero. Treat that as indicating superuser ownership.
The security implications of cancelling one of these process
types are fairly small so far as the core code goes (we'll just
start another one), but extensions might add background workers
that are more vulnerable.
Also ensure that the is_superuser parameter is set correctly in
such processes. No specific security consequences are known for
that oversight, but it might be significant for some extensions.
(bsc#1216960)
Changes in postgresql16:
- Upgrade to 16.1:
* https://www.postgresql.org/about/news/2715
* https://www.postgresql.org/docs/16/release-16.html
* https://www.postgresql.org/docs/16/release-16-1.html
- Overhaul postgresql-README.SUSE and move it from the binary
package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
Changes in postgresql15:
- Update to 15.5 https://www.postgresql.org/docs/15/release-15-5.html
- The libs and mini package are now provided by postgresql16.
- Overhaul postgresql-README.SUSE and move it from the binary
package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
Changes in postgresql:
- Interlock version and release of all noarch packages except for
the postgresql-docs.
- bsc#1122892: Add a sysconfig variable for initdb.
- Overhaul postgresql-README.SUSE and move it from the binary
package to the noarch wrapper package.
- bsc#1179231: Add an explanation for the /tmp -> /run/postgresql
move and permission change.
- Add postgresql-README as a separate source file.
- bsc#1209208: Drop hard dependency on systemd
- bsc#1206796: Refine the distinction of where to use sysusers and
use bcond to have the expression only in one place.
libecpg6-16.1-150200.5.7.1.x86_64.rpm
postgresql-16-150400.4.9.2.src.rpm
postgresql-contrib-16-150400.4.9.2.noarch.rpm
postgresql-devel-16-150400.4.9.2.noarch.rpm
postgresql-docs-16-150400.4.9.2.noarch.rpm
postgresql-plperl-16-150400.4.9.2.noarch.rpm
postgresql-plpython-16-150400.4.9.2.noarch.rpm
postgresql-pltcl-16-150400.4.9.2.noarch.rpm
postgresql-server-16-150400.4.9.2.noarch.rpm
postgresql-server-devel-16-150400.4.9.2.noarch.rpm
postgresql15-15.5-150200.5.19.1.src.rpm
postgresql15-contrib-15.5-150200.5.19.1.x86_64.rpm
postgresql15-devel-15.5-150200.5.19.1.x86_64.rpm
postgresql15-docs-15.5-150200.5.19.1.noarch.rpm
postgresql15-plperl-15.5-150200.5.19.1.x86_64.rpm
postgresql15-plpython-15.5-150200.5.19.1.x86_64.rpm
postgresql15-pltcl-15.5-150200.5.19.1.x86_64.rpm
postgresql15-server-15.5-150200.5.19.1.x86_64.rpm
postgresql15-server-devel-15.5-150200.5.19.1.x86_64.rpm
postgresql16-16.1-150200.5.7.1.src.rpm
postgresql16-contrib-16.1-150200.5.7.1.x86_64.rpm
postgresql16-devel-16.1-150200.5.7.1.x86_64.rpm
postgresql16-docs-16.1-150200.5.7.1.noarch.rpm
postgresql16-plperl-16.1-150200.5.7.1.x86_64.rpm
postgresql16-plpython-16.1-150200.5.7.1.x86_64.rpm
postgresql16-pltcl-16.1-150200.5.7.1.x86_64.rpm
postgresql16-server-16.1-150200.5.7.1.x86_64.rpm
postgresql16-server-devel-16.1-150200.5.7.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4479
Security update for postgresql14
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postgresql14 fixes the following issues:
Security issues fixed:
* CVE-2023-5868: Fix handling of unknown-type
arguments in DISTINCT "any" aggregate functions. This error led
to a text-type value being interpreted as an unknown-type value
(that is, a zero-terminated string) at runtime. This could
result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
computing new array dimensions. When assigning new elements to
array subscripts that are outside the current array bounds, an
undetected integer overflow could occur in edge cases. Memory
stomps that are potentially exploitable for arbitrary code
execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
from signalling background workers and autovacuum processes.
