Image summary for SUSE:SLE-15-SP3:Update:QR:QU3


SUSE-IU-2000:21-1

Container Advisory IDSUSE-IU-2000:21-1
Container TagsSUSE:SLE-15-SP3:3
Container Release
The following patches have been included in this update:
Advisory IDSUSE-SU-2021:3387-1
ReleasedTue Oct 12 17:09:16 2021
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1065729,1148868,1152489,1154353,1159886,1167773,1170774,1171688,1173746,1174003,1176447,1176940,1177028,1178134,1184439,1184804,1185302,1185550,1185677,1185726,1185762,1187211,1188067,1188418,1188651,1188986,1189257,1189297,1189841,1189884,1190023,1190062,1190115,1190138,1190159,1190358,1190406,1190432,1190467,1190523,1190534,1190543,1190544,1190561,1190576,1190595,1190596,1190598,1190620,1190626,1190679,1190705,1190717,1190746,1190758,1190784,1190785,1191172,1191193,1191292,CVE-2020-3702,CVE-2021-3669,CVE-2021-3744,CVE-2021-3752,CVE-2021-3759,CVE-2021-3764,CVE-2021-40490
Description:


The SUSE Linux Enterprise 15 SP3 kernel was updated.
The following security bugs were fixed:


The following non-security bugs were fixed:


Advisory IDSUSE-RU-2021:3589-1
ReleasedMon Nov 1 19:27:52 2021
SummaryRecommended update for apparmor
Typerecommended
Severitymoderate
References1191690
Description:

This update for apparmor fixes the following issues:


Advisory IDSUSE-SU-2021:3675-1
ReleasedTue Nov 16 17:47:44 2021
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1065729,1085030,1089118,1094840,1133021,1152472,1152489,1154353,1156395,1157177,1167773,1172073,1173604,1176447,1176774,1176914,1176940,1178134,1180100,1180749,1181147,1184673,1185762,1186063,1186109,1187167,1188563,1188601,1189841,1190006,1190067,1190349,1190351,1190479,1190620,1190642,1190795,1190801,1190941,1191229,1191240,1191241,1191315,1191317,1191349,1191384,1191449,1191450,1191451,1191452,1191455,1191456,1191628,1191645,1191663,1191731,1191800,1191851,1191867,1191934,1191958,1191980,1192040,1192041,1192074,1192107,1192145,1192229,1192267,1192288,1192549,CVE-2021-33033,CVE-2021-34866,CVE-2021-3542,CVE-2021-3655,CVE-2021-3715,CVE-2021-37159,CVE-2021-3760,CVE-2021-3772,CVE-2021-3896,CVE-2021-41864,CVE-2021-42008,CVE-2021-42252,CVE-2021-42739,CVE-2021-43056,CVE-2021-43389
Description:



The following security bugs were fixed:


The following non-security bugs were fixed:


Advisory IDSUSE-SU-2021:3941-1
ReleasedMon Dec 6 14:45:20 2021
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1152489,1169263,1170269,1184924,1190523,1190795,1191790,1191961,1192045,1192217,1192273,1192328,1192375,1192473,1192718,1192740,1192745,1192750,1192753,1192758,1192781,1192802,1192896,1192906,1192918,CVE-2021-0941,CVE-2021-20322,CVE-2021-31916,CVE-2021-34981
Description:



The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:


You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

The following non-security bugs were fixed:


Advisory IDSUSE-SU-2021:3999-1
ReleasedSun Dec 12 10:17:43 2021
SummarySecurity update for log4j
Typesecurity
Severityimportant
References1193611,CVE-2021-44228
Description:

This update for log4j fixes the following issues:


Advisory IDSUSE-RU-2021:4014-1
ReleasedMon Dec 13 13:57:39 2021
SummaryRecommended update for apparmor
Typerecommended
Severitymoderate
References1191532,1191690
Description:

This update for apparmor fixes the following issues:
Changes in apparmor:


Advisory IDSUSE-SU-2021:4094-1
ReleasedWed Dec 15 11:17:24 2021
SummarySecurity update for log4j
Typesecurity
Severityimportant
References1193611,1193743,CVE-2021-44228,CVE-2021-45046
Description:

This update for log4j fixes the following issue:
CVE-2021-44228: The previously published fix by upstream turned out to be incomplete. Therefore, upstream has recommended disabling JNDI support in log4j by default to be completely sure that this vulnerability cannot be exploited.
This update implements that recommendation and disables JNDI support by default. [bsc#1193611, CVE-2021-44228]
CVE-2021-45046: A Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack is also fixed by disabling JNDI support by default (bsc#1193743)


Advisory IDSUSE-SU-2021:4107-1
ReleasedThu Dec 16 19:02:22 2021
SummarySecurity update for log4j
Typesecurity
Severityimportant
References1193743,CVE-2021-44228,CVE-2021-45046
Description:

This update for log4j fixes the following issue:


Advisory IDSUSE-SU-2021:4118-1
ReleasedMon Dec 20 12:43:09 2021
SummarySecurity update for log4j
Typesecurity
Severityimportant
References1193887,1193888,CVE-2021-45105
Description:

This update for log4j fixes the following issues:


Advisory IDSUSE-SU-2021:4208-1
ReleasedThu Dec 30 12:55:58 2021
SummarySecurity update for log4j
Typesecurity
Severitymoderate
References1194127,CVE-2021-44832
Description:

This update for log4j fixes the following issues:


Advisory IDSUSE-RU-2022:47-1
ReleasedTue Jan 11 09:11:59 2022
SummaryRecommended update for wsmancli
Typerecommended
Severitymoderate
References1047218
Description:

This update for wsmancli fixes the following issues:




Advisory IDSUSE-feature-2022:122-1
ReleasedTue Jan 18 17:56:11 2022
SummaryFeature update for zxing-cpp
Typefeature
Severitymoderate
References1158377,1180479,1181915,1183655,1187982,1189813
Description:

This feature update for zxing-cpp fixes the following issues:
Update LibreOffice from version 7.1.4.2 to 7.2.3.2 (jsc#SLE-18214):



Provide `zxing-cpp` 1.2.0 as new LibreOffice dependency. (jsc#SLE-18214)


Advisory IDSUSE-SU-2022:131-1
ReleasedWed Jan 19 17:30:58 2022
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1139944,1151927,1152489,1153275,1154353,1154355,1161907,1164565,1166780,1169514,1176242,1176447,1176536,1176544,1176545,1176546,1176548,1176558,1176559,1176774,1176940,1176956,1177440,1178134,1178270,1179211,1179424,1179426,1179427,1179599,1181148,1181507,1181710,1182404,1183534,1183540,1183897,1184318,1185726,1185902,1186332,1187541,1189126,1189158,1191793,1191876,1192267,1192320,1192507,1192511,1192569,1192606,1192691,1192845,1192847,1192874,1192946,1192969,1192987,1192990,1192998,1193002,1193042,1193139,1193169,1193306,1193318,1193349,1193440,1193442,1193655,1193993,1194087,1194094,CVE-2020-24504,CVE-2020-27820,CVE-2021-28711,CVE-2021-28712,CVE-2021-28713,CVE-2021-28714,CVE-2021-28715,CVE-2021-4001,CVE-2021-4002,CVE-2021-43975,CVE-2021-43976,CVE-2021-45485,CVE-2021-45486
Description:


The SUSE Linux Enterprise 15 SP3 kernel was updated


The following security bugs were fixed:

The following non-security bugs were fixed:


Advisory IDSUSE-SU-2022:157-1
ReleasedMon Jan 24 10:10:38 2022
SummarySecurity update for zxing-cpp
Typesecurity
Severityimportant
References1191743,1191942,1191944,CVE-2021-28021,CVE-2021-42715,CVE-2021-42716
Description:

This update for zxing-cpp fixes the following issues:


Advisory IDSUSE-SU-2022:190-1
ReleasedTue Jan 25 19:10:04 2022
SummarySecurity update for polkit
Typesecurity
Severityimportant
References1194568,CVE-2021-4034
Description:

This update for polkit fixes the following issues:


Advisory IDSUSE-SU-2022:198-1
ReleasedWed Jan 26 07:42:51 2022
SummarySecurity update for the Linux Kernel
Typesecurity
Severityimportant
References1065729,1071995,1154353,1154492,1156395,1167773,1176447,1176774,1177437,1190256,1191271,1191929,1192931,1193255,1193328,1193660,1193669,1193727,1193901,1193927,1194001,1194027,1194087,1194094,1194266,1194302,1194493,1194516,1194517,1194518,1194529,1194578,1194580,1194584,1194586,1194587,1194589,1194590,1194591,1194592,1194888,1194953,1194985,CVE-2021-4083,CVE-2021-4135,CVE-2021-4149,CVE-2021-4197,CVE-2021-4202,CVE-2021-45485,CVE-2021-45486,CVE-2021-46283,CVE-2022-0185,CVE-2022-0322
Description:



The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:


The following non-security bugs were fixed:


Advisory IDSUSE-SU-2022:199-1
ReleasedWed Jan 26 09:36:05 2022
SummarySecurity update for MozillaThunderbird
Typesecurity
Severityimportant
References1194547,CVE-2021-4140,CVE-2022-22737,CVE-2022-22738,CVE-2022-22739,CVE-2022-22740,CVE-2022-22741,CVE-2022-22742,CVE-2022-22743,CVE-2022-22744,CVE-2022-22745,CVE-2022-22746,CVE-2022-22747,CVE-2022-22748,CVE-2022-22751
Description:

This update for MozillaThunderbird fixes the following issues:


Advisory IDSUSE-RU-2022:203-1
ReleasedWed Jan 26 14:13:45 2022
SummaryRecommended update for cloud-init
Typerecommended
Severityimportant
References1186004
Description:

This update for cloud-init fixes the following issues:

From 21.1 + Azure: Support for VMs without ephemeral resource disks. (#800) [Johnson Shi] (LP: #1901011) + cc_keys_to_console: add option to disable key emission (#811) [Michael Hudson-Doyle] (LP: #1915460) + integration_tests: introduce lxd_use_exec mark (#802) + azure: case-insensitive UUID to avoid new IID during kernel upgrade (#798) (LP: #1835584) + stale.yml: don't ask submitters to reopen PRs (#816) + integration_tests: fix use of SSH agent within tox (#815) + integration_tests: add UPGRADE CloudInitSource (#812) + integration_tests: use unique MAC addresses for tests (#813) + Update .gitignore (#814) + Port apt cloud_tests to integration tests (#808) + integration_tests: fix test_gh626 on LXD VMs (#809) + Fix attempting to decode binary data in test_seed_random_data test (#806) + Remove wait argument from tests with session_cloud calls (#805) + Datasource for UpCloud (#743) [Antti Myyrä] + test_gh668: fix failure on LXD VMs (#801) + openstack: read the dynamic metadata group vendor_data2.json (#777) [Andrew Bogott] (LP: #1841104) + includedir in suoders can be prefixed by 'arroba' (#783) [Jordi Massaguer Pla] + [VMware] change default max wait time to 15s (#774) [xiaofengw-vmware] + Revert integration test associated with reverted #586 (#784) + Add jordimassaguerpla as contributor (#787) [Jordi Massaguer Pla] + Add Rick Harding to CLA signers (#792) [Rick Harding] + HACKING.rst: add clarifying note to LP CLA process section (#789) + Stop linting cloud_tests (#791) + cloud-tests: update cryptography requirement (#790) [Joshua Powers] + Remove 'remove-raise-on-failure' calls from integration_tests (#788) + Use more cloud defaults in integration tests (#757) + Adding self to cla signers (#776) [Andrew Bogott] + doc: avoid two warnings (#781) [Dan Kenigsberg] + Use proper spelling for Red Hat (#778) [Dan Kenigsberg] + Add antonyc to .github-cla-signers (#747) [Anton Chaporgin] + integration_tests: log image serial if available (#772) + [VMware] Support cloudinit raw data feature (#691) [xiaofengw-vmware] + net: Fix static routes to host in eni renderer (#668) [Pavel Abalikhin] + .travis.yml: don't run cloud_tests in CI (#756) + test_upgrade: add some missing commas (#769) + cc_seed_random: update documentation and fix integration test (#771) (LP: #1911227) + Fix test gh-632 test to only run on NoCloud (#770) (LP: #1911230) + archlinux: fix package upgrade command handling (#768) [Bao Trinh] + integration_tests: add integration test for LP: #1910835 (#761) + Fix regression with handling of IMDS ssh keys (#760) [Thomas Stringer] + integration_tests: log cloud-init version in SUT (#758) + Add ajmyyra as contributor (#742) [Antti Myyrä] + net_convert: add some missing help text (#755) + Missing IPV6_AUTOCONF=no to render sysconfig dhcp6 stateful on RHEL (#753) [Eduardo Otubo] + doc: document missing IPv6 subnet types (#744) [Antti Myyrä] + Add example configuration for datasource `AliYun` (#751) [Xiaoyu Zhong] + integration_tests: add SSH key selection settings (#754) + fix a typo in man page cloud-init.1 (#752) [Amy Chen] + network-config-format-v2.rst: add Netplan Passthrough section (#750) + stale: re-enable post holidays (#749) + integration_tests: port ca_certs tests from cloud_tests (#732) + Azure: Add telemetry for poll IMDS (#741) [Johnson Shi] + doc: move testing section from HACKING to its own doc (#739) + No longer allow integration test failures on travis (#738) + stale: fix error in definition (#740) + integration_tests: set log-cli-level to INFO by default (#737) + PULL_REQUEST_TEMPLATE.md: use backticks around commit message (#736) + stale: disable check for holiday break (#735) + integration_tests: log the path we collect logs into (#733) + .travis.yml: add (most) supported Python versions to CI (#734) + integration_tests: fix IN_PLACE CLOUD_INIT_SOURCE (#731) + cc_ca_certs: add RHEL support (#633) [cawamata] + Azure: only generate config for NICs with addresses (#709) [Thomas Stringer] + doc: fix CloudStack configuration example (#707) [Olivier Lemasle] + integration_tests: restrict test_lxd_bridge appropriately (#730) + Add integration tests for CLI functionality (#729) + Integration test for gh-626 (#728) + Some test_upgrade fixes (#726) + Ensure overriding test vars with env vars works for booleans (#727) + integration_tests: port lxd_bridge test from cloud_tests (#718) + Integration test for gh-632. (#725) + Integration test for gh-671 (#724) + integration-requirements.txt: bump pycloudlib commit (#723) + Drop unnecessary shebang from cmd/main.py (#722) [Eduardo Otubo] + Integration test for LP: #1813396 and #669 (#719) + integration_tests: include timestamp in log output (#720) + integration_tests: add test for LP: #1898997 (#713) + Add integration test for power_state_change module (#717) + Update documentation for network-config-format-v2 (#701) [ggiesen] + sandbox CA Cert tests to not require ca-certificates (#715) [Eduardo Otubo] + Add upgrade integration test (#693) + Integration test for 570 (#712) + Add ability to keep snapshotted images in integration tests (#711) + Integration test for pull #586 (#706) + integration_tests: introduce skipping of tests by OS (#702) + integration_tests: introduce IntegrationInstance.restart (#708) + Add lxd-vm to list of valid integration test platforms (#705) + Adding BOOTPROTO = dhcp to render sysconfig dhcp6 stateful on RHEL (#685) [Eduardo Otubo] + Delete image snapshots created for integration tests (#682) + Parametrize ssh_keys_provided integration test (#700) [lucasmoura] + Drop use_sudo attribute on IntegrationInstance (#694) [lucasmoura] + cc_apt_configure: add riscv64 as a ports arch (#687) [Dimitri John Ledkov] + cla: add xnox (#692) [Dimitri John Ledkov] + Collect logs from integration test runs (#675) From 20.4.1 + Revert 'ssh_util: handle non-default AuthorizedKeysFile config (#586)' From 20.4 + tox: avoid tox testenv subsvars for xenial support (#684) + Ensure proper root permissions in integration tests (#664) [James Falcon] + LXD VM support in integration tests (#678) [James Falcon] + Integration test for fallocate falling back to dd (#681) [James Falcon] + .travis.yml: correctly integration test the built .deb (#683) + Ability to hot-attach NICs to preprovisioned VMs before reprovisioning (#613) [aswinrajamannar] + Support configuring SSH host certificates. (#660) [Jonathan Lung] + add integration test for LP: #1900837 (#679) + cc_resizefs on FreeBSD: Fix _can_skip_ufs_resize (#655) [Mina Galić] (LP: #1901958, #1901958) + DataSourceAzure: push dmesg log to KVP (#670) [Anh Vo] + Make mount in place for tests work (#667) [James Falcon] + integration_tests: restore emission of settings to log (#657) + DataSourceAzure: update password for defuser if exists (#671) [Anh Vo] + tox.ini: only select 'ci' marked tests for CI runs (#677) + Azure helper: Increase Azure Endpoint HTTP retries (#619) [Johnson Shi] + DataSourceAzure: send failure signal on Azure datasource failure (#594) [Johnson Shi] + test_persistence: simplify VersionIsPoppedFromState (#674) + only run a subset of integration tests in CI (#672) + cli: add + -system param to allow validating system user-data on a machine (#575) + test_persistence: add VersionIsPoppedFromState test (#673) + introduce an upgrade framework and related testing (#659) + add + -no-tty option to gpg (#669) [Till Riedel] (LP: #1813396) + Pin pycloudlib to a working commit (#666) [James Falcon] + DataSourceOpenNebula: exclude SRANDOM from context output (#665) + cloud_tests: add hirsute release definition (#662) + split integration and cloud_tests requirements (#652) + faq.rst: add warning to answer that suggests running `clean` (#661) + Fix stacktrace in DataSourceRbxCloud if no metadata disk is found (#632) [Scott Moser] + Make wakeonlan Network Config v2 setting actually work (#626) [dermotbradley] + HACKING.md: unify network-refactoring namespace (#658) [Mina Galić] + replace usage of dmidecode with kenv on FreeBSD (#621) [Mina Galić] + Prevent timeout on travis integration tests. (#651) [James Falcon] + azure: enable pushing the log to KVP from the last pushed byte (#614) [Moustafa Moustafa] + Fix launch_kwargs bug in integration tests (#654) [James Falcon] + split read_fs_info into linux & freebsd parts (#625) [Mina Galić] + PULL_REQUEST_TEMPLATE.md: expand commit message section (#642) + Make some language improvements in growpart documentation (#649) [Shane Frasier] + Revert '.travis.yml: use a known-working version of lxd (#643)' (#650) + Fix not sourcing default 50-cloud-init ENI file on Debian (#598) [WebSpider] + remove unnecessary reboot from gpart resize (#646) [Mina Galić] + cloudinit: move dmi functions out of util (#622) [Scott Moser] + integration_tests: various launch improvements (#638) + test_lp1886531: don't assume /etc/fstab exists (#639) + Remove Ubuntu restriction from PR template (#648) [James Falcon] + util: fix mounting of vfat on *BSD (#637) [Mina Galić] + conftest: improve docstring for disable_subp_usage (#644) + doc: add example query commands to debug Jinja templates (#645) + Correct documentation and testcase data for some user-data YAML (#618) [dermotbradley] + Hetzner: Fix instance_id / SMBIOS serial comparison (#640) [Markus Schade] + .travis.yml: use a known-working version of lxd (#643) + tools/build-on-freebsd: fix comment explaining purpose of the script (#635) [Mina Galić] + Hetzner: initialize instance_id from system-serial-number (#630) [Markus Schade] (LP: #1885527) + Explicit set IPV6_AUTOCONF and IPV6_FORCE_ACCEPT_RA on static6 (#634) [Eduardo Otubo] + get_interfaces: don't exclude Open vSwitch bridge/bond members (#608) [Lukas Märdian] (LP: #1898997) + Add config modules for controlling IBM PowerVM RMC. (#584) [Aman306] (LP: #1895979) + Update network config docs to clarify MAC address quoting (#623) [dermotbradley] + gentoo: fix hostname rendering when value has a comment (#611) [Manuel Aguilera] + refactor integration testing infrastructure (#610) [James Falcon] + stages: don't reset permissions of cloud-init.log every boot (#624) (LP: #1900837) + docs: Add how to use cloud-localds to boot qemu (#617) [Joshua Powers] + Drop vestigial update_resolve_conf_file function (#620) [Scott Moser] + cc_mounts: correctly fallback to dd if fallocate fails (#585) (LP: #1897099) + .travis.yml: add integration-tests to Travis matrix (#600) + ssh_util: handle non-default AuthorizedKeysFile config (#586) [Eduardo Otubo] + Multiple file fix for AuthorizedKeysFile config (#60) [Eduardo Otubo] + bddeb: new + -packaging-branch argument to pull packaging from branch (#576) [Paride Legovini] + Add more integration tests (#615) [lucasmoura] + DataSourceAzure: write marker file after report ready in preprovisioning (#590) [Johnson Shi] + integration_tests: emit settings to log during setup (#601) + integration_tests: implement citest tests run in Travis (#605) + Add Azure support to integration test framework (#604) [James Falcon] + openstack: consider product_name as valid chassis tag (#580) [Adrian Vladu] (LP: #1895976) + azure: clean up and refactor report_diagnostic_event (#563) [Johnson Shi] + net: add the ability to blacklist network interfaces based on driver during enumeration of physical network devices (#591) [Anh Vo] + integration_tests: don't error on cloud-init failure (#596) + integration_tests: improve cloud-init.log assertions (#593) + conftest.py: remove top-level import of httpretty (#599) + tox.ini: add integration-tests testenv definition (#595) + PULL_REQUEST_TEMPLATE.md: empty checkboxes need a space (#597) + add integration test for LP: #1886531 (#592) + Initial implementation of integration testing infrastructure (#581) [James Falcon] + Fix name of ntp and chrony service on CentOS and RHEL. (#589) [Scott Moser] (LP: #1897915) + Adding a PR template (#587) [James Falcon] + Azure parse_network_config uses fallback cfg when generate IMDS network cfg fails (#549) [Johnson Shi] + features: refresh docs for easier out-of-context reading (#582) + Fix typo in resolv_conf module's description (#578) [Wacław Schiller] + cc_users_groups: minor doc formatting fix (#577) + Fix typo in disk_setup module's description (#579) [Wacław Schiller] + Add vendor-data support to seedfrom parameter for NoCloud and OVF (#570) [Johann Queuniet] + boot.rst: add First Boot Determination section (#568) (LP: #1888858) + opennebula.rst: minor readability improvements (#573) [Mina Galić] + cloudinit: remove unused LOG variables (#574) + create a shutdown_command method in distro classes (#567) [Emmanuel Thomé] + user_data: remove unused constant (#566) + network: Fix type and respect name when rendering vlan in sysconfig. (#541) [Eduardo Otubo] (LP: #1788915, #1826608) + Retrieve SSH keys from IMDS first with OVF as a fallback (#509) [Thomas Stringer] + Add jqueuniet as contributor (#569) [Johann Queuniet] + distros: minor typo fix (#562) + Bump the integration-requirements versioned dependencies (#565) [Paride Legovini] + network-config-format-v1: fix typo in nameserver example (#564) [Stanislas] + Run cloud-init-local.service after the hv_kvp_daemon (#505) [Robert Schweikert] + Add method type hints for Azure helper (#540) [Johnson Shi] + systemd: add Before=shutdown.target when Conflicts=shutdown.target is used (#546) [Paride Legovini] + LXD: detach network from profile before deleting it (#542) [Paride Legovini] (LP: #1776958) + redhat spec: add missing BuildRequires (#552) [Paride Legovini] + util: remove debug statement (#556) [Joshua Powers] + Fix cloud config on chef example (#551) [lucasmoura] From 20.3 + Azure: Add netplan driver filter when using hv_netvsc driver (#539) [James Falcon] (LP: #1830740) + query: do not handle non-decodable non-gzipped content (#543) + DHCP sandboxing failing on noexec mounted /var/tmp (#521) [Eduardo Otubo] + Update the list of valid ssh keys. (#487) [Ole-Martin Bratteng] (LP: #1877869) + cmd: cloud-init query to handle compressed userdata (#516) (LP: #1889938) + Pushing cloud-init log to the KVP (#529) [Moustafa Moustafa] + Add Alpine Linux support. (#535) [dermotbradley] + Detect kernel version before swap file creation (#428) [Eduardo Otubo] + cli: add devel make-mime subcommand (#518) + user-data: only verify mime-types for TYPE_NEEDED and x-shellscript (#511) (LP: #1888822) + DataSourceOracle: retry twice (and document why we retry at all) (#536) + Refactor Azure report ready code (#468) [Johnson Shi] + tox.ini: pin correct version of httpretty in xenial{,-dev} envs (#531) + Support Oracle IMDSv2 API (#528) [James Falcon] + .travis.yml: run a doc build during CI (#534) + doc/rtd/topics/datasources/ovf.rst: fix doc8 errors (#533) + Fix 'Users and Groups' configuration documentation (#530) [sshedi] + cloudinit.distros: update docstrings of add_user and create_user (#527) + Fix headers for device types in network v2 docs (#532) [Caleb Xavier Berger] + Add AlexBaranowski as contributor (#508) [Aleksander Baranowski] + DataSourceOracle: refactor to use only OPC v1 endpoint (#493) + .github/workflows/stale.yml: s/Josh/Rick/ (#526) + Fix a typo in apt pipelining module (#525) [Xiao Liang] + test_util: parametrize devlist tests (#523) [James Falcon] + Recognize LABEL_FATBOOT labels (#513) [James Falcon] (LP: #1841466) + Handle additional identifier for SLES For HPC (#520) [Robert Schweikert] + Revert 'test-requirements.txt: pin pytest to <6 (#512)' (#515) + test-requirements.txt: pin pytest to <6 (#512) + Add 'tsanghan' as contributor (#504) [tsanghan] + fix brpm building (LP: #1886107) + Adding eandersson as a contributor (#502) [Erik Olof Gunnar Andersson] + azure: disable bouncing hostname when setting hostname fails (#494) [Anh Vo] + VMware: Support parsing DEFAULT-RUN-POST-CUST-SCRIPT (#441) [xiaofengw-vmware] + DataSourceAzure: Use ValueError when JSONDecodeError is not available (#490) [Anh Vo] + cc_ca_certs.py: fix blank line problem when removing CAs and adding new one (#483) [dermotbradley] + freebsd: py37-serial is now py37-pyserial (#492) [Gonéri Le Bouder] + ssh exit with non-zero status on disabled user (#472) [Eduardo Otubo] (LP: #1170059) + cloudinit: remove global disable of pylint W0107 and fix errors (#489) + networking: refactor wait_for_physdevs from cloudinit.net (#466) (LP: #1884626) + HACKING.rst: add pytest.param pytest gotcha (#481) + cloudinit: remove global disable of pylint W0105 and fix errors (#480) + Fix two minor warnings (#475) + test_data: fix faulty patch (#476) + cc_mounts: handle missing fstab (#484) (LP: #1886531) + LXD cloud_tests: support more lxd image formats (#482) [Paride Legovini] + Add update_etc_hosts as default module on *BSD (#479) [Adam Dobrawy] + cloudinit: fix tip-pylint failures and bump pinned pylint version (#478) + Added BirknerAlex as contributor and sorted the file (#477) [Alexander Birkner] + Update list of types of modules in cli.rst [saurabhvartak1982] + tests: use markers to configure disable_subp_usage (#473) + Add mention of vendor-data to no-cloud format documentation (#470) [Landon Kirk] + Fix broken link to OpenStack metadata service docs (#467) [Matt Riedemann] + Disable ec2 mirror for non aws instances (#390) [lucasmoura] (LP: #1456277) + cloud_tests: don't pass + -python-version to read-dependencies (#465) + networking: refactor is_physical from cloudinit.net (#457) (LP: #1884619) + Enable use of the caplog fixture in pytest tests, and add a cc_final_message test using it (#461) + RbxCloud: Add support for FreeBSD (#464) [Adam Dobrawy] + Add schema for cc_chef module (#375) [lucasmoura] (LP: #1858888) + test_util: add (partial) testing for util.mount_cb (#463) + .travis.yml: revert to installing ubuntu-dev-tools (#460) + HACKING.rst: add details of net refactor tracking (#456) + .travis.yml: rationalise installation of dependencies in host (#449) + Add dermotbradley as contributor. (#458) [dermotbradley] + net/networking: remove unused functions/methods (#453) + distros.networking: initial implementation of layout (#391) + cloud-init.service.tmpl: use 'rhel' instead of 'redhat' (#452) + Change from redhat to rhel in systemd generator tmpl (#450) [Eduardo Otubo] + Hetzner: support reading user-data that is base64 encoded. (#448) [Scott Moser] (LP: #1884071) + HACKING.rst: add strpath gotcha to testing gotchas section (#446) + cc_final_message: don't create directories when writing boot-finished (#445) (LP: #1883903) + .travis.yml: only store new schroot if something has changed (#440) + util: add ensure_dir_exists parameter to write_file (#443) + printing the error stream of the dhclient process before killing it (#369) [Moustafa Moustafa] + Fix link to the MAAS documentation (#442) [Paride Legovini] (LP: #1883666) + RPM build: disable the dynamic mirror URLs when using a proxy (#437) [Paride Legovini] + util: rename write_file's copy_mode parameter to preserve_mode (#439) + .travis.yml: use $TRAVIS_BUILD_DIR for lxd_image caching (#438) + cli.rst: alphabetise devel subcommands and add net-convert to list (#430) + Default to UTF-8 in /var/log/cloud-init.log (#427) [James Falcon] + travis: cache the chroot we use for package builds (#429) + test: fix all flake8 E126 errors (#425) [Joshua Powers] + Fixes KeyError for bridge with no 'parameters:' setting (#423) [Brian Candler] (LP: #1879673) + When tools.conf does not exist, running cmd 'vmware-toolbox-cmd config get deployPkg enable-custom-scripts', the return code will be EX_UNAVAILABLE(69), on this condition, it should not take it as error. (#413) [chengcheng-chcheng] + Document CloudStack data-server well-known hostname (#399) [Gregor Riepl] + test: move conftest.py to top-level, to cover tests/ also (#414) + Replace cc_chef is_installed with use of subp.is_exe. (#421) [Scott Moser] + Move runparts to subp. (#420) [Scott Moser] + Move subp into its own module. (#416) [Scott Moser] + readme: point at travis-ci.com (#417) [Joshua Powers] + New feature flag functionality and fix includes failing silently (#367) [James Falcon] (LP: #1734939) + Enhance poll imds logging (#365) [Moustafa Moustafa] + test: fix all flake8 E121 and E123 errors (#404) [Joshua Powers] + test: fix all flake8 E241 (#403) [Joshua Powers] + test: ignore flake8 E402 errors in main.py (#402) [Joshua Powers] + cc_grub_dpkg: determine idevs in more robust manner with grub-probe (#358) [Matthew Ruffell] (LP: #1877491) + test: fix all flake8 E741 errors (#401) [Joshua Powers] + tests: add groovy integration tests for ubuntu (#400) + Enable chef_license support for chef infra client (#389) [Bipin Bachhao] + testing: use flake8 again (#392) [Joshua Powers] + enable Puppet, Chef mcollective in default config (#385) [Mina Galić (deprecated: Igor Galić)] (LP: #1880279) + HACKING.rst: introduce .net + > Networking refactor section (#384) + Travis: do not install python3-contextlib2 (dropped dependency) (#388) [Paride Legovini] + HACKING: mention that .github-cla-signers is alpha-sorted (#380) + Add bipinbachhao as contributor (#379) [Bipin Bachhao] + cc_snap: validate that assertions property values are strings (#370) + conftest: implement partial disable_subp_usage (#371) + test_resolv_conf: refresh stale comment (#374) + cc_snap: apply validation to snap.commands properties (#364) + make finding libc platform independent (#366) [Mina Galić (deprecated: Igor Galić)] + doc/rtd/topics/faq: Updates LXD docs links to current site (#368) [TomP] + templater: drop Jinja Python 2 compatibility shim (#353) + cloudinit: minor pylint fixes (#360) + cloudinit: remove unneeded __future__ imports (#362) + migrating momousta lp user to Moustafa-Moustafa GitHub user (#361) [Moustafa Moustafa] + cloud_tests: emit dots on Travis while fetching images (#347) + Add schema to apt configure config (#357) [lucasmoura] (LP: #1858884) + conftest: add docs and tests regarding CiTestCase's subp functionality (#343) + analyze/dump: refactor shared string into variable (#350) + doc: update boot.rst with correct timing of runcmd (#351) + HACKING.rst: change contact info to Rick Harding (#359) [lucasmoura] + HACKING.rst: guide people to add themselves to the CLA file (#349) + HACKING.rst: more unit testing documentation (#354) + .travis.yml: don't run lintian during integration test package builds (#352) + Add test to ensure docs examples are valid cloud-init configs (#355) [James Falcon] (LP: #1876414) + make suse and sles support 127.0.1.1 (#336) [chengcheng-chcheng] + Create tests to validate schema examples (#348) [lucasmoura] (LP: #1876412) + analyze/dump: add support for Amazon Linux 2 log lines (#346) (LP: #1876323) + bsd: upgrade support (#305) [Gonéri Le Bouder] + Add lucasmoura as contributor (#345) [lucasmoura] + Add 'therealfalcon' as contributor (#344) [James Falcon] + Adapt the package building scripts to use Python 3 (#231) [Paride Legovini] + DataSourceEc2: use metadata's NIC ordering to determine route-metrics (#342) (LP: #1876312) + .travis.yml: introduce caching (#329) + cc_locale: introduce schema (#335) + doc/rtd/conf.py: bump copyright year to 2020 (#341) + yum_add_repo: Add Centos to the supported distro list (#340)