The documentation says that pg_signal_backend cannot issue
signals to superuser-owned processes. It was able to signal
these background processes, though, because they advertise a
role OID of zero. Treat that as indicating superuser ownership.
The security implications of cancelling one of these process
types are fairly small so far as the core code goes (we'll just
start another one), but extensions might add background workers
that are more vulnerable.
Also ensure that the is_superuser parameter is set correctly in
such processes. No specific security consequences are known for
that oversight, but it might be significant for some extensions.
(bsc#1216960)
- update to 14.10: https://www.postgresql.org/docs/14/release-14-10.html
- Overhaul postgresql-README.SUSE and move it from the binary
package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
postgresql14-14.10-150200.5.36.1.src.rpm
postgresql14-contrib-14.10-150200.5.36.1.x86_64.rpm
postgresql14-devel-14.10-150200.5.36.1.x86_64.rpm
postgresql14-docs-14.10-150200.5.36.1.noarch.rpm
postgresql14-plperl-14.10-150200.5.36.1.x86_64.rpm
postgresql14-plpython-14.10-150200.5.36.1.x86_64.rpm
postgresql14-pltcl-14.10-150200.5.36.1.x86_64.rpm
postgresql14-server-14.10-150200.5.36.1.x86_64.rpm
postgresql14-server-devel-14.10-150200.5.36.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4430
Security update for apache2
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2 fixes the following issues:
- CVE-2023-31122: Fixed an out of bounds read in mod_macro (bsc#1216424).
Non-security fixes:
- Fixed the content type handling in mod_proxy_http2 (bsc#1214357).
- Fixed a floating point exception crash (bsc#1207399).
apache2-2.4.51-150400.6.14.1.src.rpm
apache2-devel-2.4.51-150400.6.14.1.x86_64.rpm
apache2-doc-2.4.51-150400.6.14.1.noarch.rpm
apache2-worker-2.4.51-150400.6.14.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4483
Security update for frr
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for frr fixes the following issues:
- CVE-2023-46752: Fixed denial of service caused by mishandling malformed MP_REACH_NLRI data (bsc#1216627).
- CVE-2023-46753: Fixed denial of service caused by crafted BGP UPDATE messages (bsc#1216626).
frr-7.4-150300.4.20.1.src.rpm
frr-7.4-150300.4.20.1.x86_64.rpm
frr-devel-7.4-150300.4.20.1.x86_64.rpm
libfrr0-7.4-150300.4.20.1.x86_64.rpm
libfrr_pb0-7.4-150300.4.20.1.x86_64.rpm
libfrrcares0-7.4-150300.4.20.1.x86_64.rpm
libfrrfpm_pb0-7.4-150300.4.20.1.x86_64.rpm
libfrrgrpc_pb0-7.4-150300.4.20.1.x86_64.rpm
libfrrospfapiclient0-7.4-150300.4.20.1.x86_64.rpm
libfrrsnmp0-7.4-150300.4.20.1.x86_64.rpm
libfrrzmq0-7.4-150300.4.20.1.x86_64.rpm
libmlag_pb0-7.4-150300.4.20.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4380
Security update for squid
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
- CVE-2023-46846: Request/Response smuggling in HTTP/1.1 and ICAP (bsc#1216500).
- CVE-2023-46847: Denial of Service in HTTP Digest Authentication (bsc#1216495).
- CVE-2023-46724: Fix validation of certificates with CN=* (bsc#1216803).
- CVE-2023-46848: Denial of Service in FTP (bsc#1216498).
squid-5.7-150400.3.12.1.src.rpm
squid-5.7-150400.3.12.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4618
Recommended update for orarun
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for orarun fixes the following issues:
- Fixed 'grep: oracle: No such file or directory' error during oracle user login with csh/tcsh
(/etc/profile.d/oracle.csh) (bsc#1216566)
orarun-2.1-150400.22.3.1.src.rpm
orarun-2.1-150400.22.3.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4477
Recommended update for grub2
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for grub2 fixes the following issues:
- Fix failure to identify recent ext4 filesystem (bsc#1216010)
- Fix reading files from btrfs with "implicit" holes
- Fix fadump not working with 1GB/2GB/4GB LMB[P10] (bsc#1216253)
- Fix detection of encrypted disk's uuid in powerpc (bsc#1216075)
grub2-2.06-150400.11.41.1.src.rpm
grub2-x86_64-xen-2.06-150400.11.41.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4476
Security update for xen
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).
- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).
- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).
- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).
- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).
- Upstream bug fixes (bsc#1027519)
xen-4.16.5_08-150400.4.40.1.src.rpm
True
xen-4.16.5_08-150400.4.40.1.x86_64.rpm
True
xen-devel-4.16.5_08-150400.4.40.1.x86_64.rpm
True
xen-tools-4.16.5_08-150400.4.40.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.5_08-150400.4.40.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4513
Security update for apache2-mod_jk
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for apache2-mod_jk fixes the following issues:
Update to version 1.2.49:
Apache
* Retrieve default request id from mod_unique_id. It can also be
taken from an arbitrary environment variable by configuring
"JkRequestIdIndicator".
* Don't delegate the generatation of the response body to httpd
when the status code represents an error if the request used
the HEAD method.
* Only export the main module symbol. Visibility of module
internal symbols led to crashes when conflicting with library
symbols. Based on a patch provided by Josef Čejka.
* Remove support for implicit mapping of requests to workers.
All mappings must now be explicit.
IIS
* Set default request id as a GUID. It can also be taken from an
arbitrary request header by configuring "request_id_header".
* Fix non-empty check for the Translate header.
Common
* Fix compiler warning when initializing and copying fixed
length strings.
* Add a request id to mod_jk log lines.
* Enable configure to find the correct sizes for pid_t and
pthread_t when building on MacOS.
* Fix Clang 15/16 compatability. Pull request #6 provided by
Sam James.
* Improve XSS hardening in status worker.
* Add additional bounds and error checking when reading AJP
messages.
Docs
* Remove support for the Netscape / Sun ONE / Oracle iPlanet Web
Server as the product has been retired.
* Remove links to the old JK2 documentation. The JK2
documentation is still available, it is just no longer linked
from the current JK documentation.
* Restructure subsections in changelog starting with version
1.2.45.
Changes for 1.2.47 and 1.2.48 updates:
* Add: Apache: Extend trace level logging of method entry/exit to
aid debugging of request mapping issues.
* Fix: Apache: Fix a bug in the normalization checks that prevented
file based requests, such as SSI file includes, from being processed.
* Fix: Apache: When using JkAutoAlias, ensure that files that include
spaces in their name are accessible.
* Update: Common: Update the documentation to reflect that the source
code for the Apache Tomcat Connectors has moved from Subversion to Git.
* Fix: Common: When using set_session_cookie, ensure that an updated session
cookie is issued if the load-balancer has to failover to a different worker.
* Update: Common: Update config.guess and config.sub from
https://git.savannah.gnu.org/git/config.git.
* Update: Common: Update release script for migration to git.