Advisory IDSUSE-RU-2022:207-1
ReleasedThu Jan 27 09:24:49 2022
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References
Description:

This update for glibc fixes the following issues:


Advisory IDSUSE-RU-2022:209-1
ReleasedThu Jan 27 14:03:58 2022
SummaryRecommended update for opencl-headers
Typerecommended
Severitymoderate
References1193617
Description:

This update for opencl-headers fixes the following issues:
Update opencl-headers from 2.2+git.20170617 to version 2.2+git.20211214 (bsc#1193617)


Advisory IDSUSE-RU-2022:220-1
ReleasedFri Jan 28 08:13:30 2022
SummaryRecommended update for saptune
Typerecommended
Severityimportant
References1192029,1192697,1193241,1193435,1193576,1193580,1194299,1194334
Description:

This update for saptune fixes the following issues:


Advisory IDSUSE-RU-2022:222-1
ReleasedFri Jan 28 09:57:54 2022
SummaryRecommended update for xrdp
Typerecommended
Severitymoderate
References1187258
Description:

This update for xrdp fixes the following issues:


Advisory IDSUSE-SU-2022:226-1
ReleasedFri Jan 28 17:21:40 2022
SummarySecurity update for log4j12
Typesecurity
Severityimportant
References1193184,1194842,1194843,1194844,CVE-2022-23302,CVE-2022-23305,CVE-2022-23307
Description:

This update for log4j12 fixes the following issues:


Advisory IDSUSE-RU-2022:227-1
ReleasedMon Jan 31 06:05:25 2022
SummaryRecommended update for git
Typerecommended
Severitymoderate
References1193722
Description:

This update for git fixes the following issues:




Advisory IDSUSE-RU-2022:228-1
ReleasedMon Jan 31 06:07:52 2022
SummaryRecommended update for boost
Typerecommended
Severitymoderate
References1194522
Description:

This update for boost fixes the following issues:


Advisory IDSUSE-RU-2022:273-1
ReleasedTue Feb 1 14:15:21 2022
SummaryRecommended update for google-guest-agent, google-guest-configs, google-guest-oslogin, google-osconfig-agent
Typerecommended
Severityimportant
References1102408,1192652,1192653,1193257,1193258
Description:

This update for google-guest-agent, google-guest-configs, google-guest-oslogin, google-osconfig-agent contains the following fixes:
Changes in google-guest-agent:






Changes in google-guest-configs:





Changes in google-guest-oslogin:
Changes in google-osconfig-agent:




Advisory IDSUSE-RU-2022:302-1
ReleasedWed Feb 2 11:07:47 2022
SummaryRecommended update for rpmlint, rpmlint-mini, obs-service-format_spec_file
Typerecommended
Severitymoderate
References1195085
Description:

This update for rpmlint, rpmlint-mini, obs-service-format_spec_file fixes the following issues:
obs-service-format_spec_file:


rpmlint:

rpmlint-mini:


Advisory IDSUSE-RU-2022:303-1
ReleasedWed Feb 2 11:11:34 2022
SummaryRecommended update for hplip
Typerecommended
Severitymoderate
References1193656,1193718
Description:

This update for hplip fixes the following issues:


Advisory IDSUSE-RU-2022:312-1
ReleasedWed Feb 2 13:49:08 2022
SummaryRecommended update for rrdtool
Typerecommended
Severitymoderate
References1189375
Description:

This update for rrdtool fixes the following issues:


Advisory IDSUSE-RU-2022:313-1
ReleasedWed Feb 2 13:52:26 2022
SummaryRecommended update for infinipath-psm
Typerecommended
Severitymoderate
References1047218,1133133,1160270
Description:

This update for infinipath-psm fixes the following issues:


Advisory IDSUSE-RU-2022:316-1
ReleasedThu Feb 3 10:06:50 2022
SummaryRecommended update for vino
Typerecommended
Severitymoderate
References1177663
Description:

This update for vino fixes the following issues:


Advisory IDSUSE-RU-2022:317-1
ReleasedThu Feb 3 10:06:59 2022
SummaryRecommended update for wicked
Typerecommended
Severitymoderate
References1057592,1156920,1160654,1178357,1181163,1181812,1182227,1183407,1183495,1188019,1189560,1192164,1192311,1192353,1194392
Description:

This update for wicked fixes the following issues:


Advisory IDSUSE-RU-2022:319-1
ReleasedThu Feb 3 10:22:30 2022
SummaryRecommended update for cargo-packaging, rustup, sccache
Typerecommended
Severitymoderate
References
Description:

This update for cargo-packaging, rustup, sccache fixes the following issues:
rustup, cargo-packaging and sccache were added to the Development Tools Module.


Advisory IDSUSE-RU-2022:322-1
ReleasedThu Feb 3 14:03:19 2022
SummaryRecommended update for dracut
Typerecommended
Severitymoderate
References1192685,1194716
Description:

This update for dracut fixes the following issues:


Advisory IDSUSE-RU-2022:324-1
ReleasedFri Feb 4 07:55:18 2022
SummaryRecommended update for supportutils-plugin-cloud-init
Typerecommended
Severitymoderate
References
Description:

This update for supportutils-plugin-cloud-init fixes the following issues:


Advisory IDSUSE-SU-2022:330-1
ReleasedFri Feb 4 09:29:08 2022
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1194640,1194768,1194770,1194785,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219
Description:


This update for glibc fixes the following issues:


Features added:


Advisory IDSUSE-SU-2022:333-1
ReleasedFri Feb 4 09:30:26 2022
SummarySecurity update for xen
Typesecurity
Severityimportant
References1194576,1194581,1194588,CVE-2022-23033,CVE-2022-23034,CVE-2022-23035
Description:

This update for xen fixes the following issues:


Advisory IDSUSE-SU-2022:334-1
ReleasedFri Feb 4 09:30:58 2022
SummarySecurity update for containerd, docker
Typesecurity
Severitymoderate
References1191015,1191121,1191334,1191434,1193273,CVE-2021-41089,CVE-2021-41091,CVE-2021-41092,CVE-2021-41103,CVE-2021-41190
Description:

This update for containerd, docker fixes the following issues:


Advisory IDSUSE-RU-2022:335-1
ReleasedFri Feb 4 10:24:02 2022
SummaryRecommended update for coreutils
Typerecommended
Severitymoderate
References1189152
Description:

This update for coreutils fixes the following issues:


Advisory IDSUSE-RU-2022:336-1
ReleasedFri Feb 4 10:24:16 2022
SummaryRecommended update for yast2-add-on
Typerecommended
Severitymoderate
References1194851,972046
Description:

This update for yast2-add-on fixes the following issues:


Advisory IDSUSE-RU-2022:339-1
ReleasedMon Feb 7 10:22:03 2022
SummaryRecommended update for google-droid-fonts
Typerecommended
Severitymoderate
References1190886
Description:

This update for google-droid-fonts fixes the following issue:


Advisory IDSUSE-RU-2022:340-1
ReleasedMon Feb 7 13:08:14 2022
SummarySecurity update for the Linux Kernel
Typerecommended
Severitymoderate
References1195142
Description:



The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various a regression bugfix.
The following non-security bugs were fixed:


Advisory IDSUSE-RU-2022:343-1
ReleasedMon Feb 7 15:16:58 2022
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1193086
Description:

This update for systemd fixes the following issues:


Advisory IDSUSE-RU-2022:348-1
ReleasedTue Feb 8 13:02:20 2022
SummaryRecommended update for libzypp
Typerecommended
Severityimportant
References1193007,1193488,1194597,1194898,954813
Description:

This update for libzypp fixes the following issues:


Advisory IDSUSE-SU-2022:283-1
ReleasedTue Feb 8 16:10:39 2022
SummarySecurity update for samba
Typesecurity
Severitycritical
References1139519,1183572,1183574,1188571,1191227,1191532,1192684,1193690,1194859,1195048,CVE-2020-27840,CVE-2021-20277,CVE-2021-20316,CVE-2021-36222,CVE-2021-43566,CVE-2021-44141,CVE-2021-44142,CVE-2022-0336
Description:




samba was updated to 4.15.4 (jsc#SLE-23329);

Samba was updated to version 4.15.3

krb5 was updated to 1.16.3 to 1.19.2

Changes from 1.19.1:

Changes from 1.19
Administrator experience * When a client keytab is present, the GSSAPI krb5 mech will refresh credentials even if the current credentials were acquired manually. * It is now harder to accidentally delete the K/M entry from a KDB. Developer experience * gss_acquire_cred_from() now supports the 'password' and 'verify' options, allowing credentials to be acquired via password and verified using a keytab key. * When an application accepts a GSS security context, the new GSS_C_CHANNEL_BOUND_FLAG will be set if the initiator and acceptor both provided matching channel bindings. * Added the GSS_KRB5_NT_X509_CERT name type, allowing S4U2Self requests to identify the desired client principal by certificate. * PKINIT certauth modules can now cause the hw-authent flag to be set in issued tickets. * The krb5_init_creds_step() API will now issue the same password expiration warnings as krb5_get_init_creds_password(). Protocol evolution * Added client and KDC support for Microsoft's Resource-Based Constrained Delegation, which allows cross-realm S4U2Proxy requests. A third-party database module is required for KDC support. * kadmin/admin is now the preferred server principal name for kadmin connections, and the host-based form is no longer created by default. The client will still try the host-based form as a fallback. * Added client and server support for Microsoft's KERB_AP_OPTIONS_CBT extension, which causes channel bindings to be required for the initiator if the acceptor provided them. The client will send this option if the client_aware_gss_bindings profile option is set. User experience * kinit will now issue a warning if the des3-cbc-sha1 encryption type is used in the reply. This encryption type will be deprecated and removed in future releases. * Added kvno flags --out-cache, --no-store, and --cached-only (inspired by Heimdal's kgetcred).
Changes from 1.18.3
Changes from 1.18.2
Changes from 1.18.1
Changes from 1.18 Administrator experience: * Remove support for single-DES encryption types. * Change the replay cache format to be more efficient and robust. Replay cache filenames using the new format end with '.rcache2' by default. * setuid programs will automatically ignore environment variables that normally affect krb5 API functions, even if the caller does not use krb5_init_secure_context(). * Add an 'enforce_ok_as_delegate' krb5.conf relation to disable credential forwarding during GSSAPI authentication unless the KDC sets the ok-as-delegate bit in the service ticket. * Use the permitted_enctypes krb5.conf setting as the default value for default_tkt_enctypes and default_tgs_enctypes. Developer experience: * Implement krb5_cc_remove_cred() for all credential cache types. * Add the krb5_pac_get_client_info() API to get the client account name from a PAC. Protocol evolution: * Add KDC support for S4U2Self requests where the user is identified by X.509 certificate. (Requires support for certificate lookup from a third-party KDB module.) * Remove support for an old ('draft 9') variant of PKINIT. * Add support for Microsoft NegoEx. (Requires one or more third-party GSS modules implementing NegoEx mechanisms.) User experience: * Add support for 'dns_canonicalize_hostname=fallback', causing host-based principal names to be tried first without DNS canonicalization, and again with DNS canonicalization if the un-canonicalized server is not found. * Expand single-component hostnames in host-based principal names when DNS canonicalization is not used, adding the system's first DNS search path as a suffix. Add a 'qualify_shortname' krb5.conf relation to override this suffix or disable expansion. * Honor the transited-policy-checked ticket flag on application servers, eliminating the requirement to configure capaths on servers in some scenarios. Code quality: * The libkrb5 serialization code (used to export and import krb5 GSS security contexts) has been simplified and made type-safe. * The libkrb5 code for creating KRB-PRIV, KRB-SAFE, and KRB-CRED messages has been revised to conform to current coding practices. * The test suite has been modified to work with macOS System Integrity Protection enabled. * The test suite incorporates soft-pkcs11 so that PKINIT PKCS11 support can always be tested.
Changes from 1.17.1
Changes from 1.17: Administrator experience: Developer experience:
  • The new krb5_get_etype_info() API can be used to retrieve enctype, salt, and string-to-key parameters from the KDC for a client principal.
  • The new GSS_KRB5_NT_ENTERPRISE_NAME name type allows enterprise principal names to be used with GSS-API functions.
  • KDC and kadmind modules which call com_err() will now write to the log file in a format more consistent with other log messages.
  • Programs which use large numbers of memory credential caches should perform better.
  • Protocol evolution:
  • The SPAKE pre-authentication mechanism is now supported. This mechanism protects against password dictionary attacks without requiring any additional infrastructure such as certificates. SPAKE is enabled by default on clients, but must be manually enabled on the KDC for this release.
  • PKINIT freshness tokens are now supported. Freshness tokens can protect against scenarios where an attacker uses temporary access to a smart card to generate authentication requests for the future.
  • Password change operations now prefer TCP over UDP, to avoid spurious error messages about replays when a response packet is dropped.
  • The KDC now supports cross-realm S4U2Self requests when used with a third-party KDB module such as Samba's. The client code for cross-realm S4U2Self requests is also now more robust.
  • User experience:
  • The new ktutil addent -f flag can be used to fetch salt information from the KDC for password-based keys.
  • The new kdestroy -p option can be used to destroy a credential cache within a collection by client principal name.
  • The Kerberos man page has been restored, and documents the environment variables that affect programs using the Kerberos library.
  • Code quality:
  • Python test scripts now use Python 3.
  • Python test scripts now display markers in verbose output, making it easier to find where a failure occurred within the scripts.
  • The Windows build system has been simplified and updated to work with more recent versions of Visual Studio. A large volume of unused Windows-specific code has been removed. Visual Studio 2013 or later is now required.

  • ldb was updated to version 2.4.1 (jsc#SLE-23329);

    + Corrected python behaviour for 'in' for LDAP attributes contained as part of ldb.Message; (bso#14845); + Fix memory handling in ldb.msg_diff; (bso#14836);

    + pyldb: Fix Message.items() for a message containing elements + pyldb: Add test for Message.items() + tests: Use ldbsearch '--scope instead of '-s' + Change page size of guidindexpackv1.ldb + Use a 1MiB lmdb so the test also passes on aarch64 CentOS stream + attrib_handler casefold: simplify space dropping + fix ldb_comparison_fold off-by-one overrun + CVE-2020-27840: pytests: move Dn.validate test to ldb + CVE-2020-27840 ldb_dn: avoid head corruption in ldb_dn_explode + CVE-2021-20277 ldb/attrib_handlers casefold: stay in bounds + CVE-2021-20277 ldb tests: ldb_match tests with extra spaces + improve comments for ldb_module_connect_backend() + test/ldb_tdb: correct introductory comments + ldb.h: remove undefined async_ctx function signatures + correct comments in attrib_handers val_to_int64 + dn tests use cmocka print functions + ldb_match: remove redundant check + add tests for ldb_wildcard_compare + ldb_match: trailing chunk must match end of string + pyldb: catch potential overflow error in py_timestring + ldb: remove some 'if PY3's in tests
    talloc was updated to 2.3.3:

    tdb was updated to version 1.4.4:

    tevent was updated to version 0.11.0:

    sssd was updated to:

    apparmor was updated to:


    Advisory IDSUSE-RU-2022:350-1
    ReleasedTue Feb 8 16:15:10 2022
    SummaryRecommended update for release-notes-sles-for-sap
    Typerecommended
    Severitymoderate
    References933411
    Description:

    This update for release-notes-sles-for-sap fixes the following issues:


    Advisory IDSUSE-RU-2022:352-1
    ReleasedTue Feb 8 17:06:16 2022
    SummaryRecommended update for release-notes-ha
    Typerecommended
    Severitymoderate
    References1187664,1188305,933411
    Description:

    This update for release-notes-ha fixes the following issues:


    Advisory IDSUSE-RU-2022:353-1
    ReleasedTue Feb 8 17:41:48 2022
    SummaryRecommended update for systemd-rpm-macros
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for systemd-rpm-macros fixes the following issues:



    Advisory IDSUSE-SU-2022:363-1
    ReleasedThu Feb 10 17:01:32 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severitycritical
    References1154353,1154488,1160634,1176447,1177599,1183405,1185377,1187428,1187723,1188605,1191881,1193096,1193506,1193767,1193802,1193861,1193864,1193867,1194048,1194227,1194291,1194880,1195009,1195062,1195065,1195073,1195183,1195184,1195254,1195267,1195293,1195371,CVE-2020-28097,CVE-2021-22600,CVE-2021-39648,CVE-2021-39657,CVE-2021-39685,CVE-2021-4159,CVE-2021-44733,CVE-2021-45095,CVE-2022-0286,CVE-2022-0330,CVE-2022-0435,CVE-2022-22942
    Description:


    The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:



    The following security references were added to already fixed issues:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:370-1
    ReleasedFri Feb 11 08:35:29 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severitycritical
    References1154353,1154488,1156395,1160634,1176447,1177599,1183405,1185377,1187428,1187723,1188605,1191881,1193096,1193506,1193767,1193802,1193861,1193864,1193867,1194048,1194227,1194291,1194880,1195009,1195062,1195065,1195073,1195183,1195184,1195254,1195267,1195293,1195371,1195476,1195477,1195478,1195479,1195480,1195481,1195482,CVE-2020-28097,CVE-2021-22600,CVE-2021-39648,CVE-2021-39657,CVE-2021-39685,CVE-2021-44733,CVE-2021-45095,CVE-2022-0286,CVE-2022-0330,CVE-2022-0435,CVE-2022-22942
    Description:


    The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:



    The following non-security bugs were fixed:


    Advisory IDSUSE-RU-2022:373-1
    ReleasedMon Feb 14 09:58:35 2022
    SummaryRecommended update for rpmlint
    Typerecommended
    Severitymoderate
    References1195491,1195548,1195662
    Description:

    This update for rpmlint fixes the following issues:


    Advisory IDSUSE-SU-2022:375-1
    ReleasedMon Feb 14 11:12:42 2022
    SummarySecurity update for wireshark
    Typesecurity
    Severitymoderate
    References1194166,1194167,1194168,1194169,1194170,1194171,1194780,CVE-2021-4181,CVE-2021-4182,CVE-2021-4183,CVE-2021-4184,CVE-2021-4185,CVE-2021-4190
    Description:

    This update for wireshark fixes the following issues:
    Update to version 3.6.1:


    Advisory IDSUSE-RU-2022:378-1
    ReleasedTue Feb 15 13:20:44 2022
    SummaryRecommended update for pacemaker
    Typerecommended
    Severitymoderate
    References1191676
    Description:

    This update for pacemaker fixes the following issues:


    Advisory IDSUSE-RU-2022:383-1
    ReleasedTue Feb 15 17:47:36 2022
    SummaryRecommended update for cyrus-sasl
    Typerecommended
    Severitymoderate
    References1194265
    Description:

    This update for cyrus-sasl fixes the following issues:


    Advisory IDSUSE-RU-2022:386-1
    ReleasedWed Feb 16 09:32:34 2022
    SummaryRecommended update for autoyast2
    Typerecommended
    Severitymoderate
    References1192437,1194440,1194881
    Description:

    This update for autoyast2 fixes the following issues:


    Advisory IDSUSE-RU-2022:439-1
    ReleasedWed Feb 16 12:41:11 2022
    SummaryRecommended update for release-notes-sles
    Typerecommended
    Severityimportant
    References1192121,1193843,1195107,933411
    Description:

    This update for release-notes-sles fixes the following issues:


    Advisory IDSUSE-RU-2022:476-1
    ReleasedThu Feb 17 10:31:35 2022
    SummaryRecommended update for nfs-utils
    Typerecommended
    Severitymoderate
    References1194661
    Description:

    This update for nfs-utils fixes the following issues:


    Advisory IDSUSE-SU-2022:479-1
    ReleasedThu Feb 17 14:48:24 2022
    SummarySecurity update for virglrenderer
    Typesecurity
    Severityimportant
    References1195389,CVE-2022-0135
    Description:

    This update for virglrenderer fixes the following issues:


    Advisory IDSUSE-SU-2022:480-1
    ReleasedThu Feb 17 15:10:52 2022
    SummarySecurity update for tiff
    Typesecurity
    Severityimportant
    References1071031,1154365,1182808,1182809,1182811,1182812,1190312,1194539,CVE-2017-17095,CVE-2019-17546,CVE-2020-19131,CVE-2020-35521,CVE-2020-35522,CVE-2020-35523,CVE-2020-35524,CVE-2022-22844
    Description:

    This update for tiff fixes the following issues:


    Advisory IDSUSE-feature-2022:482-1
    ReleasedThu Feb 17 15:57:49 2022
    SummaryFeature update for libreoffice
    Typefeature
    Severitymoderate
    References1180479,1183308,1183655,1187982,1189813
    Description:

    This update for libreoffice fixes the following issues:
    Update LibreOffice from version 7.1.4.2 to 7.2.3.2 (jsc#SLE-18214)


    Advisory IDSUSE-RU-2022:485-1
    ReleasedFri Feb 18 04:30:56 2022
    SummaryRecommended update for tomcat
    Typerecommended
    Severitymoderate
    References1193569
    Description:

    This update for tomcat fixes the following issues:


    Advisory IDSUSE-RU-2022:487-1
    ReleasedFri Feb 18 07:25:30 2022
    SummaryRecommended update for transactional-update
    Typerecommended
    Severitymoderate
    References1133891,1149131,1177149,1183521,1183539,1183856,1184529,1185224,1185226,1185625,1185766,1186213,1186775,1186842,1188110,1188322,1188648,1189728,1189807,1190383,1190574,1190788,1191475,1191945,1192078,1192242,1192302
    Description:

    This update for transactional-update fixes the following issues:














    Advisory IDSUSE-SU-2022:492-1
    ReleasedFri Feb 18 10:32:49 2022
    SummarySecurity update for strongswan
    Typesecurity
    Severityimportant
    References1194471,CVE-2021-45079
    Description:

    This update for strongswan fixes the following issues:


    Advisory IDSUSE-SU-2022:493-1
    ReleasedFri Feb 18 10:36:59 2022
    SummarySecurity update for clamav
    Typesecurity
    Severityimportant
    References1194731,CVE-2022-20698
    Description:

    This update for clamav fixes the following issues:


    Advisory IDSUSE-SU-2022:498-1
    ReleasedFri Feb 18 10:46:56 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1195054,1195217,CVE-2022-23852,CVE-2022-23990
    Description:

    This update for expat fixes the following issues:


    Advisory IDSUSE-SU-2022:499-1
    ReleasedFri Feb 18 10:50:15 2022
    SummarySecurity update for python-Twisted
    Typesecurity
    Severityimportant
    References1195667,CVE-2022-21712
    Description:

    This update for python-Twisted fixes the following issues:


    Advisory IDSUSE-SU-2022:503-1
    ReleasedFri Feb 18 10:55:49 2022
    SummarySecurity update for xerces-j2
    Typesecurity
    Severityimportant
    References1195108,CVE-2022-23437
    Description:

    This update for xerces-j2 fixes the following issues:


    Advisory IDSUSE-RU-2022:513-1
    ReleasedFri Feb 18 12:43:10 2022
    SummaryRecommended update for grub2
    Typerecommended
    Severitymoderate
    References1159205,1190395
    Description:

    This update for grub2 fixes the following issues:


    Advisory IDSUSE-RU-2022:519-1
    ReleasedFri Feb 18 12:44:57 2022
    SummaryRecommended update for sysstat
    Typerecommended
    Severitymoderate
    References1194679
    Description:

    This update for sysstat fixes the following issues:


    Advisory IDSUSE-RU-2022:520-1
    ReleasedFri Feb 18 12:45:19 2022
    SummaryRecommended update for rpm
    Typerecommended
    Severitymoderate
    References1194968
    Description:

    This update for rpm fixes the following issues:


    Advisory IDSUSE-RU-2022:522-1
    ReleasedFri Feb 18 12:47:18 2022
    SummaryRecommended update for fetchmail
    Typerecommended
    Severitymoderate
    References1193894
    Description:

    This update for fetchmail fixes the following issues:


    Advisory IDSUSE-RU-2022:523-1
    ReleasedFri Feb 18 12:49:09 2022
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1193759,1193841
    Description:

    This update for systemd fixes the following issues:


    Advisory IDSUSE-SU-2022:525-1
    ReleasedFri Feb 18 15:12:10 2022
    SummarySecurity update for polkit
    Typesecurity
    Severitymoderate
    References1195542,CVE-2021-4115
    Description:

    This update for polkit fixes the following issues:


    Advisory IDSUSE-SU-2022:526-1
    ReleasedFri Feb 18 16:56:16 2022
    SummarySecurity update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container
    Typesecurity
    Severitymoderate
    ReferencesCVE-2021-43565
    Description:

    This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container fixes the following issues:






    Advisory IDSUSE-RU-2022:528-1
    ReleasedFri Feb 18 16:56:37 2022
    SummaryRecommended update for resource-agents
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for resource-agents fixes the following issues:


    Advisory IDSUSE-RU-2022:533-1
    ReleasedMon Feb 21 09:28:48 2022
    SummaryRecommended update for python-kiwi
    Typerecommended
    Severitymoderate
    References1180539,1184128,1184823,1185287,1185937,1187460,1187461,1187515,1192975,1195229
    Description:

    This update for python-kiwi fixes the following issues:
    This version upgrade includes several fixes:


    * Fixed regression in compression detection. (bsc#1192975) * index.rst: Change title (bsc#1189294#c2) * suggested in bsc#1189294#c2 for more clarity * change has been discussed with and approved by main author (Marcus S.) * Care for different snapper template locations. (bsc#1192940) * Do not force dracut into a compression setting * Fixed secure boot fallback setup Make sure MokManager gets copied. The name and location of the mok manager is distribution specific in the same way as the shim loader. Thus we need to apply a similar concept for looking it up. (bsc#1187515) * Allow creation of LUKS system with empty key To support cloud platforms better we should allow the creation of an initial(insecure) LUKS encrypted image with an empty passphrase/keyfile. (bsc#1187461, bsc#1187460) * Delete obsolete 'ddb.adapterType' patching When building a vmdk image with pvscsi as adapter type, kiwi implicitly changed the adapter_type from pvscsi to lsilogic because qemu only knows lsilogic. At the end kiwi patched the adapter type in the descriptor of the vmdk header back to pvscsi. That patching seems to be wrong according to information from users and VMware support. This commit deletes the descriptor patching and only leaves the pvscsi setting in the guest configuration(vmx). bsc#1180539) * Make dracut version check more robust The check_dracut_module_versions_compatible_to_kiwi() runtime check calls the package manager from the host and reads the package database from the image root. Doing this requires the package database in the image to be compatible with the package manager on the host. However this cannot be guarenteed and it is more robust to chroot into the image root and call the package manager from there. However, this change also comes with the cost that it's required to have a package manager available in the image root tree. Therefore along with the chroot based call, eventual exceptions from the call are now catched and leads to a debug message in the log file but will not lead the runtime check to fail. I consider the cases without a package database inside of the image to be less critical than the incompatibility issue between the host tooling and the package database in the image. (bsc#1185937) * Fixed setup of repository architecture Unfortunately the architecture reported by uname is not necessarily the same name as used in the repository metadata. Therefore it was not a good idea to set the architecture and manage the name via a mapping table. It also has turned out that repo arch names are distro specific which causes more complexity on an eventual mapping table. In the end this commit changes the way how the repository architecture is setup in a way that we only set the architecture if a name was explicitly specified such that the user keeps full control over it without any mapping magic included (bsc#1185287) * Do not apply default subcommand for derivate containers This commit does not apply the default subcommand for derivate containers. (bsc#1184823) * Added openssl to the core requires openssl is used in kiwi to construct a password hash if the plaintext password feature for user settings is used. (bsc#1184128)


    Advisory IDSUSE-RU-2022:537-1
    ReleasedMon Feb 21 13:21:56 2022
    SummaryRecommended update for yast2-dhcp-server
    Typerecommended
    Severitylow
    References
    Description:

    This update for yast2-dhcp-server fixes the following issues:


    Advisory IDSUSE-SU-2022:539-1
    ReleasedMon Feb 21 13:47:51 2022
    SummarySecurity update for systemd
    Typesecurity
    Severitymoderate
    References1191826,1192637,1194178,CVE-2021-3997
    Description:

    This update for systemd fixes the following issues:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:540-1
    ReleasedMon Feb 21 13:48:32 2022
    SummarySecurity update for ImageMagick
    Typesecurity
    Severitymoderate
    References1195563,CVE-2022-0284
    Description:

    This update for ImageMagick fixes the following issues:


    Advisory IDSUSE-RU-2022:545-1
    ReleasedMon Feb 21 20:30:54 2022
    SummaryRecommended update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer, libnbd, nbdkit
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer, libnbd, nbdkit fixes the following issues:








    Advisory IDSUSE-RU-2022:546-1
    ReleasedMon Feb 21 20:36:36 2022
    SummaryRecommended update for monitoring-plugins
    Typerecommended
    Severityimportant
    References1047218,1114483,1191011
    Description:

    This update for monitoring-plugins fixes the following issues:
    the patch just reverts the problem, if you get more than 64K on stdout










    Advisory IDSUSE-RU-2022:548-1
    ReleasedTue Feb 22 13:48:55 2022
    SummaryRecommended update for blog
    Typerecommended
    Severitymoderate
    References1186506,1191057
    Description:

    This update for blog fixes the following issues:






    Advisory IDSUSE-SU-2022:559-1
    ReleasedWed Feb 23 15:04:54 2022
    SummarySecurity update for MozillaThunderbird
    Typesecurity
    Severityimportant
    References1195682,1196072,CVE-2022-0566,CVE-2022-22753,CVE-2022-22754,CVE-2022-22756,CVE-2022-22759,CVE-2022-22760,CVE-2022-22761,CVE-2022-22763,CVE-2022-22764
    Description:

    This update for MozillaThunderbird fixes the following issues:



    Advisory IDSUSE-SU-2022:562-1
    ReleasedThu Feb 24 08:37:16 2022
    SummarySecurity update for jasper
    Typesecurity
    Severitymoderate
    References1188437,CVE-2021-27845
    Description:

    This update for jasper fixes the following issues:


    Advisory IDSUSE-RU-2022:572-1
    ReleasedThu Feb 24 11:58:05 2022
    SummaryRecommended update for psmisc
    Typerecommended
    Severitymoderate
    References1194172
    Description:

    This update for psmisc fixes the following issues:


    Advisory IDSUSE-SU-2022:574-1
    ReleasedFri Feb 25 16:59:28 2022
    SummarySecurity update for ucode-intel
    Typesecurity
    Severityimportant
    References1192615,1195779,1195780,1195781,CVE-2021-0127,CVE-2021-0145,CVE-2021-0146,CVE-2021-33120
    Description:

    This update for ucode-intel fixes the following issues:
    Updated to Intel CPU Microcode 20220207 release.



    Advisory IDSUSE-RU-2022:584-1
    ReleasedMon Feb 28 16:41:33 2022
    SummaryRecommended update for salt
    Typerecommended
    Severitymoderate
    References1097531,1190781,1193357
    Description:

    This update for salt fixes the following issues:


    Advisory IDSUSE-RU-2022:598-1
    ReleasedMon Feb 28 16:58:48 2022
    SummaryRecommended update for SUSE Manager 4.2.5 Release Notes
    Typerecommended
    Severitymoderate
    References1097531,1173103,1189561,1190781,1191192,1191285,1191857,1192321,1192368,1192440,1192487,1192510,1192514,1192550,1192566,1192699,1192776,1193008,1193292,1193565,1193585,1193600,1193612,1193694,1193832,1194044,1194397,1194862,1194905,1194990,1195171
    Description:

    This update for SUSE Manager 4.2.5 Release Notes provides the following additions:
    Release notes for SUSE Manager:


    Release notes for SUSE Manager proxy:


    Advisory IDSUSE-RU-2022:604-1
    ReleasedTue Mar 1 07:13:50 2022
    SummaryRecommended update for rsyslog
    Typerecommended
    Severitylow
    References1194669
    Description:

    This update for rsyslog fixes the following issues:


    Advisory IDSUSE-RU-2022:651-1
    ReleasedTue Mar 1 12:23:21 2022
    SummaryRecommended update for crmsh
    Typerecommended
    Severityimportant
    References1194026,1194615,1194870
    Description:

    This update for crmsh fixes the following issues:


    Advisory IDSUSE-SU-2022:657-1
    ReleasedWed Mar 2 10:11:51 2022
    SummarySecurity update for nodejs12
    Typesecurity
    Severityimportant
    References1191962,1191963,1192153,1192154,1192696,CVE-2021-23343,CVE-2021-32803,CVE-2021-32804,CVE-2021-3807,CVE-2021-3918
    Description:

    This update for nodejs12 fixes the following issues:


    Advisory IDSUSE-RU-2022:674-1
    ReleasedWed Mar 2 13:24:38 2022
    SummaryRecommended update for yast2-network
    Typerecommended
    Severitymoderate
    References1187512
    Description:

    This update for yast2-network fixes the following issues:


    Advisory IDSUSE-SU-2022:675-1
    ReleasedWed Mar 2 18:50:37 2022
    SummarySecurity update for ldns
    Typesecurity
    Severitymoderate
    References1195057,1195058,CVE-2020-19860,CVE-2020-19861
    Description:

    This update for ldns fixes the following issues:


    Advisory IDSUSE-RU-2022:681-1
    ReleasedThu Mar 3 11:36:29 2022
    SummaryRecommended update for cloud-regionsrv-client
    Typerecommended
    Severitycritical
    References1195414,1195564,1196305
    Description:

    This update for cloud-regionsrv-client fixes the following issues:


    Advisory IDSUSE-RU-2022:682-1
    ReleasedThu Mar 3 11:37:03 2022
    SummaryRecommended update for supportutils-plugin-suse-public-cloud
    Typerecommended
    Severityimportant
    References1195095,1195096
    Description:

    This update for supportutils-plugin-suse-public-cloud fixes the following issues:


    Advisory IDSUSE-RU-2022:685-1
    ReleasedThu Mar 3 11:37:36 2022
    SummaryRecommended update for clingo, python-Sphinx_4_2_0, python-sphinxcontrib-applehelp, python-sphinxcontrib-devhelp, python-sphinxcontrib-htmlhelp, python-sphinxcontrib-jsmath, python-sphinxcontrib-qthelp, python-sphinxcontrib-serializinghtml, spack
    Typerecommended
    Severityimportant
    References1166965,1193712
    Description:

    This update for clingo, python-Sphinx_4_2_0, python-sphinxcontrib-applehelp, python-sphinxcontrib-devhelp, python-sphinxcontrib-htmlhelp, python-sphinxcontrib-jsmath, python-sphinxcontrib-qthelp, python-sphinxcontrib-serializinghtml, spack fixes the following issues:





    Advisory IDSUSE-RU-2022:687-1
    ReleasedThu Mar 3 11:39:23 2022
    SummaryRecommended update for libvirt
    Typerecommended
    Severitymoderate
    References1191668,1192119
    Description:

    This update for libvirt fixes the following issues:


    Advisory IDSUSE-RU-2022:689-1
    ReleasedThu Mar 3 11:41:05 2022
    SummaryRecommended update for python-openstackclient, python-openstackdocstheme, python-oslo.context, python-oslosphinx, python-reno
    Typerecommended
    Severityimportant
    References1191205
    Description:

    This update for python-openstackclient fixes the following issues:









    This update for python-openstackdocstheme the following issues:
    This update for python-oslo.context the following issues:
    This update for python-oslosphinx the following issues:
    This update for python-reno the following issues:


    Advisory IDSUSE-RU-2022:692-1
    ReleasedThu Mar 3 15:46:47 2022
    SummaryRecommended update for filesystem
    Typerecommended
    Severitymoderate
    References1190447
    Description:

    This update for filesystem fixes the following issues:


    Advisory IDSUSE-SU-2022:696-1
    ReleasedThu Mar 3 16:18:29 2022
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1195230,1195682,CVE-2022-22753,CVE-2022-22754,CVE-2022-22756,CVE-2022-22759,CVE-2022-22760,CVE-2022-22761,CVE-2022-22763,CVE-2022-22764
    Description:

    This update for MozillaFirefox fixes the following issues:
    Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)



    Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)


    Advisory IDSUSE-RU-2022:697-1
    ReleasedThu Mar 3 16:29:47 2022
    SummaryRecommended update for yast2
    Typerecommended
    Severityimportant
    References1195910
    Description:

    This update for yast2 fixes the following issues:


    Advisory IDSUSE-SU-2022:699-1
    ReleasedThu Mar 3 16:38:50 2022
    SummarySecurity update for php7
    Typesecurity
    Severitymoderate
    References1038980,CVE-2017-8923
    Description:

    This update for php7 fixes the following issues:


    Advisory IDSUSE-SU-2022:705-1
    ReleasedFri Mar 4 07:44:58 2022
    SummarySecurity update for webkit2gtk3
    Typesecurity
    Severityimportant
    References1195064,1195735,1196133,CVE-2021-30934,CVE-2021-30936,CVE-2021-30951,CVE-2021-30952,CVE-2021-30953,CVE-2021-30954,CVE-2021-30984,CVE-2021-45481,CVE-2021-45482,CVE-2021-45483,CVE-2022-22589,CVE-2022-22590,CVE-2022-22592,CVE-2022-22620
    Description:

    This update for webkit2gtk3 fixes the following issues:
    Update to version 2.34.6 (bsc#1196133):


    Update to version 2.34.5 (bsc#1195735):

    Update to version 2.34.4 (bsc#1195064):

    The following CVEs were addressed in a previous update:


    Advisory ID23018
    ReleasedFri Mar 4 08:31:54 2022
    SummarySecurity update for conmon, libcontainers-common, libseccomp, podman
    Typesecurity
    Severitymoderate
    References1176804,1177598,1181640,1182998,1188520,1188914,1193166,1193273,CVE-2020-14370,CVE-2020-15157,CVE-2021-20199,CVE-2021-20291,CVE-2021-3602,CVE-2021-4024,CVE-2021-41190
    Description:

    This update for conmon, libcontainers-common, libseccomp, podman fixes the following issues:
    podman was updated to 3.4.4.
    Security issues fixed:



    Update to version 3.4.4:
    * Bugfixes
    - Fixed a bug where the podman exec command would, under some circumstances, print a warning message about failing to move conmon to the appropriate cgroup (#12535). - Fixed a bug where named volumes created as part of container creation (e.g. podman run --volume avolume:/a/mountpoint or similar) would be mounted with incorrect permissions (#12523). - Fixed a bug where the podman-remote create and podman-remote run commands did not properly handle the --entrypoint='' option (to clear the container's entrypoint) (#12521).

    * Security
    - This release addresses CVE-2021-4024, where the podman machine command opened the gvproxy API (used to forward ports to podman machine VMs) to the public internet on port 7777. - This release addresses CVE-2021-41190, where incomplete specification of behavior regarding image manifests could lead to inconsistent decoding on different clients.
    * Features
    - The --secret type=mount option to podman create and podman run supports a new option, target=, which specifies where in the container the secret will be mounted (#12287).
    * Bugfixes
    - Fixed a bug where rootless Podman would occasionally print warning messages about failing to move the pause process to a new cgroup (#12065). - Fixed a bug where the podman run and podman create commands would, when pulling images, still require TLS even with registries set to Insecure via config file (#11933). - Fixed a bug where the podman generate systemd command generated units that depended on multi-user.target, which has been removed from some distributions (#12438). - Fixed a bug where Podman could not run containers with images that had /etc/ as a symlink (#12189). - Fixed a bug where the podman logs -f command would, when using the journald logs backend, exit immediately if the container had previously been restarted (#12263). - Fixed a bug where, in containers on VMs created by podman machine, the host.containers.internal name pointed to the VM, not the host system (#11642). - Fixed a bug where containers and pods created by the podman play kube command in VMs managed by podman machine would not automatically forward ports from the host machine (#12248). - Fixed a bug where podman machine init would fail on OS X when GNU Coreutils was installed (#12329). - Fixed a bug where podman machine start would exit before SSH on the started VM was accepting connections (#11532). - Fixed a bug where the podman run command with signal proxying (--sig-proxy) enabled could print an error if it attempted to send a signal to a container that had just exited (#8086). - Fixed a bug where the podman stats command would not return correct information for containers running Systemd as PID1 (#12400). - Fixed a bug where the podman image save command would fail on OS X when writing the image to STDOUT (#12402). - Fixed a bug where the podman ps command did not properly handle PS arguments which contained whitespace (#12452). - Fixed a bug where the podman-remote wait command could fail to detect that the container exited and return an error under some circumstances (#12457). - Fixed a bug where the Windows MSI installer for podman-remote would break the PATH environment variable by adding an extra ' (#11416).
    * API
    - The Libpod Play Kube endpoint now also accepts ConfigMap YAML as part of its payload, and will use provided any ConfigMap to configure provided pods and services. - Fixed a bug where the Compat Create endpoint for Containers would not always create the container's working directory if it did not exist (#11842). - Fixed a bug where the Compat Create endpoint for Containers returned an incorrect error message with 404 errors when the requested image was not found (#12315). - Fixed a bug where the Compat Create endpoint for Containers did not properly handle the HostConfig.Mounts field (#12419). - Fixed a bug where the Compat Archive endpoint for Containers did not properly report errors when the operation failed (#12420). - Fixed a bug where the Compat Build endpoint for Images ignored the layers query parameter (for caching intermediate layers from the build) (#12378). - Fixed a bug where the Compat Build endpoint for Images did not report errors in a manner compatible with Docker (#12392). - Fixed a bug where the Compat Build endpoint for Images would fail to build if the context directory was a symlink (#12409). - Fixed a bug where the Compat List endpoint for Images included manifest lists (and not just images) in returned results (#12453).

    * Fixed a bug where podman tag could not tag manifest lists (#12046). * Fixed a bug where built-in volumes specified by images would not be created correctly under some circumstances. * Fixed a bug where, when using Podman Machine on OS X, containers in pods did not have working port forwarding from the host (#12207). * Fixed a bug where the podman network reload command command on containers using the slirp4netns network mode and the rootlessport port forwarding driver would make an unnecessary attempt to restart rootlessport on containers that did not forward ports. * Fixed a bug where the podman generate kube command would generate YAML including some unnecessary (set to default) fields (e.g. empty SELinux and DNS configuration blocks, and the privileged flag when set to false) (#11995). * Fixed a bug where the podman pod rm command could, if interrupted at the right moment, leave a reference to an already-removed infra container behind (#12034). * Fixed a bug where the podman pod rm command would not remove pods with more than one container if all containers save for the infra container were stopped unless --force was specified (#11713). * Fixed a bug where the --memory flag to podman run and podman create did not accept a limit of 0 (which should specify unlimited memory) (#12002). * Fixed a bug where the remote Podman client's podman build command could attempt to build a Dockerfile in the working directory of the podman system service instance instead of the Dockerfile specified by the user (#12054). * Fixed a bug where the podman logs --tail command could function improperly (printing more output than requested) when the journald log driver was used. * Fixed a bug where containers run using the slirp4netns network mode with IPv6 enabled would not have IPv6 connectivity until several seconds after they started (#11062). * Fixed a bug where some Podman commands could cause an extra dbus-daemon process to be created (#9727). * Fixed a bug where rootless Podman would sometimes print warnings about a failure to move the pause process into a given CGroup (#12065). * Fixed a bug where the checkpointed field in podman inspect on a container was not set to false after a container was restored. * Fixed a bug where the podman system service command would print overly-verbose logs about request IDs (#12181). * Fixed a bug where Podman could, when creating a new container without a name explicitly specified by the user, sometimes use an auto-generated name already in use by another container if multiple containers were being created in parallel (#11735).
    Update to version 3.4.1:
    * Bugfixes
    - Fixed a bug where podman machine init could, under some circumstances, create invalid machine configurations which could not be started (#11824). - Fixed a bug where the podman machine list command would not properly populate some output fields. - Fixed a bug where podman machine rm could leave dangling sockets from the removed machine (#11393). - Fixed a bug where podman run --pids-limit=-1 was not supported (it now sets the PID limit in the container to unlimited) (#11782). - Fixed a bug where podman run and podman attach could throw errors about a closed network connection when STDIN was closed by the client (#11856). - Fixed a bug where the podman stop command could fail when run on a container that had another podman stop command run on it previously. - Fixed a bug where the --sync flag to podman ps was nonfunctional. - Fixed a bug where the Windows and OS X remote clients' podman stats command would fail (#11909). - Fixed a bug where the podman play kube command did not properly handle environment variables whose values contained an = (#11891). - Fixed a bug where the podman generate kube command could generate invalid annotations when run on containers with volumes that use SELinux relabelling (:z or :Z) (#11929). - Fixed a bug where the podman generate kube command would generate YAML including some unnecessary (set to default) fields (e.g. user and group, entrypoint, default protocol for forwarded ports) (#11914, #11915, and #11965). - Fixed a bug where the podman generate kube command could, under some circumstances, generate YAML including an invalid targetPort field for forwarded ports (#11930). - Fixed a bug where rootless Podman's podman info command could, under some circumstances, not read available CGroup controllers (#11931). - Fixed a bug where podman container checkpoint --export would fail to checkpoint any container created with --log-driver=none (#11974).
    * API
    - Fixed a bug where the Compat Create endpoint for Containers could panic when no options were passed to a bind mount of tmpfs (#11961).
    Update to version 3.4.0:
    * Features
    - Pods now support init containers! Init containers are containers which run before the rest of the pod starts. There are two types of init containers: 'always', which always run before the pod is started, and 'once', which only run the first time the pod starts and are subsequently removed. They can be added using the podman create command's --init-ctr option. - Support for init containers has also been added to podman play kube and podman generate kube - init containers contained in Kubernetes YAML will be created as Podman init containers, and YAML generated by Podman will include any init containers created. - The podman play kube command now supports building images. If the --build option is given and a directory with the name of the specified image exists in the current working directory and contains a valid Containerfile or Dockerfile, the image will be built and used for the container. - The podman play kube command now supports a new option, --teardown, which removes any pods and containers created by the given Kubernetes YAML. - The podman generate kube command now generates annotations for SELinux mount options on volume (:z and :Z) that are respected by the podman play kube command. - A new command has been added, podman pod logs, to return logs for all containers in a pod at the same time. - Two new commands have been added, podman volume export (to export a volume to a tar file) and podman volume import) (to populate a volume from a given tar file). - The podman auto-update command now supports simple rollbacks. If a container fails to start after an automatic update, it will be rolled back to the previous image and restarted again. - Pods now share their user namespace by default, and the podman pod create command now supports the --userns option. This allows rootless pods to be created with the --userns=keep-id option. - The podman pod ps command now supports a new filter with its --filter option, until, which returns pods created before a given timestamp. - The podman image scp command has been added. This command allows images to be transferred between different hosts. - The podman stats command supports a new option, --interval, to specify the amount of time before the information is refreshed. - The podman inspect command now includes ports exposed (but not published) by containers (e.g. ports from --expose when --publish-all is not specified). - The podman inspect command now has a new boolean value, Checkpointed, which indicates that a container was stopped as a result of a podman container checkpoint operation. - Volumes created by podman volume create now support setting quotas when run atop XFS. The size and inode options allow the maximum size and maximum number of inodes consumed by a volume to be limited. - The podman info command now outputs information on what log drivers, network drivers, and volume plugins are available for use (#11265). - The podman info command now outputs the current log driver in use, and the variant and codename of the distribution in use. - The parameters of the VM created by podman machine init (amount of disk space, memory, CPUs) can now be set in containers.conf. - The podman machine ls command now shows additional information (CPUs, memory, disk size) about VMs managed by podman machine. - The podman ps command now includes healthcheck status in container state for containers that have healthchecks (#11527).
    * Changes
    - The podman build command has a new alias, podman buildx, to improve compatibility with Docker. We have already added support for many docker buildx flags to podman build and aim to continue to do so. - Cases where Podman is run without a user session or a writable temporary files directory will now produce better error messages. - The default log driver has been changed from file to journald. The file driver did not properly support log rotation, so this should lead to a better experience. If journald is not available on the system, Podman will automatically revert to the file. - Podman no longer depends on ip for removing networks (#11403). - The deprecated --macvlan flag to podman network create now warns when it is used. It will be removed entirely in the Podman 4.0 release. - The podman machine start command now prints a message when the VM is successfully started. - The podman stats command can now be used on containers that are paused. - The podman unshare command will now return the exit code of the command that was run in the user namespace (assuming the command was successfully run). - Successful healthchecks will no longer add a healthy line to the system log to reduce log spam. - As a temporary workaround for a lack of shortname prompts in the Podman remote client, VMs created by podman machine now default to only using the docker.io registry.
    * Bugfixes
    - Fixed a bug where whitespace in the definition of sysctls (particularly default sysctls specified in containers.conf) would cause them to be parsed incorrectly. - Fixed a bug where the Windows remote client improperly validated volume paths (#10900). - Fixed a bug where the first line of logs from a container run with the journald log driver could be skipped. - Fixed a bug where images created by podman commit did not include ports exposed by the container. - Fixed a bug where the podman auto-update command would ignore the io.containers.autoupdate.authfile label when pulling images (#11171). - Fixed a bug where the --workdir option to podman create and podman run could not be set to a directory where a volume was mounted (#11352). - Fixed a bug where systemd socket-activation did not properly work with systemd-managed Podman containers (#10443). - Fixed a bug where environment variable secrets added to a container were not available to exec sessions launched in the container. - Fixed a bug where rootless containers could fail to start the rootlessport port-forwarding service when XDG_RUNTIME_DIR was set to a long path. - Fixed a bug where arguments to the --systemd option to podman create and podman run were case-sensitive (#11387). - Fixed a bug where the podman manifest rm command would also remove images referenced by the manifest, not just the manifest itself (#11344). - Fixed a bug where the Podman remote client on OS X would not function properly if the TMPDIR environment variable was not set (#11418). - Fixed a bug where the /etc/hosts file was not guaranteed to contain an entry for localhost (this is still not guaranteed if --net=host is used; such containers will exactly match the host's /etc/hosts) (#11411). - Fixed a bug where the podman machine start command could print warnings about unsupported CPU features (#11421). - Fixed a bug where the podman info command could segfault when accessing cgroup information. - Fixed a bug where the podman logs -f command could hang when a container exited (#11461). - Fixed a bug where the podman generate systemd command could not be used on containers that specified a restart policy (#11438). - Fixed a bug where the remote Podman client's podman build command would fail to build containers if the UID and GID on the client were higher than 65536 (#11474). - Fixed a bug where the remote Podman client's podman build command would fail to build containers if the context directory was a symlink (#11732). - Fixed a bug where the --network flag to podman play kube was not properly parsed when a non-bridge network configuration was specified. - Fixed a bug where the podman inspect command could error when the container being inspected was removed as it was being inspected (#11392). - Fixed a bug where the podman play kube command ignored the default pod infra image specified in containers.conf. - Fixed a bug where the --format option to podman inspect was nonfunctional under some circumstances (#8785). - Fixed a bug where the remote Podman client's podman run and podman exec commands could skip a byte of output every 8192 bytes (#11496). - Fixed a bug where the podman stats command would print nonsensical results if the container restarted while it was running (#11469). - Fixed a bug where the remote Podman client would error when STDOUT was redirected on a Windows client (#11444). - Fixed a bug where the podman run command could return 0 when the application in the container exited with 125 (#11540). - Fixed a bug where containers with --restart=always set using the rootlessport port-forwarding service could not be restarted automatically. - Fixed a bug where the --cgroups=split option to podman create and podman run was silently discarded if the container was part of a pod. - Fixed a bug where the podman container runlabel command could fail if the image name given included a tag. - Fixed a bug where Podman could add an extra 127.0.0.1 entry to /etc/hosts under some circumstances (#11596). - Fixed a bug where the remote Podman client's podman untag command did not properly handle tags including a digest (#11557). - Fixed a bug where the --format option to podman ps did not properly support the table argument for tabular output. - Fixed a bug where the --filter option to podman ps did not properly handle filtering by healthcheck status (#11687). - Fixed a bug where the podman run and podman start --attach commands could race when retrieving the exit code of a container that had already been removed resulting in an error (e.g. by an external podman rm -f) (#11633). - Fixed a bug where the podman generate kube command would add default environment variables to generated YAML. - Fixed a bug where the podman generate kube command would add the default CMD from the image to generated YAML (#11672). - Fixed a bug where the podman rm --storage command could fail to remove containers under some circumstances (#11207). - Fixed a bug where the podman machine ssh command could fail when run on Linux (#11731). - Fixed a bug where the podman stop command would error when used on a container that was already stopped (#11740). - Fixed a bug where renaming a container in a pod using the podman rename command, then removing the pod using podman pod rm, could cause Podman to believe the new name of the container was permanently in use, despite the container being removed (#11750).
    * API
    - The Libpod Pull endpoint for Images now has a new query parameter, quiet, which (when set to true) suppresses image pull progress reports (#10612). - The Compat Events endpoint now includes several deprecated fields from the Docker v1.21 API for improved compatibility with older clients. - The Compat List and Inspect endpoints for Images now prefix image IDs with sha256: for improved Docker compatibility (#11623). - The Compat Create endpoint for Containers now properly sets defaults for healthcheck-related fields (#11225). - The Compat Create endpoint for Containers now supports volume options provided by the Mounts field (#10831). - The Compat List endpoint for Secrets now supports a new query parameter, filter, which allows returned results to be filtered. - The Compat Auth endpoint now returns the correct response code (500 instead of 400) when logging into a registry fails. - The Version endpoint now includes information about the OCI runtime and Conmon in use (#11227). - Fixed a bug where the X-Registry-Config header was not properly handled, leading to errors when pulling images (#11235). - Fixed a bug where invalid query parameters could cause a null pointer dereference when creating error messages. - Logging of API requests and responses at trace level has been greatly improved, including the addition of an X-Reference-Id header to correlate requests and responses (#10053).
    Update to version 3.3.1:
    * Bugfixes
    - Fixed a bug where unit files created by podman generate systemd could not cleanup shut down containers when stopped by systemctl stop (#11304). - Fixed a bug where podman machine commands would not properly locate the gvproxy binary in some circumstances. - Fixed a bug where containers created as part of a pod using the --pod-id-file option would not join the pod's network namespace (#11303). - Fixed a bug where Podman, when using the systemd cgroups driver, could sometimes leak dbus sessions. - Fixed a bug where the until filter to podman logs and podman events was improperly handled, requiring input to be negated (#11158). - Fixed a bug where rootless containers using CNI networking run on systems using systemd-resolved for DNS would fail to start if resolved symlinked /etc/resolv.conf to an absolute path (#11358).
    * API
    - A large number of potential file descriptor leaks from improperly closing client connections have been fixed.
    Update to version 3.3.0:
    * Fix network aliases with network id * machine: compute sha256 as we read the image file * machine: check for file exists instead of listing directory * pkg/bindings/images.nTar(): slashify hdr.Name values * Volumes: Only remove from DB if plugin removal succeeds * For compatibility, ignore Content-Type * [v3.3] Bump c/image 5.15.2, buildah v1.22.3 * Implement SD-NOTIFY proxy in conmon * Fix rootless cni dns without systemd stub resolver * fix rootlessport flake * Skip stats test in CGv1 container environments * Fix AVC denials in tests of volume mounts * Restore buildah-bud test requiring new images * Revert '.cirrus.yml: use fresh images for all VMs' * Fix device tests using ls test files * Enhance priv. dev. check * Workaround host availability of /dev/kvm * Skip cgroup-parent test due to frequent flakes * Cirrus: Fix not uploading logformatter html
    Switch to crun (bsc#1188914)
    Update to version 3.2.3:
    * Bump to v3.2.3 * Update release notes for v3.2.3 * vendor containers/common@v0.38.16 * vendor containers/buildah@v1.21.3 * Fix race conditions in rootless cni setup * CNI-in-slirp4netns: fix bind-mount for /run/systemd/resolve/stub-resolv.conf * Make rootless-cni setup more robust * Support uid,gid,mode options for secrets * vendor containers/common@v0.38.15 * [CI:DOCS] podman search: clarify that results depend on implementation * vendor containers/common@v0.38.14 * vendor containers/common@v0.38.13 * [3.2] vendor containers/common@v0.38.12 * Bump README to v3.2.2 * Bump to v3.2.3-dev