Update to version 1.2.46
Fixes:
* Apache: Fix regression in 1.2.44 which resulted in
socket_connect_timeout to be interpreted in units of seconds
instead of milliseconds on platforms that provide poll(). (rjung)
* Security: CVE-2018-11759 Connector path traversal [bsc#1114612]
Update to version 1.2.45
Fixes:
* Correct regression in 1.2.44 that broke request handling for
OPTIONS * requests. (rjung)
* Improve path parameter parsing so that the session ID specified
by the session_path worker property for load-balanced workers
can be extracted from a path parameter in any segment of the
URI, rather than only from the final segment. (markt)
* Apache: Improve path parameter handling so that JkStripSession
can remove session IDs that are specified on path parameters in any
segment of the URI rather than only the final segment. (markt)
* IIS: Improve path parameter handling so that strip_session can
remove session IDs that are specified on path parameters in any
segment of the URI rather than only the final segment. (markt)
Updates:
* Apache: Update the documentation to note additional
limitations of the JkAutoAlias directive. (markt)
Code:
* Common: Optimize path parameter handling. (rjung)
Update to version 1.2.44
Updates:
* Remove the Novell Netware make files and Netware specific source
code since there has not been a supported version of Netware
available for over five years. (markt)
* Apache: Update the documentation to use httpd 2.4.x style access
control directives. (markt)
* Update PCRE bundled with the ISAPI redirector to 8.42. (rjung)
* Update config.guess and config.sub from
https://git.savannah.gnu.org/git/config.git. (rjung)
Fixes:
* Common: Use Local, rather than Global, mutexs on Windows to
better support multi-user environments. (markt)
* Apache: Use poll rather than select to avoid the limitations of
select triggering an httpd crash. Patch provided by Koen Wilde. (markt)
* ISAPI: Remove the check that rejects requests that contain path
segments that match WEB-INF or META-INF as it duplicates a check
that Tomcat performs and, because ISAPI does not have visibility of
the current context path, it is impossible to implement this check
without valid requests being rejected. (markt)
* Refactor normalisation of request URIs to a common location and align
the normalisation implementation for mod_jk with that implemented by
Tomcat. (markt)
Add:
* Clarify the behvaiour of lb workers when all ajp13 workers fail with
particular reference to the role of the retries attribute. (markt)
* Add the new load-balancer worker property lb_retries to improve the
control over the number of retries. Based on a patch provided by
Frederik Nosi. (markt)
* Add a note to the documentation that the CollapseSlashes options are
now effectively hard-coded to CollpaseSlashesAll due to the changes
made to align normalization with that implemented in Tomcat. (markt)
apache2-mod_jk-1.2.49-150100.6.6.1.src.rpm
apache2-mod_jk-1.2.49-150100.6.6.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4881
Recommended update for ipmitool
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for ipmitool fixes the following issues:
- Fix unsupported LAN parameter lookup error (bsc#1216556)
ipmitool-1.8.18.238.gb7adc1d-150400.3.6.1.src.rpm
ipmitool-bmc-snmp-proxy-1.8.18.238.gb7adc1d-150400.3.6.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4607
Security update for python3-Twisted
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python3-Twisted fixes the following issues:
- CVE-2023-46137: Fixed issue inside serializing pipelined HTTP requests. (bsc#1216588)
python3-Twisted-22.2.0-150400.15.1.src.rpm
python3-Twisted-22.2.0-150400.15.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4606
Recommended update for python-apache-libcloud
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for python-apache-libcloud fixes the following issues:
- list_nodes() function in the Azure ARM driver does not handle pagination and
does not return all the VMs for a subscription (bsc#1214808)
python-apache-libcloud-3.3.1-150300.3.3.1.src.rpm
python3-apache-libcloud-3.3.1-150300.3.3.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4573
Security update for openvswitch
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openvswitch fixes the following issues:
- CVE-2023-5366: Fixed missing masks on a final stage with ports trie (bsc#1216002).
libopenvswitch-2_14-0-2.14.2-150400.24.14.2.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.14.2.x86_64.rpm
openvswitch-2.14.2-150400.24.14.2.src.rpm
openvswitch-2.14.2-150400.24.14.2.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.14.2.x86_64.rpm
openvswitch-ipsec-2.14.2-150400.24.14.2.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.14.2.x86_64.rpm
openvswitch-test-2.14.2-150400.24.14.2.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.14.2.x86_64.rpm
ovn-20.06.2-150400.24.14.2.x86_64.rpm
ovn-central-20.06.2-150400.24.14.2.x86_64.rpm
ovn-devel-20.06.2-150400.24.14.2.x86_64.rpm
ovn-docker-20.06.2-150400.24.14.2.x86_64.rpm
ovn-host-20.06.2-150400.24.14.2.x86_64.rpm
ovn-vtep-20.06.2-150400.24.14.2.x86_64.rpm
python3-ovs-2.14.2-150400.24.14.2.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4544
Security update for squid
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
- CVE-2023-46728: Remove gopher support (bsc#1216926).