    Bugfixes - Fixed a bug where the Created field of podman ps --format=json was formatted as a string instead of an Unix timestamp (integer) (#9315). - Fixed a bug where failing lookups of individual layers during the podman images command would cause the whole command to fail without printing output. - Fixed a bug where --cgroups=split did not function properly on cgroups v1 systems. - Fixed a bug where mounting a volume over an directory in the container that existed, but was empty, could fail (#9393). - Fixed a bug where mounting a volume over a directory in the container that existed could copy the entirety of the container's rootfs, instead of just the directory mounted over, into the volume (#9415). - Fixed a bug where Podman would treat the --entrypoint=[''] option to podman run and podman create as a literal empty string in the entrypoint, when instead it should have been ignored (#9377). - Fixed a bug where Podman would set the HOME environment variable to '' when the container ran as a user without an assigned home directory (#9378). - Fixed a bug where specifying a pod infra image that had no tags (by using its ID) would cause podman pod create to panic (#9374). - Fixed a bug where the --runtime option was not properly handled by the podman build command (#9365). - Fixed a bug where Podman would incorrectly print an error message related to the remote API when the remote API was not in use and starting Podman failed. - Fixed a bug where Podman would change ownership of a container's working directory, even if it already existed (#9387). - Fixed a bug where the podman generate systemd --new command would incorrectly escape %t when generating the path for the PID file (#9373). - Fixed a bug where Podman could, when run inside a Podman container with the host's containers/storage directory mounted into the container, erroneously detect a reboot and reset container state if the temporary directory was not also mounted in (#9191). - Fixed a bug where some options of the podman build command (including but not limited to --jobs) were nonfunctional (#9247). * API - Fixed a breaking change to the Libpod Wait API for Containers where the Conditions parameter changed type in Podman v3.0 (#9351). - Fixed a bug where the Compat Create endpoint for Containers did not properly handle forwarded ports that did not specify a host port. - Fixed a bug where the Libpod Wait endpoint for Containers could write duplicate headers after an error occurred. - Fixed a bug where the Compat Create endpoint for Images would not pull images that already had a matching tag present locally, even if a more recent version was available at the registry (#9232). - The Compat Create endpoint for Images has had its compatibility with Docker improved, allowing its use with the docker-java library. * Misc - Updated Buildah to v1.19.4 - Updated the containers/storage library to v1.24.6
  • Changes from v3.0.0 * Features - Podman now features initial support for Docker Compose. - Added the podman rename command, which allows containers to be renamed after they are created (#1925). - The Podman remote client now supports the podman copy command. - A new command, podman network reload, has been added. This command will re-configure the network of all running containers, and can be used to recreate firewall rules lost when the system firewall was reloaded (e.g. via firewall-cmd --reload). - Podman networks now have IDs. They can be seen in podman network ls and can be used when removing and inspecting networks. Existing networks receive IDs automatically. - Podman networks now also support labels. They can be added via the --label option to network create, and podman network ls can filter labels based on them. - The podman network create command now supports setting bridge MTU and VLAN through the --opt option (#8454). - The podman container checkpoint and podman container restore commands can now checkpoint and restore containers that include volumes. - The podman container checkpoint command now supports the --with-previous and --pre-checkpoint options, and the podman container restore command now support the --import-previous option. These add support for two-step checkpointing with lowered dump times. - The podman push command can now push manifest lists. Podman will first attempt to push as an image, then fall back to pushing as a manifest list if that fails. - The podman generate kube command can now be run on multiple containers at once, and will generate a single pod containing all of them. - The podman generate kube and podman play kube commands now support Kubernetes DNS configuration, and will preserve custom DNS configuration when exporting or importing YAML (#9132). - The podman generate kube command now properly supports generating YAML for containers and pods creating using host networking (--net=host) (#9077). - The podman kill command now supports a --cidfile option to kill containers given a file containing the container's ID (#8443). - The podman pod create command now supports the --net=none option (#9165). - The podman volume create command can now specify volume UID and GID as options with the UID and GID fields passed to the the --opt option. - Initial support has been added for Docker Volume Plugins. Podman can now define available plugins in containers.conf and use them to create volumes with podman volume create --driver. - The podman run and podman create commands now support a new option, --platform, to specify the platform of the image to be used when creating the container. - The --security-opt option to podman run and podman create now supports the systempaths=unconfined option to unrestrict access to all paths in the container, as well as mask and unmask options to allow more granular restriction of container paths. - The podman stats --format command now supports a new format specified, MemUsageBytes, which prints the raw bytes of memory consumed by a container without human-readable formatting #8945. - The podman ps command can now filter containers based on what pod they are joined to via the pod filter (#8512). - The podman pod ps command can now filter pods based on what networks they are joined to via the network filter. The podman pod ps command can now print information on what networks a pod is joined to via the .Networks specifier to the --format option. - The podman system prune command now supports filtering what containers, pods, images, and volumes will be pruned. - The podman volume prune commands now supports filtering what volumes will be pruned. - The podman system prune command now includes information on space reclaimed (#8658). - The podman info command will now properly print information about packages in use on Gentoo and Arch systems. - The containers.conf file now contains an option for disabling creation of a new kernel keyring on container creation (#8384). - The podman image sign command can now sign multi-arch images by producing a signature for each image in a given manifest list. - The podman image sign command, when run as rootless, now supports per-user registry configuration files in $HOME/.config/containers/registries.d. - Configuration options for slirp4netns can now be set system-wide via the NetworkCmdOptions configuration option in containers.conf. - The MTU of slirp4netns can now be configured via the mtu= network command option (e.g. podman run --net slirp4netns:mtu=9000). * Security - A fix for CVE-2021-20199 is included. Podman between v1.8.0 and v2.2.1 used 127.0.0.1 as the source address for all traffic forwarded into rootless containers by a forwarded port; this has been changed to address the issue. * Changes - Shortname aliasing support has now been turned on by default. All Podman commands that must pull an image will, if a TTY is available, prompt the user about what image to pull. - The podman load command no longer accepts a NAME[:TAG] argument. The presence of this argument broke CLI compatibility with Docker by making docker load commands unusable with Podman (#7387). - The Go bindings for the HTTP API have been rewritten with a focus on limiting dependency footprint and improving extensibility. Read more here. - The legacy Varlink API has been completely removed from Podman. - The default log level for Podman has been changed from Error to Warn. - The podman network create command can now create macvlan networks using the --driver macvlan option for Docker compatibility. The existing --macvlan flag has been deprecated and will be removed in Podman 4.0 some time next year. - The podman inspect command has had the LogPath and LogTag fields moved into the LogConfig structure (from the root of the Inspect structure). The maximum size of the log file is also included. - The podman generate systemd command no longer generates unit files using the deprecated KillMode=none option (#8615). - The podman stop command now releases the container lock while waiting for it to stop - as such, commands like podman ps will no longer block until podman stop completes (#8501). - Networks created with podman network create --internal no longer use the dnsname plugin. This configuration never functioned as expected. - Error messages for the remote Podman client have been improved when it cannot connect to a Podman service. - Error messages for podman run when an invalid SELinux is specified have been improved. - Rootless Podman features improved support for containers with a single user mapped into the rootless user namespace. - Pod infra containers now respect default sysctls specified in containers.conf allowing for advanced configuration of the namespaces they will share. - SSH public key handling for remote Podman has been improved. * Bugfixes - Fixed a bug where the podman history --no-trunc command would truncate the Created By field (#9120). - Fixed a bug where root containers that did not explicitly specify a CNI network to join did not generate an entry for the network in use in the Networks field of the output of podman inspect (#6618). - Fixed a bug where, under some circumstances, container working directories specified by the image (via the WORKDIR instruction) but not present in the image, would not be created (#9040). - Fixed a bug where the podman generate systemd command would generate invalid unit files if the container was creating using a command line that included doubled braces ({{ and }}), e.g. --log-opt-tag={{.Name}} (#9034). - Fixed a bug where the podman generate systemd --new command could generate unit files including invalid Podman commands if the container was created using merged short options (e.g. podman run -dt) (#8847). - Fixed a bug where the podman generate systemd --new command could generate unit files that did not handle Podman commands including some special characters (e.g. $) (#9176 - Fixed a bug where rootless containers joining CNI networks could not set a static IP address (#7842). - Fixed a bug where rootless containers joining CNI networks could not set network aliases (#8567). - Fixed a bug where the remote client could, under some circumstances, not include the Containerfile when sending build context to the server (#8374). - Fixed a bug where rootless Podman did not mount /sys as a new sysfs in some circumstances where it was acceptable. - Fixed a bug where rootless containers that both joined a user namespace and a CNI networks would cause a segfault. These options are incompatible and now return an error. - Fixed a bug where the podman play kube command did not properly handle CMD and ARGS from images (#8803). - Fixed a bug where the podman play kube command did not properly handle environment variables from images (#8608). - Fixed a bug where the podman play kube command did not properly print errors that occurred when starting containers. - Fixed a bug where the podman play kube command errored when hostNetwork was used (#8790). - Fixed a bug where the podman play kube command would always pull images when the :latest tag was specified, even if the image was available locally (#7838). - Fixed a bug where the podman play kube command did not properly handle SELinux configuration, rending YAML with custom SELinux configuration unusable (#8710). - Fixed a bug where the podman generate kube command incorrectly populated the args and command fields of generated YAML (#9211). - Fixed a bug where containers in a pod would create a duplicate entry in the pod's shared /etc/hosts file every time the container restarted (#8921). - Fixed a bug where the podman search --list-tags command did not support the --format option (#8740). - Fixed a bug where the http_proxy option in containers.conf was not being respected, and instead was set unconditionally to true (#8843). - Fixed a bug where rootless Podman could, on systems with a recent Conmon and users with a long username, fail to attach to containers (#8798). - Fixed a bug where the podman images command would break and fail to display any images if an empty manifest list was present in storage (#8931). - Fixed a bug where locale environment variables were not properly passed on to Conmon. - Fixed a bug where Podman would not build on the MIPS architecture (#8782). - Fixed a bug where rootless Podman could fail to properly configure user namespaces for rootless containers when the user specified a --uidmap option that included a mapping beginning with UID 0. - Fixed a bug where the podman logs command using the k8s-file backend did not properly handle partial log lines with a length of 1 (#8879). - Fixed a bug where the podman logs command with the --follow option did not properly handle log rotation (#8733). - Fixed a bug where user-specified HOSTNAME environment variables were overwritten by Podman (#8886). - Fixed a bug where Podman would applied default sysctls from containers.conf in too many situations (e.g. applying network sysctls when the container shared its network with a pod). - Fixed a bug where Podman did not properly handle cases where a secondary image store was in use and an image was present in both the secondary and primary stores (#8176). - Fixed a bug where systemd-managed rootless Podman containers where the user in the container was not root could fail as the container's PID file was not accessible to systemd on the host (#8506). - Fixed a bug where the --privileged option to podman run and podman create would, under some circumstances, not disable Seccomp (#8849). - Fixed a bug where the podman exec command did not properly add capabilities when the container or exec session were run with --privileged. - Fixed a bug where rootless Podman would use the --enable-sandbox option to slirp4netns unconditionally, even when pivot_root was disabled, rendering slirp4netns unusable when pivot_root was disabled (#8846). - Fixed a bug where podman build --logfile did not actually write the build's log to the logfile. - Fixed a bug where the podman system service command did not close STDIN, and could display user-interactive prompts (#8700). - Fixed a bug where the podman system reset command could, under some circumstances, remove all the contents of the XDG_RUNTIME_DIR directory (#8680). - Fixed a bug where the podman network create command created CNI configurations that did not include a default gateway (#8748). - Fixed a bug where the podman.service systemd unit provided by default used the wrong service type, and would cause systemd to not correctly register the service as started (#8751). - Fixed a bug where, if the TMPDIR environment variable was set for the container engine in containers.conf, it was being ignored. - Fixed a bug where the podman events command did not properly handle future times given to the --until option (#8694). - Fixed a bug where the podman logs command wrote container STDERR logs to STDOUT instead of STDERR (#8683). - Fixed a bug where containers created from an image with multiple tags would report that they were created from the wrong tag (#8547). - Fixed a bug where container capabilities were not set properly when the --cap-add=all and --user options to podman create and podman run were combined. - Fixed a bug where the --layers option to podman build was nonfunctional (#8643). - Fixed a bug where the podman system prune command did not act recursively, and thus would leave images, containers, pods, and volumes present that would be removed by a subsequent call to podman system prune (#7990). - Fixed a bug where the --publish option to podman run and podman create did not properly handle ports specified as a range of ports with no host port specified (#8650). - Fixed a bug where --format did not support JSON output for individual fields (#8444). - Fixed a bug where the podman stats command would fail when run on root containers using the slirp4netns network mode (#7883). - Fixed a bug where the Podman remote client would ask for a password even if the server's SSH daemon did not support password authentication (#8498). - Fixed a bug where the podman stats command would fail if the system did not support one or more of the cgroup controllers Podman supports (#8588). - Fixed a bug where the --mount option to podman create and podman run did not ignore the consistency mount option. - Fixed a bug where failures during the resizing of a container's TTY would print the wrong error. - Fixed a bug where the podman network disconnect command could cause the podman inspect command to fail for a container until it was restarted (#9234). - Fixed a bug where containers created from a read-only rootfs (using the --rootfs option to podman create and podman run) would fail (#9230). - Fixed a bug where specifying Go templates to the --format option to multiple Podman commands did not support the join function (#8773). - Fixed a bug where the podman rmi command could, when run in parallel on multiple images, return layer not known errors (#6510). - Fixed a bug where the podman inspect command on containers displayed unlimited ulimits incorrectly (#9303). - Fixed a bug where Podman would fail to start when a volume was mounted over a directory in a container that contained symlinks that terminated outside the directory and its subdirectories (#6003).
  • API - Libpod API version has been bumped to v3.0.0. - All Libpod Pod APIs have been modified to properly report errors with individual containers. Cases where the operation as a whole succeeded but individual containers failed now report an HTTP 409 error (#8865). - The Compat API for Containers now supports the Rename and Copy APIs. - Fixed a bug where the Compat Prune APIs (for volumes, containers, and images) did not return the amount of space reclaimed in their responses. - Fixed a bug where the Compat and Libpod Exec APIs for Containers would drop errors that occurred prior to the exec session successfully starting (e.g. a 'no such file' error if an invalid executable was passed) (#8281) - Fixed a bug where the Volumes field in the Compat Create API for Containers was being ignored (#8649). - Fixed a bug where the NetworkMode field in the Compat Create API for Containers was not handling some values, e.g. container:, correctly. - Fixed a bug where the Compat Create API for Containers did not set container name properly. - Fixed a bug where containers created using the Compat Create API unconditionally used Kubernetes file logging (the default specified in containers.conf is now used). - Fixed a bug where the Compat Inspect API for Containers could include container states not recognized by Docker. - Fixed a bug where Podman did not properly clean up after calls to the Events API when the journald backend was in use, resulting in a leak of file descriptors (#8864). - Fixed a bug where the Libpod Pull endpoint for Images could fail with an index out of range error under certain circumstances (#8870). - Fixed a bug where the Libpod Exists endpoint for Images could panic. - Fixed a bug where the Compat List API for Containers did not support all filters (#8860). - Fixed a bug where the Compat List API for Containers did not properly populate the Status field. - Fixed a bug where the Compat and Libpod Resize APIs for Containers ignored the height and width parameters (#7102). - Fixed a bug where the Compat Search API for Images returned an incorrectly-formatted JSON response (#8758). - Fixed a bug where the Compat Load API for Images did not properly clean up temporary files. - Fixed a bug where the Compat Create API for Networks could panic when an empty IPAM configuration was specified. - Fixed a bug where the Compat Inspect and List APIs for Networks did not include Scope. - Fixed a bug where the Compat Wait endpoint for Containers did not support the same wait conditions that Docker did. * Misc - Updated Buildah to v1.19.2 - Updated the containers/storage library to v1.24.5 - Updated the containers/image library to v5.10.2 - Updated the containers/common library to v0.33.4


    SELinux support [jsc#SMO-15]

    libseccomp was updated to release 2.5.3:

    Update to release 2.5.2

    update to 2.5.1:

    Update to release 2.5.0

    Update to release 2.4.3

    Update to release 2.4.2


    conmon was updated to version 2.0.30:
    * Remove unreachable code path * exit: report if the exit command was killed * exit: fix race zombie reaper * conn_sock: allow watchdog messages through the notify socket proxy * seccomp: add support for seccomp notify
    Update to version 2.0.29:
    * Reset OOM score back to 0 for container runtime * call functions registered with atexit on SIGTERM * conn_sock: fix potential segfault
    Update to version 2.0.27:
    * Add CRI-O integration test GitHub action * exec: don't fail on EBADFD * close_fds: fix close of external fds * Add arm64 static build binary
    Update to version 2.0.26:
    * conn_sock: do not fail on EAGAIN * fix segfault from a double freed pointer * Fix a bug where conmon could never spawn a container, because a disagreement between the caller and itself on where the attach socket was. * improve --full-attach to ignore the socket-dir directly. that means callers don't need to specify a socket dir at all (and can remove it) * add full-attach option to allow callers to not truncate a very long path for the attach socket * close only opened FDs * set locale to inherit environment
    Update to version 2.0.22:
    * added man page * attach: always chdir * conn_sock: Explicitly free a heap-allocated string * refactor I/O and add SD_NOTIFY proxy support
    Update to version 2.0.21:
    * protect against kill(-1) * Makefile: enable debuginfo generation * Remove go.sum file and add go.mod * Fail if conmon config could not be written * nix: remove double definition for e2fsprogs * Speedup static build by utilizing CI cache on `/nix` folder * Fix nix build for failing e2fsprogs tests * test: fix CI * Use Podman for building
    libcontainers-common was updated to include:
    (changes too long to list)
    CVEs fixed: CVE-2020-14370,CVE-2020-15157,CVE-2021-20199,CVE-2021-20291,CVE-2021-3602


    Advisory IDSUSE-RU-2022:711-1
    ReleasedFri Mar 4 09:15:11 2022
    SummaryRecommended update for sudo
    Typerecommended
    Severitymoderate
    References1181703
    Description:

    This update for sudo fixes the following issues:


    Advisory IDSUSE-SU-2022:712-1
    ReleasedFri Mar 4 09:30:52 2022
    SummarySecurity update for flatpak
    Typesecurity
    Severityimportant
    References1194610,1194611,CVE-2021-43860,CVE-2022-21682
    Description:

    This update for flatpak fixes the following issues:
    Update to flatpak 1.10.7:


    Advisory IDSUSE-SU-2022:713-1
    ReleasedFri Mar 4 09:34:17 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1196025,1196026,1196168,1196169,1196171,CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
    Description:

    This update for expat fixes the following issues:


    Advisory IDSUSE-SU-2022:715-1
    ReleasedFri Mar 4 09:37:47 2022
    SummarySecurity update for nodejs14
    Typesecurity
    Severityimportant
    References1191962,1191963,1192153,1192154,1192696,CVE-2021-23343,CVE-2021-32803,CVE-2021-32804,CVE-2021-3807,CVE-2021-3918
    Description:

    This update for nodejs14 fixes the following issues:


    Advisory IDSUSE-SU-2022:716-1
    ReleasedFri Mar 4 09:42:53 2022
    SummarySecurity update for wpa_supplicant
    Typesecurity
    Severityimportant
    References1194732,1194733,CVE-2022-23303,CVE-2022-23304
    Description:

    This update for wpa_supplicant fixes the following issues:


    Advisory IDSUSE-SU-2022:717-1
    ReleasedFri Mar 4 09:45:20 2022
    SummarySecurity update for gnutls
    Typesecurity
    Severitymoderate
    References1196167,CVE-2021-4209
    Description:

    This update for gnutls fixes the following issues:


    Advisory IDSUSE-feature-2022:718-1
    ReleasedFri Mar 4 10:10:19 2022
    SummaryFeature update for duperemove
    Typefeature
    Severitymoderate
    References
    Description:

    This feature update for duperemove fixes the following issue:
    Update from version 0.11.beta4 to version 0.11.3 (jsc#SLE-11306)


    Advisory IDSUSE-SU-2022:720-1
    ReleasedFri Mar 4 10:20:28 2022
    SummarySecurity update for containerd
    Typesecurity
    Severitymoderate
    References1196441,CVE-2022-23648
    Description:

    This update for containerd fixes the following issues:


    Advisory IDSUSE-SU-2022:722-1
    ReleasedFri Mar 4 10:28:09 2022
    SummarySecurity update for wireshark
    Typesecurity
    Severityimportant
    References1195866,1195867,1195868,1195869,1195870,CVE-2022-0581,CVE-2022-0582,CVE-2022-0583,CVE-2022-0585,CVE-2022-0586
    Description:

    This update for wireshark fixes the following issues:
    Update to Wireshark 3.6.2:


    Advisory IDSUSE-SU-2022:723-1
    ReleasedFri Mar 4 10:31:46 2022
    SummarySecurity update for go1.17
    Typesecurity
    Severityimportant
    References1190649,1195834,1195835,1195838,CVE-2022-23772,CVE-2022-23773,CVE-2022-23806
    Description:

    This update for go1.17 fixes the following issues:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:724-1
    ReleasedFri Mar 4 10:34:01 2022
    SummarySecurity update for go1.16
    Typesecurity
    Severityimportant
    References1182345,1195834,1195835,1195838,CVE-2022-23772,CVE-2022-23773,CVE-2022-23806
    Description:

    This update for go1.16 fixes the following issues:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:727-1
    ReleasedFri Mar 4 10:39:21 2022
    SummarySecurity update for libeconf, shadow and util-linux
    Typesecurity
    Severitymoderate
    References1188507,1192954,1193632,1194976,CVE-2021-3995,CVE-2021-3996
    Description:

    This security update for libeconf, shadow and util-linux fix the following issues:
    libeconf:


    Issues fixed in libeconf:
    shadow:

    util-linux:


    Advisory IDSUSE-RU-2022:728-1
    ReleasedFri Mar 4 11:51:48 2022
    SummaryRecommended update for SUSE Manager 4.2.5 Release Notes
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for SUSE Manager 4.2.5 Release Notes provides the following additions:
    Release notes for SUSE Manager:


    Advisory IDSUSE-SU-2022:731-1
    ReleasedFri Mar 4 14:47:06 2022
    SummarySecurity update for mariadb
    Typesecurity
    Severityimportant
    References1195325,1195334,1195339,1196016,CVE-2021-46657,CVE-2021-46658,CVE-2021-46659,CVE-2021-46661,CVE-2021-46663,CVE-2021-46664,CVE-2021-46665,CVE-2021-46668,CVE-2022-24048,CVE-2022-24050,CVE-2022-24051,CVE-2022-24052
    Description:

    This update for mariadb fixes the following issues:

  • The following issues have already been fixed in this package but weren't previously mentioned in the changes file: CVE-2021-46658, bsc#1195334 CVE-2021-46657, bsc#1195325

  • Advisory IDSUSE-SU-2022:735-1
    ReleasedFri Mar 4 14:49:47 2022
    SummarySecurity update for zsh
    Typesecurity
    Severityimportant
    References1163882,1196435,CVE-2019-20044,CVE-2021-45444
    Description:

    This update for zsh fixes the following issues:


    Advisory IDSUSE-SU-2022:736-1
    ReleasedFri Mar 4 14:51:57 2022
    SummarySecurity update for vim
    Typesecurity
    Severityimportant
    References1190533,1190570,1191893,1192478,1192481,1193294,1193298,1194216,1194556,1195004,1195066,1195126,1195202,1195356,CVE-2021-3778,CVE-2021-3796,CVE-2021-3872,CVE-2021-3927,CVE-2021-3928,CVE-2021-3984,CVE-2021-4019,CVE-2021-4193,CVE-2021-46059,CVE-2022-0318,CVE-2022-0319,CVE-2022-0351,CVE-2022-0361,CVE-2022-0413
    Description:

    This update for vim fixes the following issues:


    Advisory IDSUSE-RU-2022:739-1
    ReleasedMon Mar 7 09:10:12 2022
    SummaryRecommended update for mdadm
    Typerecommended
    Severitymoderate
    References1183229
    Description:

    This update for mdadm fixes the following issues:


    Advisory IDSUSE-RU-2022:740-1
    ReleasedMon Mar 7 12:36:33 2022
    SummaryRecommended update for supportutils-plugin-cloud-init
    Typerecommended
    Severitymoderate
    References1195961
    Description:

    This update for supportutils-plugin-cloud-init contains the following fixes:


    Advisory IDSUSE-SU-2022:743-1
    ReleasedMon Mar 7 22:08:12 2022
    SummarySecurity update for cyrus-sasl
    Typesecurity
    Severityimportant
    References1194265,1196036,CVE-2022-24407
    Description:

    This update for cyrus-sasl fixes the following issues:


    The following non-security bugs were fixed:


    Advisory IDSUSE-OU-2022:752-1
    ReleasedTue Mar 8 13:21:39 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-SU-2022:755-1
    ReleasedTue Mar 8 19:02:39 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1089644,1154353,1156395,1157038,1157923,1176447,1176940,1178134,1181147,1181588,1183872,1187716,1188404,1189126,1190812,1190972,1191580,1191655,1191741,1192210,1192483,1193096,1193233,1193243,1193787,1194163,1194967,1195012,1195081,1195142,1195352,1195378,1195476,1195477,1195478,1195479,1195480,1195481,1195482,1195506,1195516,1195543,1195668,1195701,1195798,1195799,1195823,1195908,1195928,1195947,1195957,1195995,1196195,1196235,1196339,1196400,1196403,1196516,1196584,1196601,1196612,1196776,CVE-2022-0001,CVE-2022-0002,CVE-2022-0492,CVE-2022-0516,CVE-2022-0847,CVE-2022-25375
    Description:

    The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.

    Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:760-1
    ReleasedTue Mar 8 19:06:23 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1089644,1154353,1157038,1157923,1176447,1176940,1178134,1181147,1181588,1183872,1187716,1188404,1189126,1190812,1190972,1191580,1191655,1191741,1192210,1192483,1193096,1193233,1193243,1193787,1194163,1194967,1195012,1195081,1195286,1195352,1195378,1195506,1195516,1195543,1195668,1195701,1195798,1195799,1195823,1195908,1195928,1195947,1195957,1195995,1196195,1196235,1196339,1196373,1196400,1196403,1196516,1196584,1196585,1196601,1196612,1196776,CVE-2022-0001,CVE-2022-0002,CVE-2022-0492,CVE-2022-0516,CVE-2022-0847,CVE-2022-25375
    Description:

    The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

    Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:769-1
    ReleasedWed Mar 9 09:23:56 2022
    SummarySecurity update for libcaca
    Typesecurity
    Severityimportant
    References1184751,1184752,CVE-2021-30498,CVE-2021-30499
    Description:

    This update for libcaca fixes the following issues:


    Advisory IDSUSE-SU-2022:770-1
    ReleasedWed Mar 9 09:24:51 2022
    SummarySecurity update for buildah
    Typesecurity
    Severitymoderate
    References1187812,1192999,CVE-2019-10214,CVE-2020-10696,CVE-2021-20206
    Description:

    This update for buildah fixes the following issues:
    buildah was updated to version 1.23.1:
    Update to version 1.22.3:


    Update to version 1.22.0:


    Advisory IDSUSE-RU-2022:771-1
    ReleasedWed Mar 9 09:27:07 2022
    SummaryRecommended update for libseccomp
    Typerecommended
    Severitymoderate
    References1196825
    Description:

    This update for libseccomp fixes the following issues:


    Advisory IDSUSE-RU-2022:772-1
    ReleasedWed Mar 9 09:44:13 2022
    SummaryRecommended update for icewm-theme-branding
    Typerecommended
    Severitymoderate
    References1195328,1196336
    Description:

    This update for icewm-theme-branding fixes the following issues:


    Advisory IDSUSE-RU-2022:773-1
    ReleasedWed Mar 9 09:53:03 2022
    SummaryRecommended update for fwupd
    Typerecommended
    Severitymoderate
    References1193921
    Description:

    This update for fwupd fixes the following issues:


    Advisory IDSUSE-SU-2022:774-1
    ReleasedWed Mar 9 10:52:10 2022
    SummarySecurity update for tcpdump
    Typesecurity
    Severitymoderate
    References1195825,CVE-2018-16301
    Description:

    This update for tcpdump fixes the following issues:


    Advisory IDSUSE-RU-2022:775-1
    ReleasedWed Mar 9 12:55:03 2022
    SummaryRecommended update for pciutils
    Typerecommended
    Severitymoderate
    References1192862
    Description:

    This update for pciutils fixes the following issues:


    Advisory IDSUSE-RU-2022:776-1
    ReleasedWed Mar 9 12:56:05 2022
    SummaryRecommended update for mutter
    Typerecommended
    Severitymoderate
    References1188759
    Description:

    This update for mutter fixes the following issues:


    Advisory IDSUSE-RU-2022:780-1
    ReleasedWed Mar 9 14:46:12 2022
    SummaryRecommended update for nvme-cli
    Typerecommended
    Severitymoderate
    References1193540
    Description:

    This update for nvme-cli fixes the following issues:


    Advisory IDSUSE-OU-2022:781-1
    ReleasedWed Mar 9 15:00:10 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-SU-2022:783-1
    ReleasedWed Mar 9 15:16:36 2022
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1196809,CVE-2022-26485,CVE-2022-26486
    Description:

    This update for MozillaFirefox fixes the following issues:
    Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):


    Advisory IDSUSE-RU-2022:787-1
    ReleasedThu Mar 10 11:20:13 2022
    SummaryRecommended update for openldap2
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for openldap2 fixes the following issue:


    Advisory IDSUSE-RU-2022:788-1
    ReleasedThu Mar 10 11:21:04 2022
    SummaryRecommended update for libzypp, zypper
    Typerecommended
    Severitymoderate
    References1195326
    Description:

    This update for libzypp, zypper fixes the following issues:


    Advisory IDSUSE-RU-2022:789-1
    ReleasedThu Mar 10 11:22:05 2022
    SummaryRecommended update for update-alternatives
    Typerecommended
    Severitymoderate
    References1195654
    Description:

    This update for update-alternatives fixes the following issues:


    Advisory IDSUSE-RU-2022:791-1
    ReleasedThu Mar 10 11:53:04 2022
    SummaryRecommended update for scap-security-guide
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for scap-security-guide fixes the following issues:
    scap-security-guide (ComplianceAsCode) was updated to 0.1.60 (jsc#ECO-3319)


    Note that SUSE only supports for SUSE Linux Enterprise 12 and 15:

    The CIS profile is community supplied and currently not supported by SUSE.


    Advisory IDSUSE-RU-2022:792-1
    ReleasedThu Mar 10 11:58:18 2022
    SummaryRecommended update for suse-build-key
    Typerecommended
    Severitymoderate
    References1194845,1196494,1196495
    Description:

    This update for suse-build-key fixes the following issues:


    Advisory IDSUSE-RU-2022:799-1
    ReleasedThu Mar 10 13:09:24 2022
    SummaryRecommended update for sssd
    Typerecommended
    Severitymoderate
    References1182058,1195552,1196166
    Description:

    This update for sssd fixes the following issues:


    Advisory IDSUSE-SU-2022:802-1
    ReleasedThu Mar 10 17:32:46 2022
    SummarySecurity update for python-libxml2-python
    Typesecurity
    Severityimportant
    References1196490,CVE-2022-23308
    Description:

    This update for python-libxml2-python fixes the following issues:


    Advisory IDSUSE-SU-2022:803-1
    ReleasedThu Mar 10 17:35:53 2022
    SummarySecurity update for python-lxml
    Typesecurity
    Severityimportant
    References1118088,1179534,1184177,1193752,CVE-2018-19787,CVE-2020-27783,CVE-2021-28957,CVE-2021-43818
    Description:

    This update for python-lxml fixes the following issues:


    Advisory IDSUSE-SU-2022:804-1
    ReleasedThu Mar 10 17:52:55 2022
    SummarySecurity update for MozillaThunderbird
    Typesecurity
    Severityimportant
    References1196809,CVE-2022-26485,CVE-2022-26486
    Description:

    This update for MozillaThunderbird fixes the following issues:
    Mozilla Thunderbird 91.6.2 (bsc#1196809):


    Advisory IDSUSE-RU-2022:808-1
    ReleasedFri Mar 11 06:07:58 2022
    SummaryRecommended update for procps
    Typerecommended
    Severitymoderate
    References1195468
    Description:

    This update for procps fixes the following issues:


    Advisory IDSUSE-SU-2022:815-1
    ReleasedMon Mar 14 10:21:35 2022
    SummarySecurity update for flac
    Typesecurity
    Severitymoderate
    References1196660,CVE-2021-0561
    Description:

    This update for flac fixes the following issues:


    Advisory IDSUSE-SU-2022:816-1
    ReleasedMon Mar 14 10:22:04 2022
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1194925,1194926,1194927,1194928,1194929,1194930,1194931,1194932,1194933,1194934,1194935,1194937,1194939,1194940,1194941,CVE-2022-21248,CVE-2022-21277,CVE-2022-21282,CVE-2022-21283,CVE-2022-21291,CVE-2022-21293,CVE-2022-21294,CVE-2022-21296,CVE-2022-21299,CVE-2022-21305,CVE-2022-21340,CVE-2022-21341,CVE-2022-21360,CVE-2022-21365,CVE-2022-21366
    Description:

    This update for java-11-openjdk fixes the following issues:


    Advisory IDSUSE-SU-2022:817-1
    ReleasedMon Mar 14 10:22:28 2022
    SummarySecurity update for xstream
    Typesecurity
    Severitymoderate
    References1195458,CVE-2021-43859
    Description:

    This update for xstream fixes the following issues:


    Advisory IDSUSE-SU-2022:818-1
    ReleasedMon Mar 14 10:23:01 2022
    SummarySecurity update for tomcat
    Typesecurity
    Severityimportant
    References1195255,1196137,CVE-2022-23181
    Description:

    This update for tomcat fixes the following issues:
    Security issues fixed:


    Advisory IDSUSE-SU-2022:821-1
    ReleasedMon Mar 14 14:52:30 2022
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1196900,CVE-2022-26381,CVE-2022-26383,CVE-2022-26384,CVE-2022-26386,CVE-2022-26387
    Description:

    This update for MozillaFirefox fixes the following issues:
    Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):


    Advisory IDSUSE-RU-2022:833-1
    ReleasedMon Mar 14 18:51:58 2022
    SummaryRecommended update for open-iscsi
    Typerecommended
    Severitymoderate
    References1195656
    Description:

    This update for open-iscsi fixes the following issue:


    Advisory IDSUSE-RU-2022:836-1
    ReleasedTue Mar 15 07:47:48 2022
    SummaryRecommended update for gdb
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for gdb fixes the following issues:


    Advisory IDSUSE-SU-2022:841-1
    ReleasedTue Mar 15 11:31:47 2022
    SummarySecurity update for libqt5-qtbase
    Typesecurity
    Severityimportant
    References1195386,1196501,CVE-2022-23853,CVE-2022-25255
    Description:

    This update for libqt5-qtbase fixes the following issues:


    Advisory IDSUSE-SU-2022:843-1
    ReleasedTue Mar 15 11:33:44 2022
    SummarySecurity update for rust, rust1.58, rust1.59
    Typesecurity
    Severitymoderate
    References1194767,CVE-2022-21658
    Description:

    This update for rust, rust1.58, rust1.59 fixes the following issues:
    This update provides both rust1.58 and rust1.59.
    Changes in rust1.58:


    Version 1.58.0 (2022-01-13) ==========================
    Language -------- Compiler --------
  • [Add LLVM CFI support to the Rust compiler][89652]
  • [Stabilize -Z strip as -C strip][90058]. Note that while release builds already don't add debug symbols for the code you compile, the compiled standard library that ships with Rust includes debug symbols, so you may want to use the `strip` option to remove these symbols to produce smaller release binaries. Note that this release only includes support in rustc, not directly in cargo.
  • [Add support for LLVM coverage mapping format versions 5 and 6][91207]
  • [Emit LLVM optimization remarks when enabled with `-Cremark`][90833]
  • [Update the minimum external LLVM to 12][90175]
  • [Add `x86_64-unknown-none` at Tier 3*][89062]
  • [Build musl dist artifacts with debuginfo enabled][90733]. When building release binaries using musl, you may want to use the newly stabilized strip option to remove these debug symbols, reducing the size of your binaries.
  • [Don't abort compilation after giving a lint error][87337]
  • [Error messages point at the source of trait bound obligations in more places][89580]
  • \* Refer to Rust's [platform support page][platform-support-doc] for more information on Rust's tiered platform support.
    Libraries ---------

    Stabilized APIs ---------------
    These APIs are now usable in const contexts:
  • [`Duration::new`]
  • [`Duration::checked_add`]
  • [`Duration::saturating_add`]
  • [`Duration::checked_sub`]
  • [`Duration::saturating_sub`]
  • [`Duration::checked_mul`]
  • [`Duration::saturating_mul`]
  • [`Duration::checked_div`]
  • [`MaybeUninit::as_ptr`]
  • [`MaybeUninit::as_mut_ptr`]
  • [`MaybeUninit::assume_init`]
  • [`MaybeUninit::assume_init_ref`]

  • Cargo -----

    Rustdoc -------

    Compatibility Notes -------------------

    Version 1.59.0 (2022-02-24) ==========================
    Language --------

    Compiler --------

    Libraries ---------

    Stabilized APIs ---------------
    Const-stable:
  • [`mem::MaybeUninit::as_ptr`][muninit_ptr]
  • [`mem::MaybeUninit::assume_init`][muninit_init]
  • [`mem::MaybeUninit::assume_init_ref`][muninit_init_ref]
  • [`ffi::CStr::from_bytes_with_nul_unchecked`][cstr_from_bytes]

  • Cargo -----

    Compatibility Notes -------------------

    Changes in rust wrapper package:




    Advisory IDSUSE-SU-2022:844-1
    ReleasedTue Mar 15 11:33:57 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1196025,1196784,CVE-2022-25236
    Description:

    This update for expat fixes the following issues:


    Advisory IDSUSE-SU-2022:845-1
    ReleasedTue Mar 15 11:40:52 2022
    SummarySecurity update for chrony
    Typesecurity
    Severitymoderate
    References1099272,1115529,1128846,1162964,1172113,1173277,1174075,1174911,1180689,1181826,1187906,1190926,1194229,CVE-2020-14367
    Description:

    This update for chrony fixes the following issues:
    Chrony was updated to 4.1, bringing features and bugfixes.
    Update to 4.1
    * Add support for NTS servers specified by IP address (matching Subject Alternative Name in server certificate) * Add source-specific configuration of trusted certificates * Allow multiple files and directories with trusted certificates * Allow multiple pairs of server keys and certificates * Add copy option to server/pool directive * Increase PPS lock limit to 40% of pulse interval * Perform source selection immediately after loading dump files * Reload dump files for addresses negotiated by NTS-KE server * Update seccomp filter and add less restrictive level * Restart ongoing name resolution on online command * Fix dump files to not include uncorrected offset * Fix initstepslew to accept time from own NTP clients * Reset NTP address and port when no longer negotiated by NTS-KE server



    Update to 4.0
    - Enhancements
    - Add support for Network Time Security (NTS) authentication - Add support for AES-CMAC keys (AES128, AES256) with Nettle - Add authselectmode directive to control selection of unauthenticated sources - Add binddevice, bindacqdevice, bindcmddevice directives - Add confdir directive to better support fragmented configuration - Add sourcedir directive and 'reload sources' command to support dynamic NTP sources specified in files - Add clockprecision directive - Add dscp directive to set Differentiated Services Code Point (DSCP) - Add -L option to limit log messages by severity - Add -p option to print whole configuration with included files - Add -U option to allow start under non-root user - Allow maxsamples to be set to 1 for faster update with -q/-Q option - Avoid replacing NTP sources with sources that have unreachable address - Improve pools to repeat name resolution to get 'maxsources' sources - Improve source selection with trusted sources - Improve NTP loop test to prevent synchronisation to itself - Repeat iburst when NTP source is switched from offline state to online - Update clock synchronisation status and leap status more frequently - Update seccomp filter - Add 'add pool' command - Add 'reset sources' command to drop all measurements - Add authdata command to print details about NTP authentication - Add selectdata command to print details about source selection - Add -N option and sourcename command to print original names of sources - Add -a option to some commands to print also unresolved sources - Add -k, -p, -r options to clients command to select, limit, reset data
    - Bug fixes
    - Don’t set interface for NTP responses to allow asymmetric routing - Handle RTCs that don’t support interrupts - Respond to command requests with correct address on multihomed hosts - Removed features - Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320) - Drop support for long (non-standard) MACs in NTPv4 packets (chrony 2.x clients using non-MD5/SHA1 keys need to use option 'version 3') - Drop support for line editing with GNU Readline


    Update to 3.5.1:
    * Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)





    Update to 3.5:




    Update to version 3.4
    * Enhancements
    + Add filter option to server/pool/peer directive + Add minsamples and maxsamples options to hwtimestamp directive + Add support for faster frequency adjustments in Linux 4.19 + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd without root privileges to remove it on exit + Disable sub-second polling intervals for distant NTP sources + Extend range of supported sub-second polling intervals + Get/set IPv4 destination/source address of NTP packets on FreeBSD + Make burst options and command useful with short polling intervals + Modify auto_offline option to activate when sending request failed + Respond from interface that received NTP request if possible + Add onoffline command to switch between online and offline state according to current system network configuration + Improve example NetworkManager dispatcher script
    * Bug fixes
    + Avoid waiting in Linux getrandom system call + Fix PPS support on FreeBSD and NetBSD
    Update to version 3.3
    * Enhancements:
    + Add burst option to server/pool directive + Add stratum and tai options to refclock directive + Add support for Nettle crypto library + Add workaround for missing kernel receive timestamps on Linux + Wait for late hardware transmit timestamps + Improve source selection with unreachable sources + Improve protection against replay attacks on symmetric mode + Allow PHC refclock to use socket in /var/run/chrony + Add shutdown command to stop chronyd + Simplify format of response to manual list command + Improve handling of unknown responses in chronyc
    * Bug fixes:
    + Respond to NTPv1 client requests with zero mode + Fix -x option to not require CAP_SYS_TIME under non-root user + Fix acquisitionport directive to work with privilege separation + Fix handling of socket errors on Linux to avoid high CPU usage + Fix chronyc to not get stuck in infinite loop after clock step


    Advisory IDSUSE-RU-2022:846-1
    ReleasedTue Mar 15 11:41:51 2022
    SummaryRecommended update for log4j
    Typerecommended
    Severitymoderate
    References
    Description:


    This update ships log4j 2.17.1 to the SUSE Linux Enterprise Basesystem module. (jsc#SLE-23508)


    Update to 2.17.1.
    Fixed bugs:


    Advisory IDSUSE-SU-2022:847-1
    ReleasedTue Mar 15 13:09:59 2022
    SummarySecurity update for php7
    Typesecurity
    Severityimportant
    References1196252,CVE-2021-21708
    Description:

    This update for php7 fixes the following issues:


    Advisory IDSUSE-RU-2022:849-1
    ReleasedTue Mar 15 13:18:56 2022
    SummaryRecommended update for python-kiwi
    Typerecommended
    Severityimportant
    References1196644
    Description:

    This update for python-kiwi fixes the following issues:


    Advisory IDSUSE-SU-2022:856-1
    ReleasedTue Mar 15 19:31:39 2022
    SummarySecurity update for openssl-1_0_0
    Typesecurity
    Severityimportant
    References1196877,CVE-2022-0778
    Description:

    This update for openssl-1_0_0 fixes the following issues:


    Advisory IDSUSE-RU-2022:861-1
    ReleasedTue Mar 15 23:30:48 2022
    SummaryRecommended update for openssl-1_1
    Typerecommended
    Severitymoderate
    References1182959,1195149,1195792,1195856
    Description:

    This update for openssl-1_1 fixes the following issues:
    openssl-1_1:

    glibc:
    linux-glibc-devel:

    libxcrypt:

    zlib:


    Advisory IDSUSE-RU-2022:862-1
    ReleasedWed Mar 16 05:32:11 2022
    SummaryRecommended update for SAPHanaSR-ScaleOut
    Typerecommended
    Severityimportant
    References1182774,1189532,1189533,1189540
    Description:

    This update for SAPHanaSR-ScaleOut fixes the following issues:


    Advisory IDSUSE-RU-2022:863-1
    ReleasedWed Mar 16 05:32:42 2022
    SummaryRecommended update for sapstartsrv-resource-agents
    Typerecommended
    Severityimportant
    References1189529,1193568
    Description:

    This update for sapstartsrv-resource-agents fixes the following issues:


    Advisory IDSUSE-RU-2022:864-1
    ReleasedWed Mar 16 05:33:13 2022
    SummaryRecommended update for SAPHanaSR
    Typerecommended
    Severityimportant
    References1174557,1181765,1182201,1182545,1182774,1189530,1189531
    Description:

    This update for SAPHanaSR fixes the following issues:


    Advisory IDSUSE-feature-2022:868-1
    ReleasedWed Mar 16 07:16:06 2022
    SummaryFeature update for tcl and tk
    Typefeature
    Severitymoderate
    References1138797,1185662,1195257,903017,CVE-2021-35331
    Description:

    This feature update for tcl and tk fixes the following issues:
    Update tcl and tk to version 8.6.12 (jsc#SLE-21016, jsc#SLE-23284):


    The following fixes might show some potential incompatibilities with existing software:


    Advisory IDSUSE-SU-2022:872-1
    ReleasedWed Mar 16 10:35:02 2022
    SummarySecurity update for stunnel
    Typesecurity
    Severityimportant
    References1181400,1182529
    Description:

    This update for stunnel fixes the following issues:
    Update to 5.62 including new features and bugfixes:
    * Security bugfixes - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529). - Fixed a double free with OpenSSL older than 1.1.0. - Added hardening to systemd service (bsc#1181400). * New features - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options. - Added support for the new SSL_set_options() values. - Added a bash completion script. - New 'sessionResume' service-level option to allow or disallow session resumption - Download fresh ca-certs.pem for each new release. - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers). - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value. - Initial FIPS 3.0 support. - Client-side 'protocol = ldap' support * Bugfixes - Fixed a transfer() loop bug. - Fixed reloading configuration with 'systemctl reload stunnel.service'. - Fixed incorrect messages logged for OpenSSL errors. - Fixed 'redirect' with 'protocol'. This combination is not supported by 'smtp', 'pop3' and 'imap' protocols. - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates. - Fixed a tiny memory leak in configuration file reload error handling. - Fixed engine initialization. - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available. - Fix configuration reload when compression is used - Fix test suite fixed not to require external connectivity


    Advisory IDSUSE-SU-2022:873-1
    ReleasedWed Mar 16 10:36:01 2022
    SummarySecurity update for java-1_8_0-openjdk
    Typesecurity
    Severityimportant
    References1193314,1193444,1193491,1194926,1194928,1194929,1194931,1194932,1194933,1194934,1194935,1194937,1194939,1194940,1194941,1195163,CVE-2022-21248,CVE-2022-21282,CVE-2022-21283,CVE-2022-21293,CVE-2022-21294,CVE-2022-21296,CVE-2022-21299,CVE-2022-21305,CVE-2022-21340,CVE-2022-21341,CVE-2022-21349,CVE-2022-21360,CVE-2022-21365
    Description:

    This update for java-1_8_0-openjdk fixes the following issues:
    Update to version jdk8u322 (icedtea-3.22.0)
    Including the following security fixes:


    Advisory IDSUSE-RU-2022:874-1
    ReleasedWed Mar 16 10:40:52 2022
    SummaryRecommended update for openldap2
    Typerecommended
    Severitymoderate
    References1197004
    Description:

    This update for openldap2 fixes the following issue:


    Advisory IDSUSE-RU-2022:876-1
    ReleasedWed Mar 16 10:51:39 2022
    SummaryRecommended update for xorg-x11-server
    Typerecommended
    Severitymoderate
    References1188970,1196577
    Description:

    This update for xorg-x11-server fixes the following issue:


    Advisory IDSUSE-RU-2022:884-1
    ReleasedThu Mar 17 09:47:43 2022
    SummaryRecommended update for python-jsonschema, python-rfc3987, python-strict-rfc3339
    Typerecommended
    Severitymoderate
    References1082318
    Description:

    This update for python-jsonschema, python-rfc3987, python-strict-rfc3339 fixes the following issues:











    Advisory IDSUSE-OU-2022:885-1
    ReleasedThu Mar 17 09:47:48 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-SU-2022:886-1
    ReleasedThu Mar 17 10:06:43 2022
    SummarySecurity update for libreoffice
    Typesecurity
    Severitymoderate
    References1196456,CVE-2021-25636
    Description:

    This update for libreoffice fixes the following issues:
    Update to version 7.2.5.1 (jsc#SLE-18214):


    Advisory IDSUSE-RU-2022:888-1
    ReleasedThu Mar 17 10:56:42 2022
    SummaryRecommended update for avahi
    Typerecommended
    Severitymoderate
    References1179060,1194561,1195614,1196282
    Description:

    This update for avahi fixes the following issues:


    Advisory IDSUSE-RU-2022:889-1
    ReleasedThu Mar 17 10:57:36 2022
    SummaryRecommended update for postgresql10
    Typerecommended
    Severitymoderate
    References1190740,1195680
    Description:

    This update for postgresql10 fixes the following issues:
    Upgrade to version 10.20 (bsc#1195680):


    Advisory IDSUSE-RU-2022:892-1
    ReleasedThu Mar 17 11:14:50 2022
    SummaryRecommended update for libyui
    Typerecommended
    Severitylow
    References1195114
    Description:

    This update for libyui fixes the following issue:


    Advisory IDSUSE-RU-2022:893-1
    ReleasedThu Mar 17 13:17:55 2022
    SummaryRecommended update for postgresql13
    Typerecommended
    Severitymoderate
    References1190740,1195680
    Description:

    This update for postgresql13 fixes the following issues:


    Advisory IDSUSE-RU-2022:898-1
    ReleasedFri Mar 18 09:34:38 2022
    SummaryRecommended update for lifecycle-data-sle-module-live-patching
    Typerecommended
    Severitymoderate
    References1020320
    Description:

    This update for lifecycle-data-sle-module-live-patching fixes the following issues:


    Advisory IDSUSE-RU-2022:899-1
    ReleasedFri Mar 18 09:34:51 2022
    SummaryRecommended update for smartmontools
    Typerecommended
    Severitymoderate
    References1195785
    Description:

    This update for smartmontools fixes the following issues:





    Advisory IDSUSE-SU-2022:901-1
    ReleasedFri Mar 18 12:02:00 2022
    SummarySecurity update for frr
    Typesecurity
    Severityimportant
    References1180217,1196503,1196504,1196505,1196506,1196507,CVE-2022-26125,CVE-2022-26126,CVE-2022-26127,CVE-2022-26128,CVE-2022-26129
    Description:

    This update for frr fixes the following issues:


    Advisory IDSUSE-OU-2022:902-1
    ReleasedFri Mar 18 15:28:03 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-RU-2022:904-1
    ReleasedFri Mar 18 20:09:48 2022
    SummaryRecommended update for go1.18
    Typerecommended
    Severitymoderate
    References1193742
    Description:

    This update for go1.18 fixes the following issues: go1.18 (released 2022-03-15) is a major release of Go. (boo#1193742)
    go1.18.x minor releases will be provided through February 2023, please see: https://github.com/golang/go/wiki/Go-Release-Cycle
    Go 1.18 is a significant release, including changes to the language, implementation of the toolchain, runtime, and libraries. Go 1.18 arrives seven months after Go 1.17. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before.


    Excerpts relevant to OBS environment and for SUSE/openSUSE follow:


    Advisory IDSUSE-RU-2022:905-1
    ReleasedMon Mar 21 08:46:09 2022
    SummaryRecommended update for util-linux
    Typerecommended
    Severityimportant
    References1172427,1194642
    Description:

    This update for util-linux fixes the following issues:


    Advisory IDSUSE-SU-2022:906-1
    ReleasedMon Mar 21 09:47:11 2022
    SummarySecurity update for MozillaThunderbird
    Typesecurity
    Severityimportant
    References1196900,CVE-2022-26381,CVE-2022-26383,CVE-2022-26384,CVE-2022-26386,CVE-2022-26387
    Description:

    This update for MozillaThunderbird fixes the following issues:
    Updated to version 91.7 (bsc#1196900): - CVE-2022-26381: Fixed an invalid memory access due to text reflow when SVG objects were present. - CVE-2022-26383: Fixed an issue where, when resizing a popup after requesting fullscreen access, the popup would not display the fullscreen notification. - CVE-2022-26384: Fixed an iframe XSS sandbox bypass when allow-popups was used on the iframe. - CVE-2022-26386: Fixed an issue where downloadable temporary files were accessible to other local users. - CVE-2022-26387: Fixed a potential add-on signature verification bypass due to a race condition.


    Advisory IDSUSE-feature-2022:911-1
    ReleasedMon Mar 21 13:00:39 2022
    SummaryFeature update for libbluray
    Typefeature
    Severitymoderate
    References
    Description:

    This feature update for libbluray fixes the following issues:
    Update to version 1.3.0 (jsc#SLE-23838):


    Advisory IDSUSE-SU-2022:915-1
    ReleasedMon Mar 21 16:50:43 2022
    SummarySecurity update for lapack
    Typesecurity
    Severitymoderate
    References1193562,CVE-2021-4048
    Description:

    This update for lapack fixes the following issues:


    Advisory IDSUSE-SU-2022:930-1
    ReleasedTue Mar 22 09:22:44 2022
    SummarySecurity update for qemu
    Typesecurity
    Severityimportant
    References1178049,1192525,1193364,1193545,1194938,1195161,1196087,1196737,CVE-2021-3930,CVE-2022-0358
    Description:

    This update for qemu fixes the following issues:


    Non-security fixes:


    Advisory IDSUSE-RU-2022:936-1
    ReleasedTue Mar 22 18:10:17 2022
    SummaryRecommended update for filesystem and systemd-rpm-macros
    Typerecommended
    Severitymoderate
    References1196275,1196406
    Description:

    This update for filesystem and systemd-rpm-macros fixes the following issues:
    filesystem:


    systemd-rpm-macros:


    Advisory IDSUSE-SU-2022:940-1
    ReleasedWed Mar 23 10:41:16 2022
    SummarySecurity update for xen
    Typesecurity
    Severityimportant
    References1027519,1191668,1194267,1196915,CVE-2021-26401,CVE-2022-0001,CVE-2022-0002
    Description:

    This update for xen fixes the following issues:
    Update Xen to version 4.14.4 (bsc#1027519)
    Transient execution side-channel attacks attacking the Branch History Buffer (BHB), named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.
    Security issues fixed:


    Non-security issues fixed:


    Advisory IDSUSE-SU-2022:942-1
    ReleasedThu Mar 24 10:30:15 2022
    SummarySecurity update for python3
    Typesecurity
    Severitymoderate
    References1186819,CVE-2021-3572
    Description:

    This update for python3 fixes the following issues:


    Advisory IDSUSE-SU-2022:943-1
    ReleasedThu Mar 24 12:52:54 2022
    SummarySecurity update for slirp4netns
    Typesecurity
    Severitymoderate
    References1179467,CVE-2020-29130
    Description:

    This update for slirp4netns fixes the following issues:


    Advisory IDSUSE-SU-2022:944-1
    ReleasedThu Mar 24 12:53:09 2022
    SummarySecurity update for libarchive
    Typesecurity
    Severitymoderate
    References1022528,1188572,1189528,CVE-2017-5601,CVE-2021-36976
    Description:

    This update for libarchive fixes the following issues:


    Non-security updates:


    Advisory IDSUSE-SU-2022:945-1
    ReleasedThu Mar 24 12:53:37 2022
    SummarySecurity update for bind
    Typesecurity
    Severityimportant
    References1197135,CVE-2021-25220
    Description:

    This update for bind fixes the following issues:


    Advisory IDSUSE-RU-2022:947-1
    ReleasedThu Mar 24 18:49:41 2022
    SummaryRecommended update for dapl
    Typerecommended
    Severitymoderate
    References1047218
    Description:

    This update for dapl fixes the following issues:


    Advisory IDSUSE-RU-2022:948-1
    ReleasedFri Mar 25 12:46:42 2022
    SummaryRecommended update for sudo
    Typerecommended
    Severitymoderate
    References1193446
    Description:

    This update for sudo fixes the following issues:


    Advisory IDSUSE-feature-2022:950-1
    ReleasedFri Mar 25 12:47:04 2022
    SummaryFeature update for lifecycle-data-sle-module-development-tools
    Typefeature
    Severitymoderate
    References
    Description:

    This feature update for lifecycle-data-sle-module-development-tools fixes the following issues:


    Advisory IDSUSE-RU-2022:952-1
    ReleasedFri Mar 25 15:27:53 2022
    SummaryRecommended update for rpmlint
    Typerecommended
    Severitymoderate
    References1178848,1194799,1196149
    Description:

    This update for rpmlint fixes the following issues:


    Advisory IDSUSE-SU-2022:953-1
    ReleasedMon Mar 28 09:21:37 2022
    SummarySecurity update for perl-DBD-SQLite
    Typesecurity
    Severitymoderate
    References1195771
    Description:

    This update for perl-DBD-SQLite fixes the following issues:


    Advisory IDSUSE-SU-2022:954-1
    ReleasedMon Mar 28 09:21:52 2022
    SummarySecurity update for wavpack
    Typesecurity
    Severitymoderate
    References1197020,CVE-2021-44269
    Description:

    This update for wavpack fixes the following issues:


    Advisory IDSUSE-RU-2022:957-1
    ReleasedMon Mar 28 12:01:45 2022
    SummaryRecommended update for trilinos
    Typerecommended
    Severitymoderate
    References1194648
    Description:

    This update for trilinos fixes the following issues:


    Advisory IDSUSE-RU-2022:1021-1
    ReleasedTue Mar 29 13:24:21 2022
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1195899
    Description:

    This update for systemd fixes the following issues:


    Advisory IDSUSE-SU-2022:1027-1
    ReleasedTue Mar 29 15:41:51 2022
    SummarySecurity update for java-1_8_0-ibm
    Typesecurity
    Severityimportant
    References1194925,1194926,1194927,1194928,1194929,1194930,1194931,1194932,1194933,1194934,1194935,1194937,1194939,1194940,1194941,1195146,1196500,1197126,CVE-2022-21248,CVE-2022-21271,CVE-2022-21277,CVE-2022-21282,CVE-2022-21283,CVE-2022-21291,CVE-2022-21293,CVE-2022-21294,CVE-2022-21296,CVE-2022-21299,CVE-2022-21305,CVE-2022-21340,CVE-2022-21341,CVE-2022-21349,CVE-2022-21360,CVE-2022-21365,CVE-2022-21366
    Description:

    This update for java-1_8_0-ibm fixes the following issues:
    Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).
    Including fixes for the following vulnerabilities:
    CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349, CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277, CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294, CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248, CVE-2022-21271.
    Non-securtiy fix:


    Advisory IDSUSE-RU-2022:1028-1
    ReleasedTue Mar 29 16:37:33 2022
    SummaryRecommended update for chrony
    Typerecommended
    Severitymoderate
    References1194220
    Description:

    This update for chrony fixes the following issues:


    Advisory IDSUSE-SU-2022:1029-1
    ReleasedTue Mar 29 17:29:05 2022
    SummarySecurity update for openvpn
    Typesecurity
    Severityimportant
    References1197341,CVE-2022-0547
    Description:

    This update for openvpn fixes the following issues:


    Advisory IDSUSE-SU-2022:1031-1
    ReleasedTue Mar 29 17:34:36 2022
    SummarySecurity update for apache2
    Typesecurity
    Severityimportant
    References1197091,1197095,1197096,1197098,CVE-2022-22719,CVE-2022-22720,CVE-2022-22721,CVE-2022-23943
    Description:

    This update for apache2 fixes the following issues:


    Advisory IDSUSE-RU-2022:1033-1
    ReleasedTue Mar 29 18:42:05 2022
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for java-11-openjdk fixes the following issues:


    Advisory IDSUSE-SU-2022:1037-1
    ReleasedWed Mar 30 09:36:58 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1176447,1176774,1178134,1179439,1181147,1191428,1192273,1193731,1193787,1193864,1194463,1194516,1195211,1195254,1195403,1195612,1195897,1195905,1195939,1195949,1195987,1196079,1196095,1196132,1196155,1196299,1196301,1196433,1196468,1196472,1196627,1196723,1196779,1196830,1196836,1196866,1196868,CVE-2021-0920,CVE-2021-39657,CVE-2021-44879,CVE-2022-0487,CVE-2022-0617,CVE-2022-0644,CVE-2022-24448,CVE-2022-24958,CVE-2022-24959,CVE-2022-25258,CVE-2022-25636,CVE-2022-26490
    Description:

    The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:1039-1
    ReleasedWed Mar 30 09:38:11 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1176447,1176774,1178134,1179439,1181147,1191428,1192273,1193731,1193787,1193864,1194463,1194516,1194943,1195051,1195211,1195254,1195353,1195403,1195612,1195897,1195905,1195939,1195949,1195987,1196079,1196095,1196130,1196132,1196155,1196299,1196301,1196433,1196468,1196472,1196488,1196627,1196723,1196779,1196830,1196836,1196866,1196868,1196956,1196959,CVE-2021-0920,CVE-2021-39657,CVE-2021-39698,CVE-2021-44879,CVE-2021-45402,CVE-2022-0487,CVE-2022-0617,CVE-2022-0644,CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042,CVE-2022-24448,CVE-2022-24958,CVE-2022-24959,CVE-2022-25258,CVE-2022-25636,CVE-2022-26490,CVE-2022-26966
    Description:

    The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:1040-1
    ReleasedWed Mar 30 09:40:58 2022
    SummarySecurity update for protobuf
    Typesecurity
    Severitymoderate
    References1195258,CVE-2021-22570
    Description:

    This update for protobuf fixes the following issues:


    Advisory IDSUSE-RU-2022:1046-1
    ReleasedWed Mar 30 15:37:00 2022
    SummaryRecommended update for firewalld
    Typerecommended
    Severitymoderate
    References1191837
    Description:

    This update for firewalld fixes the following issues:


    Advisory IDSUSE-RU-2022:1047-1
    ReleasedWed Mar 30 16:20:56 2022
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1196093,1197024
    Description:

    This update for pam fixes the following issues:


    Advisory IDSUSE-SU-2022:1050-1
    ReleasedWed Mar 30 16:30:04 2022
    SummarySecurity update for SUSE Manager 4.2.5.1 Release Notes
    Typesecurity
    Severityimportant
    References1197417,CVE-2022-22934,CVE-2022-22935,CVE-2022-22936,CVE-2022-22941
    Description:

    This update for SUSE Manager 4.2.5.1 Release Notes provides the following additions:
    Release notes for SUSE Manager:


    Advisory IDSUSE-SU-2022:1059-1
    ReleasedWed Mar 30 17:32:55 2022
    SummarySecurity update for salt
    Typesecurity
    Severityimportant
    References1197417,CVE-2022-22934,CVE-2022-22935,CVE-2022-22936,CVE-2022-22941
    Description:

    This update for salt fixes the following issues:


    Advisory IDSUSE-SU-2022:1061-1
    ReleasedWed Mar 30 18:27:06 2022
    SummarySecurity update for zlib
    Typesecurity
    Severityimportant
    References1197459,CVE-2018-25032
    Description:

    This update for zlib fixes the following issues:


    Advisory IDSUSE-SU-2022:1064-1
    ReleasedThu Mar 31 09:58:08 2022
    SummarySecurity update for python2-numpy
    Typesecurity
    Severitymoderate
    References1193907,1193911,1193913,CVE-2021-33430,CVE-2021-41495,CVE-2021-41496
    Description:

    This update for python2-numpy fixes the following issues:


    Advisory IDSUSE-SU-2022:1065-1
    ReleasedThu Mar 31 12:06:14 2022
    SummarySecurity update for kernel-firmware
    Typesecurity
    Severityimportant
    References1186938,1188662,1192953,1195786,1196333,CVE-2021-0066,CVE-2021-0071,CVE-2021-0072,CVE-2021-0076,CVE-2021-0161,CVE-2021-0164,CVE-2021-0165,CVE-2021-0166,CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,CVE-2021-0174,CVE-2021-0175,CVE-2021-0176,CVE-2021-0183,CVE-2021-33139,CVE-2021-33155
    Description:

    This update for kernel-firmware fixes the following issues:
    Update Intel Wireless firmware for 9xxx (INTEL-SA-00539, bsc#1196333):
    CVE-2021-0161: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0164: Improper access control in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0165: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0066: Improper input validation in firmware for Intel PROSet/Wireless Wi-Fi and Killer Wi-Fi may allow an unauthenticated user to potentially enable escalation of privilege via local access. CVE-2021-0166: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0168: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable escalation of privilege via local access. CVE-2021-0170: Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an authenticated user to potentially enable information disclosure via local access. CVE-2021-0172: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0173: Improper Validation of Consistency within input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0174: Improper Use of Validation Framework in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0175: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0076: Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0176: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable denial of service via local access. CVE-2021-0183: Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow an unauthenticated user to potentially enable denial of service via adjacent access. CVE-2021-0072: Improper input validation in firmware for some Intel PROSet/Wireless Wi-Fi and some Killer Wi-Fi may allow a privileged user to potentially enable information disclosure via local access. CVE-2021-0071: Improper input validation in firmware for some Intel PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

    Update Intel Bluetooth firmware (INTEL-SA-00604,bsc#1195786):



    Bug fixes:


    Advisory IDSUSE-RU-2022:1066-1
    ReleasedThu Mar 31 12:16:09 2022
    SummaryRecommended update for mlocate
    Typerecommended
    Severityimportant
    References1195144
    Description:

    This update for mlocate fixes the following issues:


    Advisory IDSUSE-RU-2022:1070-1
    ReleasedFri Apr 1 10:52:52 2022
    SummaryRecommended update for release-notes-sles
    Typerecommended
    Severitylow
    References933411
    Description:

    This update for release-notes-sles fixes the following issues:
    Update the release notes to version 15.3.20220324. (bsc#933411)


    Advisory IDSUSE-SU-2022:1073-1
    ReleasedFri Apr 1 11:45:01 2022
    SummarySecurity update for yaml-cpp
    Typesecurity
    Severitymoderate
    References1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
    Description:

    This update for yaml-cpp fixes the following issues:


    Advisory IDSUSE-RU-2022:1074-1
    ReleasedFri Apr 1 13:27:00 2022
    SummaryRecommended update for cloud-init
    Typerecommended
    Severitymoderate
    References1193531
    Description:

    This update for cloud-init contains the following fixes:




    Advisory IDSUSE-SU-2022:1091-1
    ReleasedFri Apr 1 16:59:21 2022
    SummarySecurity update for python
    Typesecurity
    Severitymoderate
    References1175619,1186819,1194146,1195396,CVE-2021-3572,CVE-2021-4189,CVE-2022-0391
    Description:

    This update for python fixes the following issues:


    Advisory IDSUSE-RU-2022:1092-1
    ReleasedFri Apr 1 17:24:58 2022
    SummaryRecommended update for cloud-regionsrv-client
    Typerecommended
    Severitycritical
    References1195414,1195564,1197113
    Description:

    This update for cloud-regionsrv-client fixes the following issues:



    Advisory IDSUSE-RU-2022:1095-1
    ReleasedMon Apr 4 10:44:43 2022
    SummaryRecommended update for sssd
    Typerecommended
    Severitymoderate
    References1190775,1196564
    Description:

    This update for sssd fixes the following issues:


    Advisory IDSUSE-RU-2022:1097-1
    ReleasedMon Apr 4 10:45:38 2022
    SummaryRecommended update for xorg-x11-server
    Typerecommended
    Severitymoderate
    References1197045,1197046,1197269
    Description:

    This update for xorg-x11-server fixes the following issues:


    Advisory IDSUSE-RU-2022:1098-1
    ReleasedMon Apr 4 12:51:35 2022
    SummaryRecommended update for davfs2
    Typerecommended
    Severitymoderate
    References1188967,1193733,1194537
    Description:

    This update for davfs2 fixes the following issues:


    Advisory IDSUSE-RU-2022:1099-1
    ReleasedMon Apr 4 12:53:05 2022
    SummaryRecommended update for aaa_base
    Typerecommended
    Severitymoderate
    References1194883
    Description:

    This update for aaa_base fixes the following issues:


    Advisory IDSUSE-SU-2022:1100-1
    ReleasedMon Apr 4 13:00:05 2022
    SummarySecurity update for 389-ds
    Typesecurity
    Severityimportant
    References1194068,1194084,1197275,1197345,CVE-2022-0918,CVE-2022-0996
    Description:

    This update for 389-ds fixes the following issues:


    Advisory IDSUSE-RU-2022:1107-1
    ReleasedMon Apr 4 17:49:17 2022
    SummaryRecommended update for util-linux
    Typerecommended
    Severitymoderate
    References1194642
    Description:

    This update for util-linux fixes the following issue:


    Advisory IDSUSE-feature-2022:1115-1
    ReleasedTue Apr 5 18:31:13 2022
    SummaryFeature update for alsa-oss
    Typefeature
    Severitymoderate
    References1181571
    Description:

    This feature update for alsa-oss provides the following changes:
    Update from version 1.0.28 to version 1.1.8 (bsc#1181571)


    Advisory IDSUSE-OU-2022:1116-1
    ReleasedTue Apr 5 18:31:34 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-RU-2022:1118-1
    ReleasedTue Apr 5 18:34:06 2022
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:


    Advisory IDSUSE-RU-2022:1119-1
    ReleasedWed Apr 6 09:16:06 2022
    SummaryRecommended update for supportutils
    Typerecommended
    Severitymoderate
    References1189028,1190315,1190943,1191096,1191794,1193204,1193732,1193868,1195797
    Description:

    This update for supportutils fixes the following issues:


    Advisory IDSUSE-RU-2022:1124-1
    ReleasedWed Apr 6 13:07:05 2022
    SummaryRecommended update for compat-libpthread-nonshared
    Typerecommended
    Severitylow
    References1197272
    Description:

    This update for compat-libpthread-nonshared fixes the following issues:


    Advisory IDSUSE-RU-2022:1126-1
    ReleasedThu Apr 7 14:05:02 2022
    SummaryRecommended update for nfs-utils
    Typerecommended
    Severitymoderate
    References1197297,1197788
    Description:

    This update for nfs-utils fixes the following issues:


    Advisory IDSUSE-SU-2022:1127-1
    ReleasedThu Apr 7 17:03:49 2022
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1197698,1197903,CVE-2022-1097,CVE-2022-1196,CVE-2022-24713,CVE-2022-28281,CVE-2022-28282,CVE-2022-28285,CVE-2022-28286,CVE-2022-28289
    Description:

    This update for MozillaFirefox fixes the following issues:
    Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):
    MFSA 2022-14 (bsc#1197903)


    The following non-security bugs were fixed:


    Advisory IDSUSE-RU-2022:1132-1
    ReleasedFri Apr 8 13:11:16 2022
    SummaryRecommended update for kdump
    Typerecommended
    Severitymoderate
    References1189923,1197069
    Description:

    This update for kdump fixes the following issues:


    Advisory IDSUSE-OU-2022:1134-1
    ReleasedFri Apr 8 13:11:34 2022
    SummaryOptional update for SUSE Package Hub
    Typeoptional
    Severitymoderate
    References
    Description:

    This optional update provides the following changes:


    Advisory IDSUSE-RU-2022:1138-1
    ReleasedFri Apr 8 13:46:18 2022
    SummaryRecommended update for gnome-shell
    Typerecommended
    Severitymoderate
    References1185944,1187571,1190745,1196708
    Description:

    This update for gnome-shell fixes the following issues:


    Advisory IDSUSE-RU-2022:1143-1
    ReleasedMon Apr 11 13:01:09 2022
    SummaryRecommended update for libxkbcommon
    Typerecommended
    Severitymoderate
    References1184688
    Description:


    This update for libxkbcommon fixes the following issues:


    * `xkbcli list` was changed to output YAML instead of a custom format. * Fix segmentation fault in case-insensitive `xkb_keysym_from_name` for certain values like the empty string.

    * Fix `xkb_x11_keymap_new_from_device()` failing when the keymap contains key types with missing level names, like the one used by the `numpad:mac` option in xkeyboard-config. (Regressed in 1.2.0.)

    * `xkb_x11_keymap_new_from_device()` is much faster. It now performs only 2 roundtrips to the X server, instead of dozens (in first-time calls). * Case-sensitive `xkb_keysym_from_name()` is much faster. * Keysym names of the form `0x12AB` and `U12AB` are parsed more strictly. * Compose files now have a size limit (65535 internal nodes). * Compose table loading (`xkb_compose_table_new_from_locale()` and similar) is much faster.

    * Update keysym definitions to latest xorgproto. In particular, this adds many special keysyms corresponding to Linux evdev keycodes. * New XKB_KEY_* definitions.

    * Fix (hopefully) a segfault in xkb_x11_keymap_new_from_device() in some unclear situation (bug introduced in 1.0.2). * Fix keymaps created with xkb_x11_keymap_new_from_device() do not have level names (bug introduced in 0.8.0).

    * Fix a bug where a keysym that cannot be resolved in a keymap gets compiled to a garbage keysym. Now it is set to XKB_KEY_NoSymbol instead. * Improve the speed of xkb_x11_keymap_new_from_device() on repeated calls in the same xkb_context().

    * Make the table output of `xkbcli how-to-type` aligned.

    * Now it is possible to add custom layouts and options at the system (/etc) and user (~/.config) level, at least when libxkbcommon is in use. * libxkbregistry is a C library that lists available XKB models, layouts and variants for a given ruleset. This is a separate library (.so/.pc files) and aimed at tools that provide a listing of available keyboard layouts to the user. * Add an `xkbcli` command-line utility.

    * Fix quadratic complexity in the XKB file parser. * Add $XDG_CONFIG_HOME/xkb to the default search path. If $XDG_CONFIG_HOME is not set, $HOME/.config/xkb is used. If $HOME is not set, the path is not added. The XDG path is looked up before the existing default search path $HOME/.xkb. * Add support for include statements in XKB rules files. * Fix bug where the merge mode only applied to the first vmod in a 'virtual_modifiers' statement. * Reject interpret modifier predicate with more than one value. * Correctly handle capitalization of the ssharp keysym.

    * Fix context creation failing when run in privileged processes as defined by `secure_getenv(3)`, e.g. GDM.

    * Move ~/.xkb to before XKB_CONFIG_ROOT. This enables the user to have full control of the keymap definitions, instead of only augmenting them.

    * New APIs: XKB_KEY_XF86MonBrightnessCycle, XKB_KEY_XF86RotationLockToggle.


    Advisory IDSUSE-feature-2022:1144-1
    ReleasedMon Apr 11 14:38:40 2022
    SummaryFeature update for yast2
    Typefeature
    Severityimportant
    References1177863,1190228,1194895,1195059,1195910,1196061,1196120,1196431,1196566,1196590,1196594,1196614,1197265
    Description:

    This feature update for yast2, yast2-country, yast2-installation, autoyast2, yast2-audit-laf, yast2-fcoe-client, yast2-schema fixes the following issues:
    autoyst2:


    yast2:

    yast2-audit-laf:
    yast2-country:

    yast2-fcoe-client:

    yast2-installation:

    yast2-packager:

    yast2-schema:
    -Added fcoe-client schema (bsc#1194895)


    Advisory IDSUSE-RU-2022:1145-1
    ReleasedMon Apr 11 14:59:54 2022
    SummaryRecommended update for tcmu-runner
    Typerecommended
    Severitymoderate
    References1196787
    Description:

    This update for tcmu-runner fixes the following issues:


    Advisory IDSUSE-RU-2022:1146-1
    ReleasedMon Apr 11 15:40:25 2022
    SummaryRecommended update for reload4j
    Typerecommended
    Severitymoderate
    References1197642
    Description:

    This update for reload4j fixes the following issues:
    This update provides reload4j 1.2.19, a upstream supported drop-in replace of log4j 1.2.x, which is declared EOL upstream.
    Additional changes:


    Advisory IDSUSE-RU-2022:1147-1
    ReleasedMon Apr 11 15:49:43 2022
    SummaryRecommended update for containerd
    Typerecommended
    Severitymoderate
    References1195784
    Description:


    This update of containerd fixes the following issue:


    Advisory IDSUSE-SU-2022:1148-1
    ReleasedMon Apr 11 15:55:14 2022
    SummarySecurity update for libexif
    Typesecurity
    Severityimportant
    References1172768,1172802,1178479,CVE-2020-0181,CVE-2020-0198,CVE-2020-0452
    Description:

    This update for libexif fixes the following issues:


    Advisory IDSUSE-SU-2022:1149-1
    ReleasedMon Apr 11 16:29:14 2022
    SummarySecurity update for mozilla-nss
    Typesecurity
    Severityimportant
    References1197903,CVE-2022-1097
    Description:

    This update for mozilla-nss fixes the following issues:
    Mozilla NSS 3.68.3 (bsc#1197903): - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use.


    Advisory IDSUSE-RU-2022:1150-1
    ReleasedMon Apr 11 17:34:19 2022
    SummaryRecommended update for suse-build-key
    Typerecommended
    Severitymoderate
    References1197293
    Description:

    This update for suse-build-key fixes the following issues:
    No longer install 1024bit keys by default. (bsc#1197293)


    Advisory IDSUSE-RU-2022:1155-1
    ReleasedTue Apr 12 06:18:52 2022
    SummaryRecommended update for fence-agents
    Typerecommended
    Severitymoderate
    References1196350
    Description:

    This update for fence-agents fixes the following issues:


    Advisory IDSUSE-SU-2022:1156-1
    ReleasedTue Apr 12 09:55:07 2022
    SummarySecurity update for opensc
    Typesecurity
    Severityimportant
    References1114649,1191957,1191992,1192000,1192005,CVE-2021-42779,CVE-2021-42780,CVE-2021-42781,CVE-2021-42782
    Description:

    This update for opensc fixes the following issues:
    Security issues fixed:


    Non-security issues fixed:


    Advisory IDSUSE-SU-2022:1157-1
    ReleasedTue Apr 12 13:26:19 2022
    SummarySecurity update for libsolv, libzypp, zypper
    Typesecurity
    Severityimportant
    References1184501,1194848,1195999,1196061,1196317,1196368,1196514,1196925,1197134
    Description:

    This update for libsolv, libzypp, zypper fixes the following issues:
    Security relevant fix:


    libsolv update to 0.7.22:

    libzypp update to 17.30.0:

    zypper update to 1.14.52:


    Advisory IDSUSE-SU-2022:1158-1
    ReleasedTue Apr 12 14:44:43 2022
    SummarySecurity update for xz
    Typesecurity
    Severityimportant
    References1198062,CVE-2022-1271
    Description:

    This update for xz fixes the following issues:


    Advisory IDSUSE-SU-2022:1162-1
    ReleasedTue Apr 12 14:58:20 2022
    SummarySecurity update for subversion
    Typesecurity
    Severityimportant
    References1197939,1197940,CVE-2021-28544,CVE-2022-24070
    Description:

    This update for subversion fixes the following issues:


    Advisory IDSUSE-SU-2022:1163-1
    ReleasedTue Apr 12 14:59:52 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1065729,1156395,1175667,1177028,1178134,1179639,1180153,1189562,1194589,1194625,1194649,1194943,1195051,1195353,1195640,1195926,1196018,1196130,1196196,1196478,1196488,1196761,1196823,1196956,1197227,1197243,1197245,1197300,1197302,1197331,1197343,1197366,1197389,1197460,1197462,1197501,1197534,1197661,1197675,1197677,1197702,1197811,1197812,1197815,1197817,1197819,1197820,1197888,1197889,1197894,1198027,1198028,1198029,1198030,1198031,1198032,1198033,1198077,CVE-2021-39698,CVE-2021-45402,CVE-2021-45868,CVE-2022-0850,CVE-2022-0854,CVE-2022-1011,CVE-2022-1016,CVE-2022-1048,CVE-2022-1055,CVE-2022-1195,CVE-2022-1198,CVE-2022-1199,CVE-2022-1205,CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042,CVE-2022-27223,CVE-2022-27666,CVE-2022-28388,CVE-2022-28389,CVE-2022-28390
    Description:

    The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.

    The following security bugs were fixed:



    The following non-security bugs were fixed:


    Advisory IDSUSE-SU-2022:1164-1
    ReleasedTue Apr 12 15:03:24 2022
    SummarySecurity update for go1.16
    Typesecurity
    Severityimportant
    References1182345,1183043,1196732,CVE-2022-24921
    Description:

    This update for go1.16 fixes the following issues:
    Update to version 1.16.15 (bsc#1182345): - CVE-2022-24921: Fixed a potential denial of service via large regular expressions (bsc#1196732).
    Non-security fixes: - Fixed an issue with v2 modules (go#51331). - Fixed an issue when building source in riscv64 (go#51198). - Increased compatibility for the DNS protocol in the net module (go#51161). - Fixed an issue with histograms in the runtime/metrics module (go#50733).