- Fixed overread in HTTP request header parsing (bsc#1217274).
squid-5.7-150400.3.15.1.src.rpm
squid-5.7-150400.3.15.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4939
Security update for rabbitmq-server
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for rabbitmq-server fixes the following issues:
- CVE-2023-46118: Introduce HTTP request body limit for definition uploads (bsc#1216582).
erlang-rabbitmq-client-3.8.11-150300.3.14.1.x86_64.rpm
rabbitmq-server-3.8.11-150300.3.14.1.src.rpm
rabbitmq-server-3.8.11-150300.3.14.1.x86_64.rpm
rabbitmq-server-plugins-3.8.11-150300.3.14.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4976
Recommended update for mariadb-connector-c
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for mariadb-connector-c fixes the following issue:
- Update to release 3.1.22:
libmariadb-devel-3.1.22-150000.3.36.1.x86_64.rpm
libmariadb_plugins-3.1.22-150000.3.36.1.x86_64.rpm
mariadb-connector-c-3.1.22-150000.3.36.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4681
Recommended update for qemu
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for qemu fixes the following issues:
- Fix migration issues by disabling transfer of acpi_index (bsc#1216985)
- Fix qemu crash on starting dirty log twice with stopped VM (bsc#1214367)
- Fix incorrect calls of log_global_start/stop (bsc#1214367)
qemu-6.2.0-150400.37.26.1.src.rpm
qemu-6.2.0-150400.37.26.1.x86_64.rpm
qemu-accel-tcg-x86-6.2.0-150400.37.26.1.x86_64.rpm
qemu-audio-alsa-6.2.0-150400.37.26.1.x86_64.rpm
qemu-audio-pa-6.2.0-150400.37.26.1.x86_64.rpm
qemu-audio-spice-6.2.0-150400.37.26.1.x86_64.rpm
qemu-block-curl-6.2.0-150400.37.26.1.x86_64.rpm
qemu-block-iscsi-6.2.0-150400.37.26.1.x86_64.rpm
qemu-block-rbd-6.2.0-150400.37.26.1.x86_64.rpm
qemu-block-ssh-6.2.0-150400.37.26.1.x86_64.rpm
qemu-chardev-baum-6.2.0-150400.37.26.1.x86_64.rpm
qemu-chardev-spice-6.2.0-150400.37.26.1.x86_64.rpm
qemu-guest-agent-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-display-qxl-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-display-virtio-gpu-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-display-virtio-vga-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-usb-host-6.2.0-150400.37.26.1.x86_64.rpm
qemu-hw-usb-redirect-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ipxe-1.0.0+-150400.37.26.1.noarch.rpm
qemu-ksm-6.2.0-150400.37.26.1.x86_64.rpm
qemu-kvm-6.2.0-150400.37.26.1.x86_64.rpm
qemu-lang-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ui-curses-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ui-gtk-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ui-opengl-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ui-spice-app-6.2.0-150400.37.26.1.x86_64.rpm
qemu-ui-spice-core-6.2.0-150400.37.26.1.x86_64.rpm
qemu-x86-6.2.0-150400.37.26.1.x86_64.rpm
qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.26.1.noarch.rpm
qemu-sgabios-8-150400.37.26.1.noarch.rpm
qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.26.1.noarch.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4989
Recommended update for 389-ds
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for 389-ds fixes the following issues:
- Fix 'Replica ID cannot be specified for consumer and hub roles' error when enabling replication (bsc#1217581)
- Update to version 2.0.17~git91.37da5ec
* Issue 5984 - Crash when paged result search are abandoned - fix2 (#5987)
* Issue 5984 - Crash when paged result search are abandoned (#5985)
* Issue 5971 - CLI - Fix password prompt for repl status (#5972)
* Issue 3555 - UI - Fix audit issue with npm - babel/traverse (#5959)