    Advisory IDSUSE-RU-2022:1166-1
    ReleasedTue Apr 12 16:18:25 2022
    Summary Recommended update for cloud-regionsrv-client
    Typerecommended
    Severityimportant
    References
    Description:

    Recommended update for cloud-regionsrv-client contains the following fix:
    cloud-regionsrv-client: Shipping cloud-regionsrv-client-addon-azure to unrestricted channels. (#MSC-282)


    Advisory IDSUSE-SU-2022:1167-1
    ReleasedTue Apr 12 17:51:47 2022
    SummarySecurity update for go1.17
    Typesecurity
    Severityimportant
    References1183043,1190649,1196732,CVE-2022-24921
    Description:

    This update for go1.17 fixes the following issues:
    Update to version 1.17.8 (bsc#1190649): - CVE-2022-24921: Fixed a potential denial of service via large regular expressions (bsc#1196732).
    Non-security fixes: - Fixed an issue with v2 modules (go#51332). - Fixed an issue when building source in riscv64 (go#51199). - Increased compatibility for the DNS protocol in the net module (go#51162). - Fixed an issue with histograms in the runtime/metrics module (go#50734). - Fixed an issue when parsing x509 certificates (go#51000).


    Advisory IDSUSE-RU-2022:1170-1
    ReleasedTue Apr 12 18:20:07 2022
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1191502,1193086,1195247,1195529,1195899,1196567
    Description:

    This update for systemd fixes the following issues:


    Advisory IDSUSE-RU-2022:1175-1
    ReleasedWed Apr 13 10:40:30 2022
    SummaryRecommended update for crmsh
    Typerecommended
    Severitymoderate
    References1196726,1197351
    Description:

    This update for crmsh fixes the following issues:


    Advisory IDSUSE-SU-2022:1176-1
    ReleasedWed Apr 13 12:15:44 2022
    SummarySecurity update for MozillaThunderbird
    Typesecurity
    Severityimportant
    References1197903,CVE-2022-1097,CVE-2022-1196,CVE-2022-1197,CVE-2022-24713,CVE-2022-28281,CVE-2022-28282,CVE-2022-28285,CVE-2022-28286,CVE-2022-28289
    Description:

    This update for MozillaThunderbird fixes the following issues:


    Non-security fixes:


    Advisory IDSUSE-RU-2022:1179-1
    ReleasedWed Apr 13 15:47:16 2022
    SummaryRecommended update for net-snmp
    Typerecommended
    Severitymoderate
    References1196955
    Description:

    This update for net-snmp fixes the following issues:


    Advisory IDSUSE-SU-2022:1183-1
    ReleasedWed Apr 13 16:58:27 2022
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1065729,1156395,1175667,1177028,1178134,1179639,1180153,1189562,1194649,1195640,1195926,1196018,1196196,1196478,1196761,1196823,1197227,1197243,1197300,1197302,1197331,1197343,1197366,1197389,1197462,1197501,1197534,1197661,1197675,1197702,1197811,1197812,1197815,1197817,1197819,1197820,1197888,1197889,1197894,1197914,1198027,1198028,1198029,1198030,1198031,1198032,1198033,CVE-2021-45868,CVE-2022-0850,CVE-2022-0854,CVE-2022-1011,CVE-2022-1016,CVE-2022-1048,CVE-2022-1055,CVE-2022-1195,CVE-2022-1198,CVE-2022-1199,CVE-2022-1205,CVE-2022-27666,CVE-2022-28388,CVE-2022-28389,CVE-2022-28390
    Description:


    The SUSE Linux Enterprise 15 SP3 kernel was updated.
    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-RU-2022:1190-1
    ReleasedWed Apr 13 20:52:23 2022
    SummaryRecommended update for cloud-init
    Typerecommended
    Severityimportant
    References1192343
    Description:

    This update for cloud-init contains the following fixes:



    + Still need to consider the 'network' configuration option


    Advisory IDSUSE-RU-2022:1200-1
    ReleasedThu Apr 14 11:33:22 2022
    SummaryRecommended update for ClusterTools2
    Typerecommended
    Severitymoderate
    References1188456,1188652
    Description:

    This update for ClusterTools2 fixes the following issues:


    Advisory IDSUSE-RU-2022:1201-1
    ReleasedThu Apr 14 11:40:33 2022
    SummaryRecommended update for grub2
    Typerecommended
    Severitymoderate
    References1179981,1191974,1192622,1195204
    Description:

    This update for grub2 fixes the following issues:


    Advisory IDSUSE-RU-2022:1203-1
    ReleasedThu Apr 14 11:43:28 2022
    SummaryRecommended update for lvm2
    Typerecommended
    Severitymoderate
    References1195231
    Description:

    This update for lvm2 fixes the following issues:


    Advisory IDSUSE-RU-2022:1204-1
    ReleasedThu Apr 14 12:15:55 2022
    SummaryRecommended update for hwdata
    Typerecommended
    Severitymoderate
    References1196332
    Description:

    This update for hwdata fixes the following issues:


    Advisory IDSUSE-RU-2022:1208-1
    ReleasedThu Apr 14 12:41:38 2022
    SummaryRecommended update for vncmanager
    Typerecommended
    Severitymoderate
    References1169732,1171344,1189247
    Description:

    This update for vncmanager fixes the following issues:


    Advisory IDSUSE-SU-2022:1218-1
    ReleasedThu Apr 14 16:53:33 2022
    SummarySecurity update for SDL2
    Typesecurity
    Severityimportant
    References1198001,CVE-2021-33657
    Description:

    This update for SDL2 fixes the following issues:


    Advisory IDSUSE-SU-2022:1252-1
    ReleasedTue Apr 19 08:51:06 2022
    SummarySecurity update for openjpeg2
    Typesecurity
    Severityimportant
    References1076314,1076967,1079845,1102016,1106881,1106882,1140130,1160782,1162090,1173578,1180457,1184774,1197738,CVE-2018-14423,CVE-2018-16375,CVE-2018-16376,CVE-2018-20845,CVE-2018-5727,CVE-2018-5785,CVE-2018-6616,CVE-2020-15389,CVE-2020-27823,CVE-2020-6851,CVE-2020-8112,CVE-2021-29338,CVE-2022-1122
    Description:

    This update for openjpeg2 fixes the following issues:


    Advisory IDSUSE-SU-2022:1259-1
    ReleasedTue Apr 19 11:10:16 2022
    SummarySecurity update for icedtea-web
    Typesecurity
    Severityimportant
    References1142825,1142832,1142835,CVE-2019-10181,CVE-2019-10182,CVE-2019-10185
    Description:

    This update for icedtea-web fixes the following issues:


    Advisory IDSUSE-RU-2022:1263-1
    ReleasedTue Apr 19 13:32:00 2022
    SummaryRecommended update for cloud-regionsrv-client
    Typerecommended
    Severitycritical
    References1198389
    Description:

    This update for cloud-regionsrv-client fixes the following issues:


    Advisory IDSUSE-SU-2022:1265-1
    ReleasedTue Apr 19 15:22:37 2022
    SummarySecurity update for jsoup, jsr-305
    Typesecurity
    Severityimportant
    References1189749,CVE-2021-37714
    Description:

    This update for jsoup, jsr-305 fixes the following issues:


    Changes in jsr-305:
    Changes in jsoup:


    Advisory IDSUSE-SU-2022:1273-1
    ReleasedWed Apr 20 09:09:48 2022
    SummarySecurity update for SDL
    Typesecurity
    Severityimportant
    References1181201,1181202,1198001,CVE-2020-14409,CVE-2020-14410,CVE-2021-33657
    Description:

    This update for SDL fixes the following issues:


    Advisory IDSUSE-RU-2022:1279-1
    ReleasedWed Apr 20 12:22:48 2022
    SummaryRecommended update for sgi-bitmap-fonts
    Typerecommended
    Severityimportant
    References1197854
    Description:

    This update for sgi-bitmap-fonts fixes the following issues:


    Advisory IDSUSE-RU-2022:1280-1
    ReleasedWed Apr 20 12:23:33 2022
    SummaryRecommended update for HANA-Firewall
    Typerecommended
    Severityimportant
    References1197697
    Description:

    This update for HANA-Firewall fixes the following issues:


    Advisory IDSUSE-RU-2022:1281-1
    ReleasedWed Apr 20 12:26:38 2022
    SummaryRecommended update for libtirpc
    Typerecommended
    Severitymoderate
    References1196647
    Description:

    This update for libtirpc fixes the following issues:


    Advisory IDSUSE-SU-2022:1296-1
    ReleasedThu Apr 21 17:28:44 2022
    SummarySecurity update for openjpeg
    Typesecurity
    Severityimportant
    References1102016,1106881,1162090,1173578,1180457,1184774,CVE-2018-14423,CVE-2018-16376,CVE-2020-15389,CVE-2020-27823,CVE-2020-8112,CVE-2021-29338
    Description:

    This update for openjpeg fixes the following issues:


    Advisory IDSUSE-SU-2022:1297-1
    ReleasedThu Apr 21 17:31:54 2022
    SummarySecurity update for swtpm
    Typesecurity
    Severitylow
    References1196240,CVE-2022-23645
    Description:

    This update for swtpm fixes the following issues:


    SUSE-IU-2000:20-1

    Container Advisory IDSUSE-IU-2000:20-1
    Container TagsSUSE:SLE-15-SP3:2
    Container Release
    The following patches have been included in this update:
    Advisory IDSUSE-RU-2021:444-1
    ReleasedFri Feb 12 08:46:46 2021
    SummaryRecommended update for libmodulemd
    Typerecommended
    Severitylow
    References1181004
    Description:

    This update for libmodulemd fixes the following issues:


    Advisory IDSUSE-RU-2021:1477-1
    ReleasedTue May 4 14:04:28 2021
    SummaryRecommended update for libmodulemd
    Typerecommended
    Severitylow
    References
    Description:

    This update for libmodulemd fixes the following issues:


    Advisory IDSUSE-RU-2021:2670-1
    ReleasedThu Aug 12 12:04:06 2021
    SummaryRecommended update for libmodulemd
    Typerecommended
    Severitymoderate
    References
    Description:

    This recommended update for libmodulemd fixes the following issues:
    Provide libmodulemd (jsc#ECO-3458)


    Advisory IDSUSE-RU-2021:3227-1
    ReleasedMon Sep 27 09:50:51 2021
    SummaryRecommended update for createrepo_c, libmodulemd, and zchunk
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for createrepo_c fixes the following issues:
    createrepo_c:


    libmodulemd:

    zchunk:


    Advisory IDSUSE-RU-2021:3274-1
    ReleasedFri Oct 1 10:34:17 2021
    SummaryRecommended update for ca-certificates-mozilla
    Typerecommended
    Severityimportant
    References1190858
    Description:

    This update for ca-certificates-mozilla fixes the following issues:


    Advisory IDSUSE-SU-2021:3291-1
    ReleasedWed Oct 6 16:45:36 2021
    SummarySecurity update for glibc
    Typesecurity
    Severitymoderate
    References1186489,1187911,CVE-2021-33574,CVE-2021-35942
    Description:

    This update for glibc fixes the following issues:


    Advisory IDSUSE-SU-2021:3292-1
    ReleasedWed Oct 6 16:46:16 2021
    SummarySecurity update for go1.16
    Typesecurity
    Severityimportant
    References1182345,1190589,CVE-2021-39293
    Description:

    This update for go1.16 fixes the following issues:


    Advisory IDSUSE-SU-2021:3293-1
    ReleasedWed Oct 6 16:47:31 2021
    SummarySecurity update for ffmpeg
    Typesecurity
    Severitymoderate
    References1186761,CVE-2020-22042
    Description:

    This update for ffmpeg fixes the following issues:


    Advisory IDSUSE-SU-2021:3298-1
    ReleasedWed Oct 6 16:54:52 2021
    SummarySecurity update for curl
    Typesecurity
    Severitymoderate
    References1190373,1190374,CVE-2021-22946,CVE-2021-22947
    Description:

    This update for curl fixes the following issues:


    Advisory IDSUSE-SU-2021:3301-1
    ReleasedWed Oct 6 16:58:33 2021
    SummarySecurity update for libcryptopp
    Typesecurity
    Severitymoderate
    References1015243,CVE-2016-9939
    Description:

    This update for libcryptopp fixes the following issues:


    Advisory IDSUSE-RU-2021:3304-1
    ReleasedWed Oct 6 18:11:33 2021
    SummaryRecommended update for kdump
    Typerecommended
    Severitymoderate
    References1172670,1183070,1184616,1186037
    Description:

    This update for kdump fixes the following issues:


    Advisory IDSUSE-RU-2021:3306-1
    ReleasedWed Oct 6 18:11:57 2021
    SummaryRecommended update for numactl
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for numactl fixes the following issues:


    Advisory IDSUSE-RU-2021:3307-1
    ReleasedWed Oct 6 18:12:07 2021
    SummaryRecommended update for virt-what
    Typerecommended
    Severitymoderate
    References1161850,1176132
    Description:

    This update for virt-what fixes the following issues:


    Advisory IDSUSE-RU-2021:3309-1
    ReleasedWed Oct 6 18:12:31 2021
    SummaryRecommended update for google-roboto-mono-fonts
    Typerecommended
    Severitylow
    References
    Description:

    This update for google-roboto-mono-fonts fixes the following issue:


    Advisory IDSUSE-RU-2021:3310-1
    ReleasedWed Oct 6 18:12:41 2021
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1134353,1184994,1188291,1188588,1188713,1189446,1189480
    Description:

    This update for systemd fixes the following issues:




    Additional fixes:


    Advisory IDSUSE-RU-2021:3311-1
    ReleasedWed Oct 6 18:12:56 2021
    SummaryRecommended update for perl-Bootloader
    Typerecommended
    Severitymoderate
    References1188768
    Description:

    This update for perl-Bootloader fixes the following issues:


    Advisory IDSUSE-RU-2021:3312-1
    ReleasedWed Oct 6 18:13:09 2021
    SummaryRecommended update for yast2-installation
    Typerecommended
    Severitymoderate
    References1186044
    Description:

    This update for yast2-installation fixes the following issues:


    Advisory IDSUSE-RU-2021:3314-1
    ReleasedWed Oct 6 18:13:38 2021
    SummaryRecommended update for xerces-c
    Typerecommended
    Severitymoderate
    References1190105
    Description:

    This update for xerces-c fixes the following issues:


    Advisory IDSUSE-RU-2021:3315-1
    ReleasedWed Oct 6 19:29:43 2021
    SummaryRecommended update for go1.17
    Typerecommended
    Severitymoderate
    References1190589,1190649,CVE-2021-39293
    Description:

    This update for go1.17 fixes the following issues:
    This is the initial go 1.17 shipment.
    go1.17.1 (released 2021-09-09) includes a security fix to the archive/zip package, as well as bug fixes to the compiler, linker, the go command, and to the crypto/rand, embed, go/types, html/template, and net/http packages. (bsc#1190649)
    CVE-2021-39293: Fixed an overflow in preallocation check that can cause OOM panic in archive/zip (bsc#1190589)
    go1.17 (released 2021-08-16) is a major release of Go.
    go1.17.x minor releases will be provided through August 2022.
    See https://github.com/golang/go/wiki/Go-Release-Cycle
    Most changes are in the implementation of the toolchain, runtime, and libraries. As always, the release maintains the Go 1 promise of compatibility. We expect almost all Go programs to continue to compile and run as before. (bsc#1190649)



    Advisory IDSUSE-RU-2021:3317-1
    ReleasedWed Oct 6 19:30:39 2021
    SummaryRecommended update for postgresql10
    Typerecommended
    Severitymoderate
    References1179945,1185952,1187751,1190177
    Description:

    This update for postgresql10 fixes the following issues:


    Advisory IDSUSE-RU-2021:3321-1
    ReleasedThu Oct 7 15:46:40 2021
    SummaryRecommended update for autoyast2
    Typerecommended
    Severitymoderate
    References1176089,1188153,1190696
    Description:

    This update for autoyast2 fixes the following issues:


    Advisory IDSUSE-SU-2021:3325-1
    ReleasedSat Oct 9 19:45:01 2021
    SummarySecurity update for rabbitmq-server
    Typesecurity
    Severitymoderate
    References1185075,1186203,1187818,1187819,CVE-2021-22116,CVE-2021-32718,CVE-2021-32719
    Description:

    This update for rabbitmq-server fixes the following issues:



    Advisory IDSUSE-OU-2021:3327-1
    ReleasedMon Oct 11 11:44:50 2021
    SummaryOptional update for coreutils
    Typeoptional
    Severitylow
    References1189454
    Description:

    This optional update for coreutils fixes the following issue:


    Advisory IDSUSE-RU-2021:3328-1
    ReleasedMon Oct 11 11:48:14 2021
    SummaryRecommended update for patterns-sap
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for patterns-sap fixes the following issue:


    Advisory IDSUSE-SU-2021:3338-1
    ReleasedTue Oct 12 11:06:00 2021
    SummarySecurity update for the Linux Kernel
    Typesecurity
    Severityimportant
    References1065729,1148868,1152489,1154353,1159886,1167773,1170774,1171688,1173746,1174003,1176447,1176940,1177028,1178134,1184439,1184804,1185302,1185550,1185677,1185726,1185762,1187211,1188067,1188418,1188651,1188986,1189257,1189297,1189841,1189884,1190023,1190062,1190115,1190138,1190159,1190358,1190406,1190432,1190467,1190523,1190534,1190543,1190544,1190561,1190576,1190595,1190596,1190598,1190620,1190626,1190679,1190705,1190717,1190746,1190758,1190784,1190785,1191172,1191193,1191292,CVE-2020-3702,CVE-2021-3669,CVE-2021-3744,CVE-2021-3752,CVE-2021-3764,CVE-2021-40490
    Description:


    The SUSE Linux Enterprise 15 SP3 kernel was updated.
    The following security bugs were fixed:


    The following non-security bugs were fixed:


    Advisory IDSUSE-RU-2021:3343-1
    ReleasedTue Oct 12 13:00:09 2021
    SummaryRecommended update for pacemaker
    Typerecommended
    Severitymoderate
    References1177212,1180618,1181744,1187414,1188653
    Description:

    This update for pacemaker fixes the following issues:




    Advisory IDSUSE-SU-2021:3348-1
    ReleasedTue Oct 12 13:08:06 2021
    SummarySecurity update for systemd
    Typesecurity
    Severitymoderate
    References1134353,1171962,1184994,1188018,1188063,1188291,1188713,1189480,1190234,CVE-2021-33910
    Description:

    This update for systemd fixes the following issues:



    Advisory IDSUSE-RU-2021:3349-1
    ReleasedTue Oct 12 13:21:48 2021
    SummaryRecommended update for libgphoto2
    Typerecommended
    Severitymoderate
    References1172301
    Description:

    This update for libgphoto2 fixes the following issues:
    libgphoto2 was updated to the 2.5.27 release (jsc#SLE-21615)


    Advisory IDSUSE-SU-2021:3350-1
    ReleasedTue Oct 12 13:22:31 2021
    SummarySecurity update for libaom
    Typesecurity
    Severitylow
    References1186799,CVE-2021-30474
    Description:

    This update for libaom fixes the following issues:


    Advisory IDSUSE-SU-2021:3353-1
    ReleasedTue Oct 12 13:23:34 2021
    SummarySecurity update for webkit2gtk3
    Typesecurity
    Severityimportant
    References1188697,1190701,CVE-2021-21806,CVE-2021-30858
    Description:

    This update for webkit2gtk3 fixes the following issues:


    Advisory IDSUSE-SU-2021:3354-1
    ReleasedTue Oct 12 13:24:08 2021
    SummarySecurity update for libqt5-qtsvg
    Typesecurity
    Severitymoderate
    References1184783,CVE-2021-3481
    Description:

    This update for libqt5-qtsvg fixes the following issues:


    Advisory IDSUSE-RU-2021:3382-1
    ReleasedTue Oct 12 14:30:17 2021
    SummaryRecommended update for ca-certificates-mozilla
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for ca-certificates-mozilla fixes the following issues:


    Advisory IDSUSE-RU-2021:3390-1
    ReleasedTue Oct 12 18:53:38 2021
    SummaryRecommended update for fcoe-utils
    Typerecommended
    Severitymoderate
    References1010047,1182804
    Description:

    This update for fcoe-utils fixes the following issues:
    Update to version 1.0.34 (bsc#1182804)


    Advisory IDSUSE-RU-2021:3392-1
    ReleasedTue Oct 12 19:01:24 2021
    SummaryRecommended update for rsync
    Typerecommended
    Severityimportant
    References1188258
    Description:

    This update for rsync fixes the following issues:


    Advisory IDSUSE-RU-2021:3395-1
    ReleasedTue Oct 12 19:07:18 2021
    SummaryRecommended update for sbd
    Typerecommended
    Severityimportant
    References1187547,1189398
    Description:

    This update for sbd fixes the following issues:
    Update to version 1.5.0+20210720.f4ca41f


    Important notes on 'sync_resource_startup_default':


    Advisory IDSUSE-RU-2021:3397-1
    ReleasedTue Oct 12 19:07:43 2021
    SummaryRecommended update for mariadb
    Typerecommended
    Severitymoderate
    References1182218
    Description:

    This update for mariadb fixes the following issue:


    Advisory IDSUSE-RU-2021:3398-1
    ReleasedTue Oct 12 19:07:55 2021
    SummaryRecommended update for gnome-packagekit
    Typerecommended
    Severitymoderate
    References1190330
    Description:

    This update for gnome-packagekit fixes the following issue:


    Advisory IDSUSE-RU-2021:3399-1
    ReleasedTue Oct 12 19:08:17 2021
    SummaryRecommended update for NetworkManager
    Typerecommended
    Severitymoderate
    References1116625
    Description:

    This update for NetworkManager fixes the following issues:


    Advisory IDSUSE-RU-2021:3400-1
    ReleasedWed Oct 13 08:15:28 2021
    SummaryRecommended update for emacs
    Typerecommended
    Severitymoderate
    References1178942,1180353
    Description:

    This update for emacs fixes the following issues:


    Advisory IDSUSE-RU-2021:3402-1
    ReleasedWed Oct 13 10:39:58 2021
    SummaryRecommended update for 389-ds
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for 389-ds fixes the following issues:


    Advisory IDSUSE-RU-2021:3406-1
    ReleasedWed Oct 13 10:40:44 2021
    SummaryRecommended update for ServiceReport
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for ServiceReport fixes the following issues:


    Advisory IDSUSE-RU-2021:3407-1
    ReleasedWed Oct 13 10:40:49 2021
    SummaryRecommended update for resource-agents
    Typerecommended
    Severitylow
    References1180668
    Description:

    This update for resource-agents fixes the following issues:


    Advisory IDSUSE-RU-2021:3409-1
    ReleasedWed Oct 13 10:41:02 2021
    SummaryRecommended update for libGLw
    Typerecommended
    Severitylow
    References1191122
    Description:

    This update for libGLw fixes the following issue:


    Advisory IDSUSE-RU-2021:3410-1
    ReleasedWed Oct 13 10:41:36 2021
    SummaryRecommended update for xkeyboard-config
    Typerecommended
    Severitymoderate
    References1191242
    Description:

    This update for xkeyboard-config fixes the following issue:


    Advisory IDSUSE-RU-2021:3411-1
    ReleasedWed Oct 13 10:42:25 2021
    SummaryRecommended update for lvm2
    Typerecommended
    Severitymoderate
    References1191019
    Description:

    This update for lvm2 fixes the following issues:


    Advisory IDSUSE-RU-2021:3413-1
    ReleasedWed Oct 13 10:50:45 2021
    SummaryRecommended update for suse-module-tools
    Typerecommended
    Severityimportant
    References1189441,1189841,1190598
    Description:

    This update for suse-module-tools fixes the following issues:


    Advisory IDSUSE-SU-2021:3445-1
    ReleasedFri Oct 15 09:03:39 2021
    SummarySecurity update for rpm
    Typesecurity
    Severityimportant
    References1183659,1185299,1187670,1188548
    Description:

    This update for rpm fixes the following issues:
    Security issues fixed:


    Maintaince issues fixed:


    Advisory IDSUSE-RU-2021:3448-1
    ReleasedFri Oct 15 09:12:28 2021
    SummaryRecommended update for scap-security-guide
    Typerecommended
    Severitymoderate
    References1191431,1191432
    Description:

    This update for scap-security-guide fixes the following issues:
    The scap-security-guide was updated to 0.1.58 release (jsc#ECO-3319)


    Advisory IDSUSE-SU-2021:3451-1
    ReleasedSat Oct 16 10:49:25 2021
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1188891,1189547,1190269,1190274,1190710,1191332,CVE-2021-29980,CVE-2021-29981,CVE-2021-29982,CVE-2021-29983,CVE-2021-29984,CVE-2021-29985,CVE-2021-29986,CVE-2021-29987,CVE-2021-29988,CVE-2021-29989,CVE-2021-29990,CVE-2021-29991,CVE-2021-32810,CVE-2021-38492,CVE-2021-38495,CVE-2021-38496,CVE-2021-38497,CVE-2021-38498,CVE-2021-38500,CVE-2021-38501
    Description:

    This update for MozillaFirefox fixes the following issues:
    This update contains the Firefox Extended Support Release 91.2.0 ESR.
    Release 91.2.0 ESR:


    MFSA 2021-45 (bsc#1191332):


    Release 91.1.0 ESR:

    MFSA 2021-40 (bsc#1190269, bsc#1190274):

    Release 91.0.1esr ESR:

    Firefox Extended Support Release 91.0 ESR

    - A number of user interface changes. For more information, see the Firefox 89 release notes. - Firefox now supports logging into Microsoft, work, and school accounts using Windows single sign-on. Learn more - On Windows, updates can now be applied in the background while Firefox is not running. - Firefox for Windows now offers a new page about:third-party to help identify compatibility issues caused by third-party applications - Version 2 of Firefox's SmartBlock feature further improves private browsing. Third party Facebook scripts are blocked to prevent you from being tracked, but are now automatically loaded 'just in time' if you decide to 'Log in with Facebook' on any website. - Enhanced the privacy of the Firefox Browser's Private Browsing mode with Total Cookie Protection, which confines cookies to the site where they were created, preventing companis from using cookies to track your browsing across sites. This feature was originally launched in Firefox's ETP Strict mode. - PDF forms now support JavaScript embedded in PDF files. Some PDF forms use JavaScript for validation and other interactive features. - You'll encounter less website breakage in Private Browsing and Strict Enhanced Tracking Protection with SmartBlock, which provides stand-in scripts so that websites load properly. - Improved Print functionality with a cleaner design and better integration with your computer's printer settings. - Firefox now protects you from supercookies, a type of tracker that can stay hidden in your browser and track you online, even after you clear cookies. By isolating supercookies, Firefox prevents them from tracking your web browsing from one site to the next. - Firefox now remembers your preferred location for saved bookmarks, displays the bookmarks toolbar by default on new tabs, and gives you easy access to all of your bookmarks via a toolbar folder. - Native support for macOS devices built with Apple Silicon CPUs brings dramatic performance improvements over the non- native build that was shipped in Firefox 83: Firefox launches over 2.5 times faster and web apps are now twice as responsive (per the SpeedoMeter 2.0 test). If you are on a new Apple device, follow these steps to upgrade to the latest Firefox. - Pinch zooming will now be supported for our users with Windows touchscreen devices and touchpads on Mac devices. Firefox users may now use pinch to zoom on touch-capable devices to zoom in and out of webpages. - We’ve improved functionality and design for a number of Firefox search features: * Selecting a search engine at the bottom of the search panel now enters search mode for that engine, allowing you to see suggestions (if available) for your search terms. The old behavior (immediately performing a search) is available with a shift-click. * When Firefox autocompletes the URL of one of your search engines, you can now search with that engine directly in the address bar by selecting the shortcut in the address bar results. * We’ve added buttons at the bottom of the search panel to allow you to search your bookmarks, open tabs, and history. - Firefox supports AcroForm, which will allow you to fill in, print, and save supported PDF forms and the PDF viewer also has a new fresh look. - For our users in the US and Canada, Firefox can now save, manage, and auto-fill credit card information for you, making shopping on Firefox ever more convenient. - In addition to our default, dark and light themes, with this release, Firefox introduces the Alpenglow theme: a colorful appearance for buttons, menus, and windows. You can update your Firefox themes under settings or preferences.
    MFSA 2021-33 (bsc#1188891):


    Advisory IDSUSE-RU-2021:3465-1
    ReleasedTue Oct 19 13:12:46 2021
    SummaryRecommended update for cloud-regionsrv
    Typerecommended
    Severitymoderate
    References1190250
    Description:

    This update for cloud-regionsrv contains the following fixes:



    Advisory IDSUSE-SU-2021:3467-1
    ReleasedTue Oct 19 13:16:09 2021
    SummarySecurity update for strongswan
    Typesecurity
    Severityimportant
    References1191367,1191435,CVE-2021-41990,CVE-2021-41991
    Description:

    This update for strongswan fixes the following issues:
    A feature was added:


    Security issues fixed:


    Advisory IDSUSE-RU-2021:3471-1
    ReleasedWed Oct 20 08:39:41 2021
    SummaryRecommended update for habootstrap-formula
    Typerecommended
    Severitymoderate
    References1190940
    Description:

    This update for habootstrap-formula fixes the following issues:
    Update to version 0.4.4


    Advisory IDSUSE-SU-2021:3472-1
    ReleasedWed Oct 20 08:40:43 2021
    SummarySecurity update for flatpak
    Typesecurity
    Severityimportant
    References1191507,CVE-2021-41133
    Description:

    This update for flatpak fixes the following issues:


    Advisory IDSUSE-SU-2021:3474-1
    ReleasedWed Oct 20 08:41:31 2021
    SummarySecurity update for util-linux
    Typesecurity
    Severitymoderate
    References1178236,1188921,CVE-2021-37600
    Description:

    This update for util-linux fixes the following issues:


    Advisory IDSUSE-SU-2021:3476-1
    ReleasedWed Oct 20 08:42:00 2021
    SummarySecurity update for xstream
    Typesecurity
    Severityimportant
    References1189798,CVE-2021-39139,CVE-2021-39140,CVE-2021-39141,CVE-2021-39144,CVE-2021-39145,CVE-2021-39146,CVE-2021-39147,CVE-2021-39148,CVE-2021-39149,CVE-2021-39150,CVE-2021-39151,CVE-2021-39152,CVE-2021-39153,CVE-2021-39154
    Description:

    This update for xstream fixes the following issues:


    Advisory IDSUSE-RU-2021:3479-1
    ReleasedWed Oct 20 11:23:45 2021
    SummaryRecommended update for dracut
    Typerecommended
    Severitymoderate
    References1184970,1186260,1187115,1187470,1187774,1190845
    Description:

    This update for dracut fixes the following issues:


    Advisory IDSUSE-RU-2021:3480-1
    ReleasedWed Oct 20 11:24:10 2021
    SummaryRecommended update for yast2-network
    Typerecommended
    Severitymoderate
    References1185016,1185524,1186910,1187270,1187512,1188344,1190645,1190739,1190915,1190933
    Description:

    This update for yast2-network fixes the following issues:


    Advisory IDSUSE-feature-2021:3483-1
    ReleasedWed Oct 20 16:08:18 2021
    SummaryFeature update for saptune
    Typefeature
    Severitymoderate
    References1149205,1164720,1167213,1167416,1167618,1170672,1176243,1178207,1179275,1182009,1182287,1182289,1185702
    Description:

    This update for saptune fixes the following issues:
    Update saptune from version 2.0.3 to version 3.0.0 (jsc#SLE-20985)

    'ugly' control sequences for the colorized output. - Add enable/disable for systemd units and support all systemd unit types in section [service] (jsc#TEAM-1701) - remove script '/usr/share/doc/packages/saptune/sapconf2saptune' and the associated man page (jsc#TEAM-1707) - implement staging of Note definition file and solution definitions. (jsc#TEAM-1844) - The idea is to freeze the saptune configuration to avoid config changes on package update when adding/removing/changing notes or solutions within the package - support custom solutions and override files for solutions. (jsc#TEAM-1706) - Partners and customers will now be able to define their own solution definitions by using files in '/etc/saptune/extra' or to override the shipped solution definitions by using override files in '/etc/saptune/override' - support for device specific configurations (jsc#TEAM-1728) - only supported for the [block] section, tags are 'vendor' and 'model' to support special block devices of a dedicated hardware vendor or a dedicated hardware model - add support for AZURE cloud (SAP Note 2993054) (jsc#TEAM-2676) - add support for AWS cloud (SAP Note 1656250) (jsc#TEAM-1754, jsc#TEAM-1755) - add NVMe support to the block device handling to support AWS (jsc#TEAM-2675) - add SAP Note 3024346 (a NetApp note) (jsc#TEAM-3454) - rework daemon and service actions (jsc#TEAM-3154) - add support for 'read_ahead_kb' and 'max_sectors_kb' to the [block] section (jsc#TEAM-1699) - add a warning to the reminder section of SAP Note 2382421 regarding iSCSI devices and setting of 'net.ipv4.tcp_syn_retries' (jsc#TEAM-1705) - For the actions 'note customise' and 'note create' check, if the customer has changed something during the editor session. If not, remove the temporary created note definition file. (jsc#TEAM-825) - add support for [sys] section and handle double configurations for parameters defined in the [sys] section (jsc#TEAM-3342) - check system sysctl config files as mentioned in the comments of '/etc/sysctl.conf' and in man page 'sysctl.conf(5)' for 'sysctl' parameters currently set by saptune notes. Print a warning and a footnote for 'verify' and 'customize'. (jsc#TEAM-1696) - add support for [filesystem] section only check filesystem mount options, not modify. Starting with filesystem type 'xfs' (jsc#TEAM-4093) - add SAP Note 900929 for SAP Netweaver workloads. (jsc#TEAM-4386) - It's the equivalent to the HANA Note 1980196. - move state files from '/var/lib/saptune' to '/run/saptune' to solve the problem of state files surviving a reboot. - add '/sbin/saptune_check' - add the description of the solution definitions shipped with saptune to the man page saptune(8) (jsc#TEAM-4260)


    Advisory IDSUSE-SU-2021:3485-1
    ReleasedWed Oct 20 16:17:53 2021
    SummarySecurity update for squid
    Typesecurity
    Severitymoderate
    References1189403,CVE-2021-28116
    Description:

    This update for squid fixes the following issues:
    Update to version 4.17:


    Advisory IDSUSE-SU-2021:3487-1
    ReleasedWed Oct 20 16:18:28 2021
    SummarySecurity update for go1.16
    Typesecurity
    Severitymoderate
    References1182345,1191468,CVE-2021-38297
    Description:

    This update for go1.16 fixes the following issues:
    Update to go1.16.9


    Advisory IDSUSE-SU-2021:3488-1
    ReleasedWed Oct 20 16:18:39 2021
    SummarySecurity update for go1.17
    Typesecurity
    Severitymoderate
    References1190649,1191468,CVE-2021-38297
    Description:

    This update for go1.17 fixes the following issues:
    Update to go1.17.2


    Advisory IDSUSE-SU-2021:3489-1
    ReleasedWed Oct 20 16:19:28 2021
    SummarySecurity update for python
    Typesecurity
    Severitymoderate
    References1189241,1189287,CVE-2021-3733,CVE-2021-3737
    Description:

    This update for python fixes the following issues:


    Advisory IDSUSE-SU-2021:3490-1
    ReleasedWed Oct 20 16:31:55 2021
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1190793,CVE-2021-39537
    Description:

    This update for ncurses fixes the following issues:


    Advisory IDSUSE-SU-2021:3493-1
    ReleasedWed Oct 20 16:37:44 2021
    SummarySecurity update for fetchmail
    Typesecurity
    Severitymoderate
    References1190069,CVE-2021-39272
    Description:

    This update for fetchmail fixes the following issues:


    Advisory IDSUSE-RU-2021:3494-1
    ReleasedWed Oct 20 16:48:46 2021
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1190052
    Description:

    This update for pam fixes the following issues:


    Advisory IDSUSE-RU-2021:3495-1
    ReleasedThu Oct 21 09:57:36 2021
    SummaryRecommended update for yast2-add-on
    Typerecommended
    Severitymoderate
    References1189154
    Description:

    This update for yast2-add-on fixes the following issue:


    Advisory IDSUSE-RU-2021:3496-1
    ReleasedThu Oct 21 09:57:47 2021
    SummaryRecommended update for bash-completion
    Typerecommended
    Severitylow
    References1190929
    Description:

    This update for bash-completion fixes the following issue:


    Advisory IDSUSE-RU-2021:3498-1
    ReleasedThu Oct 21 09:58:06 2021
    SummaryRecommended update for texlive-specs-i
    Typerecommended
    Severitylow
    References1190640
    Description:

    This update for texlive-specs-i fixes the following issue:


    Advisory IDSUSE-RU-2021:3500-1
    ReleasedFri Oct 22 09:42:21 2021
    SummaryRecommended update for open-vm-tools
    Typerecommended
    Severitymoderate
    References1190987
    Description:

    This update for open-vm-tools fixes the following issues:


    Advisory IDSUSE-RU-2021:3501-1
    ReleasedFri Oct 22 10:42:46 2021
    SummaryRecommended update for libzypp, zypper, libsolv, protobuf
    Typerecommended
    Severitymoderate
    References1186503,1186602,1187224,1187425,1187466,1187738,1187760,1188156,1188435,1189031,1190059,1190199,1190465,1190712,1190815
    Description:

    This update for libzypp, zypper, libsolv and protobuf fixes the following issues:


    Advisory IDSUSE-SU-2021:3506-1
    ReleasedMon Oct 25 10:20:22 2021
    SummarySecurity update for containerd, docker, runc
    Typesecurity
    Severityimportant
    References1102408,1185405,1187704,1188282,1190826,1191015,1191121,1191334,1191355,1191434,CVE-2021-30465,CVE-2021-32760,CVE-2021-41089,CVE-2021-41091,CVE-2021-41092,CVE-2021-41103
    Description:

    This update for containerd, docker, runc fixes the following issues:
    Docker was updated to 20.10.9-ce. (bsc#1191355)
    See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.
    CVE-2021-41092 CVE-2021-41089 CVE-2021-41091 CVE-2021-41103
    container was updated to v1.4.11, to fix CVE-2021-41103. bsc#1191355



    Update to runc v1.0.2. Upstream changelog is available from
    https://github.com/opencontainers/runc/releases/tag/v1.0.2

    Update to runc v1.0.1. Upstream changelog is available from
    https://github.com/opencontainers/runc/releases/tag/v1.0.1

    Update to runc v1.0.0. Upstream changelog is available from
    https://github.com/opencontainers/runc/releases/tag/v1.0.0
    ! The usage of relative paths for mountpoints will now produce a warning (such configurations are outside of the spec, and in future runc will produce an error when given such configurations).
    Update to runc v1.0.0~rc95. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95
    This release of runc contains a fix for CVE-2021-30465, and users are strongly recommended to update (especially if you are providing semi-limited access to spawn containers to untrusted users). (bsc#1185405)
    Update to runc v1.0.0~rc94. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc94
    Breaking Changes:
    Regression Fixes:


    Advisory IDSUSE-RU-2021:3509-1
    ReleasedTue Oct 26 09:47:40 2021
    SummaryRecommended update for suse-module-tools
    Typerecommended
    Severityimportant
    References1191200,1191260,1191480,1191804,1191922
    Description:

    This update for suse-module-tools fixes the following issues:
    Update to version 15.3.13:


    Advisory IDSUSE-RU-2021:3510-1
    ReleasedTue Oct 26 11:22:15 2021
    SummaryRecommended update for pam
    Typerecommended
    Severityimportant
    References1191987
    Description:

    This update for pam fixes the following issues:


    Advisory IDSUSE-RU-2021:3512-1
    ReleasedTue Oct 26 13:33:17 2021
    SummaryRecommended update for MozillaFirefox
    Typerecommended
    Severitymoderate
    References1190141,1191815
    Description:

    This update for MozillaFirefox fixes the following issues:


    Advisory IDSUSE-RU-2021:3516-1
    ReleasedTue Oct 26 14:42:44 2021
    SummaryRecommended update for azure-cli, azure-cli-core, python-azure-mgmt, python-azure-mgmt-billing, python-azure-mgmt-cdn, python-azure-mgmt-hdinsight, python-azure-mgmt-netapp, python-azure-mgmt-resource, python-azure-mgmt-synapse
    Typerecommended
    Severityimportant
    References1187880,1188178
    Description:

    This update for azure-cli, azure-cli-core, python-azure-mgmt, python-azure-mgmt-billing, python-azure-mgmt-cdn, python-azure-mgmt-hdinsight, python-azure-mgmt-netapp, python-azure-mgmt-resource, python-azure-mgmt-synapse contains the following fixes:
    Changes in python-azure-mgmt:


    Changes in azure-cli-core:


    Changes in azure-cli:



    Changes in python-azure-mgmt-billing:

    Changes in python-azure-mgmt-cdn:

    Changes in python-azure-mgmt-hdinsight:

    Changes in python-azure-mgmt-netapp:

    Changes in python-azure-mgmt-resource:

    Changes in python-azure-mgmt-synapse:


    Advisory IDSUSE-SU-2021:3521-1
    ReleasedTue Oct 26 15:38:44 2021
    SummarySecurity update for ffmpeg
    Typesecurity
    Severitymoderate
    References1186756,1187852,1189166,1190718,1190719,1190722,1190723,1190726,1190729,1190733,1190734,1190735,CVE-2020-20891,CVE-2020-20892,CVE-2020-20895,CVE-2020-20896,CVE-2020-20899,CVE-2020-20902,CVE-2020-22037,CVE-2020-35965,CVE-2021-3566,CVE-2021-38092,CVE-2021-38093,CVE-2021-38094
    Description:

    This update for ffmpeg fixes the following issues:


    Advisory IDSUSE-SU-2021:3522-1
    ReleasedTue Oct 26 15:39:29 2021
    SummarySecurity update for apache2
    Typesecurity
    Severityimportant
    References1190666,1190669,1190702,1190703,CVE-2021-34798,CVE-2021-36160,CVE-2021-39275,CVE-2021-40438
    Description:

    This update for apache2 fixes the following issues:


    Advisory IDSUSE-SU-2021:3527-1
    ReleasedTue Oct 26 17:03:06 2021
    SummarySecurity update for wireguard-tools
    Typesecurity
    Severitymoderate
    References1191224
    Description:

    This update for wireguard-tools fixes the following issues:


    Advisory IDSUSE-SU-2021:3529-1
    ReleasedWed Oct 27 09:23:32 2021
    SummarySecurity update for pcre
    Typesecurity
    Severitymoderate
    References1172973,1172974,CVE-2019-20838,CVE-2020-14155
    Description:

    This update for pcre fixes the following issues:
    Update pcre to version 8.45:


    Advisory IDSUSE-SU-2021:3530-1
    ReleasedWed Oct 27 09:24:29 2021
    SummarySecurity update for dnsmasq
    Typesecurity
    Severitymoderate
    References1173646,1180914,1183709,CVE-2020-14312,CVE-2021-3448
    Description:

    This update for dnsmasq fixes the following issues:
    Update to version 2.86


    Advisory IDSUSE-SU-2021:3531-1
    ReleasedWed Oct 27 10:07:33 2021
    SummarySecurity update for busybox
    Typesecurity
    Severityimportant
    References1099260,1099263,1121426,1184522,951562,CVE-2011-5325,CVE-2018-1000500,CVE-2018-1000517,CVE-2018-20679,CVE-2021-28831
    Description:

    This update for busybox fixes the following issues:


    Advisory IDSUSE-RU-2021:3532-1
    ReleasedWed Oct 27 10:11:20 2021
    SummaryRecommended update for pmdk
    Typerecommended
    Severityimportant
    References1191339
    Description:

    This update for pmdk fixes the following issues:


    Advisory IDSUSE-RU-2021:3534-1
    ReleasedWed Oct 27 10:40:02 2021
    SummaryRecommended update for pacemaker
    Typerecommended
    Severitymoderate
    References1190821
    Description:

    This update for pacemaker fixes the following issues:


    Advisory IDSUSE-RU-2021:3536-1
    ReleasedWed Oct 27 10:40:13 2021
    SummaryRecommended update for yast2-storage-ng
    Typerecommended
    Severitylow
    References1187270,1191109,1191347
    Description:

    This update for yast2-storage-ng fixes the following issues:


    Advisory IDSUSE-RU-2021:3538-1
    ReleasedWed Oct 27 10:40:32 2021
    SummaryRecommended update for iproute2
    Typerecommended
    Severitymoderate
    References1160242
    Description:

    This update for iproute2 fixes the following issues:


    Advisory IDSUSE-RU-2021:3542-1
    ReleasedWed Oct 27 11:44:39 2021
    SummaryRecommended update for openscap
    Typerecommended
    Severitymoderate
    References1186735
    Description:

    This update for openscap fixes the following issues:



    Advisory IDSUSE-RU-2021:3543-1
    ReleasedWed Oct 27 13:12:40 2021
    SummaryRecommended update for system-role-common-criteria
    Typerecommended
    Severitymoderate
    References
    Description:


    This update for system-role-common-criteria ships it to the Server Applications Module.


    Advisory IDSUSE-RU-2021:3545-1
    ReleasedWed Oct 27 14:46:39 2021
    SummaryRecommended update for less
    Typerecommended
    Severitylow
    References1190552
    Description:

    This update for less fixes the following issues:


    Advisory IDSUSE-RU-2021:3551-1
    ReleasedWed Oct 27 15:27:49 2021
    SummaryRecommended update for SUSE Manager 4.2.3 Release Notes
    Typerecommended
    Severitylow
    References1171520,1181223,1187572,1187998,1188315,1188977,1189260,1189422,1189609,1189799,1189818,1189933,1190040,1190123,1190151,1190164,1190166,1190265,1190275,1190276,1190300,1190396,1190405,1190455,1190512,1190602,1190751,1190820,1191123,1191139,1191348,1191551,CVE-2021-21996,CVE-2021-40348
    Description:

    This update for SUSE Manager 4.2.3 Release Notes provides the following additions:
    Release notes for SUSE Manager:


    Release notes for SUSE Manager proxy:


    Advisory IDSUSE-SU-2021:3557-1
    ReleasedWed Oct 27 15:29:15 2021
    SummarySecurity update for salt
    Typesecurity
    Severitymoderate
    References1190265,CVE-2021-21996
    Description:

    This update for salt fixes the following issues:


    Advisory IDSUSE-RU-2021:3564-1
    ReleasedWed Oct 27 16:12:08 2021
    SummaryRecommended update for rpm-config-SUSE
    Typerecommended
    Severitymoderate
    References1190850
    Description:

    This update for rpm-config-SUSE fixes the following issues:


    Advisory IDSUSE-RU-2021:3568-1
    ReleasedThu Oct 28 09:27:52 2021
    SummaryRecommended update for crmsh
    Typerecommended
    Severitymoderate
    References1191508
    Description:

    This update for crmsh fixes the following issues:


    Advisory IDSUSE-RU-2021:3569-1
    ReleasedThu Oct 28 09:28:43 2021
    SummaryRecommended update for orarun
    Typerecommended
    Severitymoderate
    References1191350
    Description:

    This update for orarun fixes the following issues:


    Advisory IDSUSE-RU-2021:3570-1
    ReleasedThu Oct 28 09:30:54 2021
    SummaryRecommended update for yast2-installation
    Typerecommended
    Severitymoderate
    References1191160
    Description:

    This update for yast2-installation fixes the following issues:


    Advisory IDSUSE-RU-2021:3571-1
    ReleasedThu Oct 28 09:32:19 2021
    SummaryRecommended update for postfix
    Typerecommended
    Severitymoderate
    References1190945
    Description:

    This update for postfix fixes the following issues:


    Advisory IDSUSE-RU-2021:3573-1
    ReleasedThu Oct 28 09:36:05 2021
    SummaryRecommended update for yast2-theme
    Typerecommended
    Severitymoderate
    References1176164,1191830
    Description:

    This update for yast2-theme fixes the following issues:


    Advisory IDSUSE-RU-2021:3574-1
    ReleasedThu Oct 28 12:50:07 2021
    SummaryRecommended update for rpmlint
    Typerecommended
    Severitymoderate
    References1190790,1191821
    Description:

    This update for rpmlint fixes the following issues:


    Advisory IDSUSE-RU-2021:3578-1
    ReleasedFri Oct 29 11:36:22 2021
    SummaryRecommended update for migrate-sles-to-sles4sap
    Typerecommended
    Severitymoderate
    References1189481
    Description:

    This update for migrate-sles-to-sles4sap fixes the following issues:


    Advisory IDSUSE-RU-2021:3579-1
    ReleasedFri Oct 29 14:56:48 2021
    SummaryRecommended update for cloud-regionsrv-client
    Typerecommended
    Severitymoderate
    References1182026,1189362
    Description:

    This update for cloud-regionsrv-client fixes the following issues:



    Advisory IDSUSE-RU-2021:3581-1
    ReleasedFri Oct 29 16:09:23 2021
    SummaryRecommended update for SUSEConnect
    Typerecommended
    Severityimportant
    References
    Description:

    This update for SUSEConnect contains the following fix:


    Advisory IDSUSE-SU-2021:3584-1
    ReleasedFri Oct 29 16:27:43 2021
    SummarySecurity update for transfig
    Typesecurity
    Severityimportant
    References1189325,1189343,1189345,1189346,1190607,1190611,1190612,1190615,1190616,1190617,1190618,1192019,CVE-2020-21529,CVE-2020-21530,CVE-2020-21531,CVE-2020-21532,CVE-2020-21533,CVE-2020-21534,CVE-2020-21535,CVE-2020-21680,CVE-2020-21681,CVE-2020-21682,CVE-2020-21683,CVE-2021-32280
    Description:

    This update for transfig fixes the following issues:
    Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)


    Advisory IDSUSE-RU-2021:3587-1
    ReleasedFri Oct 29 19:30:13 2021
    SummaryRecommended update for yast2-country
    Typerecommended
    Severitymoderate
    References1187857,1189461
    Description:

    This update for yast2-country fixes the following issues:


    Advisory IDSUSE-RU-2021:3590-1
    ReleasedTue Nov 2 06:24:39 2021
    SummaryRecommended update for libyui
    Typerecommended
    Severitymoderate
    References1191130
    Description:

    This update for libyui fixes the following issues:


    Advisory IDSUSE-RU-2021:3591-1
    ReleasedTue Nov 2 06:26:33 2021
    SummaryRecommended update for man-pages
    Typerecommended
    Severitymoderate
    References1185534
    Description:

    This update for man-pages fixes the following issues:


    Advisory IDSUSE-RU-2021:3596-1
    ReleasedWed Nov 3 08:32:54 2021
    SummaryRecommended update for libyui-ncurses-pkg
    Typerecommended
    Severitymoderate
    References1191130
    Description:

    This update for libyui-ncurses-pkg fixes the following issues:


    Advisory IDSUSE-RU-2021:3599-1
    ReleasedWed Nov 3 10:29:54 2021
    SummaryRecommended update for postgresql, postgresql13, postgresql14
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for postgresql, postgresql13, postgresql14 fixes the following issues:
    This update ships postgresql14. (jsc#SLE-20675 jsc#SLE-20676)
    Feature changes in postgresql14:


    Changes in postgresql13:

    Changes in postgresql:


    Advisory IDSUSE-RU-2021:3600-1
    ReleasedWed Nov 3 10:31:11 2021
    SummaryRecommended update for postgresql
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for postgresql fixes the following issues:


    Advisory IDSUSE-SU-2021:3603-1
    ReleasedWed Nov 3 14:58:13 2021
    SummarySecurity update for webkit2gtk3
    Typesecurity
    Severityimportant
    References1191937,CVE-2021-42762
    Description:

    This update for webkit2gtk3 fixes the following issues:


    Advisory IDSUSE-SU-2021:3605-1
    ReleasedWed Nov 3 14:59:32 2021
    SummarySecurity update for qemu
    Typesecurity
    Severityimportant
    References1189234,1189702,1189938,1190425,CVE-2021-3713,CVE-2021-3748
    Description:

    This update for qemu fixes the following issues:
    Security issues fixed:


    Non-security issues fixed:


    Advisory IDSUSE-RU-2021:3606-1
    ReleasedWed Nov 3 15:12:47 2021
    SummaryRecommended update for release-notes-sles
    Typerecommended
    Severitymoderate
    References1183906,1186099,1188302,1189989,1190394,933411
    Description:

    This update for release-notes-sles fixes the following issues:


    Advisory IDSUSE-RU-2021:3609-1
    ReleasedWed Nov 3 16:41:33 2021
    SummaryRecommended update for autoyast2
    Typerecommended
    Severitylow
    References1191968
    Description:

    This update for autoyast2 fixes the following issues:


    Advisory IDSUSE-SU-2021:3616-1
    ReleasedThu Nov 4 12:29:16 2021
    SummarySecurity update for binutils
    Typesecurity
    Severitymoderate
    References1179898,1179899,1179900,1179901,1179902,1179903,1180451,1180454,1180461,1181452,1182252,1183511,1184620,1184794,CVE-2020-16590,CVE-2020-16591,CVE-2020-16592,CVE-2020-16593,CVE-2020-16598,CVE-2020-16599,CVE-2020-35448,CVE-2020-35493,CVE-2020-35496,CVE-2020-35507,CVE-2021-20197,CVE-2021-20284,CVE-2021-3487
    Description:

    This update for binutils fixes the following issues:
    Update to binutils 2.37:


    The semantics of the =follow-links option have also been slightly changed. When enabled, the option allows for the loading of symbol tables and string tables from the separate files which can be used to enhance the information displayed when dumping other sections, but it does not automatically imply that information from the separate files should be displayed.
    If other debug section display options are also enabled (eg '--debug-dump=info') then the contents of matching sections in both the main file and the separate debuginfo file *will* be displayed. This is because in most cases the debug section will only be present in one of the files.
    If however non-debug section display options are enabled (eg '--sections') then the contents of matching parts of the separate debuginfo file will *not* be displayed. This is because in most cases the user probably only wanted to load the symbol information from the separate debuginfo file. In order to change this behaviour a new command line option --process-links can be used. This will allow di0pslay options to applied to both the main file and any separate debuginfo files.

    Update to binutils 2.36:
    New features in the Assembler:

    * When setting the link order attribute of ELF sections, it is now possible to use a numeric section index instead of symbol name. * Added a .nop directive to generate a single no-op instruction in a target neutral manner. This instruction does have an effect on DWARF line number generation, if that is active. * Removed --reduce-memory-overheads and --hash-size as gas now uses hash tables that can be expand and shrink automatically.

    * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key Locker instructions. * Support non-absolute segment values for lcall and ljmp. * Add {disp16} pseudo prefix to x86 assembler. * Configure with --enable-x86-used-note by default for Linux/x86.

    * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1, Cortex-R82, Neoverse V1, and Neoverse N2 cores. * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call Stack Recorder Extension) and BRBE (Branch Record Buffer Extension) system registers. * Add support for Armv8-R and Armv8.7-A ISA extensions. * Add support for DSB memory nXS barrier, WFET and WFIT instruction for Armv8.7. * Add support for +csre feature for -march. Add CSR PDEC instruction for CSRE feature in AArch64. * Add support for +flagm feature for -march in Armv8.4 AArch64. * Add support for +ls64 feature for -march in Armv8.7 AArch64. Add atomic 64-byte load/store instructions for this feature. * Add support for +pauth (Pointer Authentication) feature for -march in AArch64.
    New features in the Linker:
    * Add --error-handling-script= command line option to allow a helper script to be invoked when an undefined symbol or a missing library is encountered. This option can be suppressed via the configure time switch: --enable-error-handling-script=no. * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark x86-64-{baseline|v[234]} ISA level as needed. * Add -z unique-symbol to avoid duplicated local symbol names. * The creation of PE format DLLs now defaults to using a more secure set of DLL characteristics. * The linker now deduplicates the types in .ctf sections. The new command-line option --ctf-share-types describes how to do this: its default value, share-unconflicted, produces the most compact output. * The linker now omits the 'variable section' from .ctf sections by default, saving space. This is almost certainly what you want unless you are working on a project that has its own analogue of symbol tables that are not reflected in the ELF symtabs.
    New features in other binary tools:
    * The ar tool's previously unused l modifier is now used for specifying dependencies of a static library. The arguments of this option (or --record-libdeps long form option) will be stored verbatim in the __.LIBDEP member of the archive, which the linker may read at link time. * Readelf can now display the contents of LTO symbol table sections when asked to do so via the --lto-syms command line option. * Readelf now accepts the -C command line option to enable the demangling of symbol names. In addition the --demangle=