* Issue 5966 - CLI - Custom schema object is removed on a failed edit (#5967)
* Issue 5956 - After an upgrade the server won't start - nsslapd-connta… …blesize (#5963)
* Issue 5956 - After an upgrade the server won't start - nsslapd-conntablesize (#5957)
* Issue 5848 - Fix condition and add a CI test (#5916)
* Issue 5853 - Revert MSRV check (#5908)
* Issue 5722 - improve testcase (#5904)
389-ds-2.0.17~git91.37da5ec-150400.3.34.1.src.rpm
389-ds-2.0.17~git91.37da5ec-150400.3.34.1.x86_64.rpm
389-ds-devel-2.0.17~git91.37da5ec-150400.3.34.1.x86_64.rpm
lib389-2.0.17~git91.37da5ec-150400.3.34.1.x86_64.rpm
libsvrcore0-2.0.17~git91.37da5ec-150400.3.34.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4698
Security update for squid
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for squid fixes the following issues:
- CVE-2023-49285: Fixed buffer over read bug on HTTP Message processing flow (bsc#1217813)
- CVE-2023-49286: Fixed Denial of Service vulnerability in helper process management (bsc#1217815)
- Fix X-Forwarded-For Stack Overflow (bsc#1217654)
squid-5.7-150400.3.20.1.src.rpm
squid-5.7-150400.3.20.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4661
Security update for openvswitch
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for openvswitch fixes the following issues:
- CVE-2023-5366: Fixed missing masks on a final stage with ports trie (bsc#1216002).
libopenvswitch-2_14-0-2.14.2-150400.24.17.1.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.17.1.x86_64.rpm
openvswitch-2.14.2-150400.24.17.1.src.rpm
openvswitch-2.14.2-150400.24.17.1.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.17.1.x86_64.rpm
openvswitch-ipsec-2.14.2-150400.24.17.1.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.17.1.x86_64.rpm
openvswitch-test-2.14.2-150400.24.17.1.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.17.1.x86_64.rpm
ovn-20.06.2-150400.24.17.1.x86_64.rpm
ovn-central-20.06.2-150400.24.17.1.x86_64.rpm
ovn-devel-20.06.2-150400.24.17.1.x86_64.rpm
ovn-docker-20.06.2-150400.24.17.1.x86_64.rpm
ovn-host-20.06.2-150400.24.17.1.x86_64.rpm
ovn-vtep-20.06.2-150400.24.17.1.x86_64.rpm
python3-ovs-2.14.2-150400.24.17.1.x86_64.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4671
Recommended update for man
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update of man fixes the following problem:
- The "man" commands is delivered to SUSE Linux Enterprise Micro
to allow browsing man pages.
system-group-libvirt-20170617-150400.24.2.1.noarch.rpm
system-user-ftp-20170617-150400.24.2.1.noarch.rpm
system-user-qemu-20170617-150400.24.2.1.noarch.rpm
system-user-upsd-20170617-150400.24.2.1.noarch.rpm
system-user-uuidd-20170617-150400.24.2.1.noarch.rpm
system-users-20170617-150400.24.2.1.src.rpm
SUSE-SLE-Module-Server-Applications-15-SP4-2023-4880
Recommended update for xen
moderate
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for xen fixes the following issues:
- Upstream bug fixes (bsc#1027519)
xen-4.16.5_10-150400.4.43.1.src.rpm
True
xen-4.16.5_10-150400.4.43.1.x86_64.rpm
True
xen-devel-4.16.5_10-150400.4.43.1.x86_64.rpm
True
xen-tools-4.16.5_10-150400.4.43.1.x86_64.rpm
True
xen-tools-xendomains-wait-disk-4.16.5_10-150400.4.43.1.noarch.rpm
True
SUSE-SLE-Module-Server-Applications-15-SP4-2024-12
Security update for postfix
important
SUSE Updates SLE-Module-Server-Applications 15-SP4 x86 64
This update for postfix fixes the following issues:
- CVE-2023-51764: Fixed SMTP smuggling attack (bsc#1218304).
postfix-3.5.9-150300.5.15.1.src.rpm
postfix-mysql-3.5.9-150300.5.15.1.x86_64.rpm