openSUSE-SLE-15.5-2022-2956 Recommended update for post-build-checks moderate SUSE Updates openSUSE-SLE 15.5 This update for post-build-checks is a test update for openSUSE Leap 15.5. post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.noarch.rpm post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.src.rpm openSUSE-SLE-15.5-2022-4205 Security update for net-snmp moderate SUSE Updates openSUSE-SLE 15.5 This update for net-snmp fixes the following issues: Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203): - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access. - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference. - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously. - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference. - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. net-snmp-5.9.3-150300.15.3.1.src.rpm net-snmp-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-5.9.3-150300.15.3.1.x86_64.rpm perl-SNMP-5.9.3-150300.15.3.1.x86_64.rpm python3-net-snmp-5.9.3-150300.15.3.1.x86_64.rpm snmp-mibs-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-5.9.3-150300.15.3.1.s390x.rpm net-snmp-devel-5.9.3-150300.15.3.1.s390x.rpm perl-SNMP-5.9.3-150300.15.3.1.s390x.rpm python3-net-snmp-5.9.3-150300.15.3.1.s390x.rpm snmp-mibs-5.9.3-150300.15.3.1.s390x.rpm net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-devel-5.9.3-150300.15.3.1.ppc64le.rpm perl-SNMP-5.9.3-150300.15.3.1.ppc64le.rpm python3-net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm snmp-mibs-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-5.9.3-150300.15.3.1.aarch64.rpm net-snmp-devel-5.9.3-150300.15.3.1.aarch64.rpm perl-SNMP-5.9.3-150300.15.3.1.aarch64.rpm python3-net-snmp-5.9.3-150300.15.3.1.aarch64.rpm snmp-mibs-5.9.3-150300.15.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-419 Security update for nodejs18 moderate SUSE Updates openSUSE-SLE 15.5 This update for nodejs18 fixes the following issues: This update ships nodejs18 (jsc#PED-2097) Update to NodejJS 18.13.0 LTS: * build: disable v8 snapshot compression by default * crypto: update root certificates * deps: update ICU to 72.1 * doc: + add doc-only deprecation for headers/trailers setters + add Rafael to the tsc + deprecate use of invalid ports in url.parse + deprecate url.parse() * lib: drop fetch experimental warning * net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options * src: + add uvwasi version + add initial shadow realm support * test_runner: + add t.after() hook + don't use a symbol for runHook() * tls: + add "ca" property to certificate object * util: + add fast path for utf8 encoding + improve textdecoder decode performance + add MIME utilities - Fixes compatibility with ICU 72.1 (bsc#1205236) - Fix migration to openssl-3 (bsc#1205042) Update to NodeJS 18.12.1 LTS: * inspector: DNS rebinding in --inspect via invalid octal IP (bsc#1205119, CVE-2022-43548) Update to NodeJS 18.12.0 LTS: * Running in 'watch' mode using node --watch restarts the process when an imported file is changed. * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * util: add default value option to parsearg Update to NodeJS 18.11.0: * added experimental watch mode -- running in 'watch' mode using node --watch restarts the process when an imported file is changed * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * lib: refactor transferable AbortSignal * src: add detailed embedder process initialization API * util: add default value option to parsearg Update to NodeJS 18.10.0: * deps: upgrade npm to 8.19.2 * http: throw error on content-length mismatch * stream: add ReadableByteStream.tee() Update to Nodejs 18.9.1: * deps: llhttp updated to 6.0.10 + CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325) + Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215, bsc#1201327) + Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832) * crypto: fix weak randomness in WebCrypto keygen (CVE-2022-35255, bsc#1203831) Update to Nodejs 18.9.0: * lib - add diagnostics channel for process and worker * os - add machine method * report - expose report public native apis * src - expose environment RequestInterrupt api * vm - include vm context in the embedded snapshot Changes in 18.8.0: * bootstrap: implement run-time user-land snapshots via --build-snapshot and --snapshot-blob. See * crypto: + allow zero-length IKM in HKDF and in webcrypto PBKDF2 + allow zero-length secret KeyObject * deps: upgrade npm to 8.18.0 * http: make idle http parser count configurable * net: add local family * src: print source map error source on demand * tls: pass a valid socket on tlsClientError Update to Nodejs 18.7.0: * events: add CustomEvent * http: add drop request event for http server * lib: improved diagnostics_channel subscribe/unsubscribe * util: add tokens to parseArgs - enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303) Update to Nodejs 18.6.0: * Experimental ESM Loader Hooks API. For details see, https://nodejs.org/api/esm.html * dns: export error code constants from dns/promises * esm: add chaining to loaders * http: add diagnostics channel for http client * http: add perf_hooks detail for http request and client * module: add isBuiltIn method * net: add drop event for net server * test_runner: expose describe and it * v8: add v8.startupSnapshot utils For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0 Update to Nodejs 18.5.0: * http: stricter Transfer-Encoding and header separator parsing (bsc#1201325, bsc#1201326, bsc#1201327, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215) * src: fix IPv4 validation in inspector_socket (bsc#1201328, CVE-2022-32212) For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0 Update to Nodejs 18.4.0. For detailed changes see, https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0 Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0 corepack18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-18.13.0-150400.9.3.1.src.rpm nodejs18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-devel-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-docs-18.13.0-150400.9.3.1.noarch.rpm npm18-18.13.0-150400.9.3.1.x86_64.rpm corepack18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-devel-18.13.0-150400.9.3.1.s390x.rpm npm18-18.13.0-150400.9.3.1.s390x.rpm corepack18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-devel-18.13.0-150400.9.3.1.aarch64.rpm npm18-18.13.0-150400.9.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-1954 Recommended update for xmlsec1 low SUSE Updates openSUSE-SLE 15.5 This update for xmlsec1 fixes the following issue: - Ship missing xmlsec1 to synchronize its version across different products (bsc#1201617) libxmlsec1-1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-1.2.28-150100.7.13.4.src.rpm xmlsec1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.aarch64.rpm openSUSE-SLE-15.5-2023-2434 Feature update for junit5, mojo-executor and mojo-parent moderate SUSE Updates openSUSE-SLE 15.5 This update for junit5, mojo-executor and mojo-parent fixes the following issues: mojo-executor: - Version update from 2.3.1 to 2.4.0 (jsc#SLE-23217): * Dependencies provided by Maven have been moved to the provided scope where possible * The plexus-utils dependency must remain in the compile scope due to MNG-6965. It has been updated to version 3.0.24 to avoid spurious security vulnerability notifications due to this dependency. mojo-parent: - Version update from 60 to 70 (jsc#SLE-23217): * Improvement checkstyle configuration * Add modello-maven-plugin to pluginManagement * Remove Google search box due to privacy * Put version for mrm-maven-plugin in property * Add streamLogsOnFailures to m-invoker-p * Add property for maven-fluido-skin version * Setup Apache Matomo analytics * Downgrade Checkstyle to 9.3. 10.x requires Java 11 * remove requirement to use ssh for github scm devCon * Require Maven 3.2.5 * Add SHA-512 hashes * Extract plugin version as variable so child pom can override if needed * remove issue-tracking as do not exists anymore * remove cim report as it do not exists anymore junit5: - Deliver junit5-bom to openSUSE Leap 15.4 as it is a required dependency for mojo-parent (no source changes) junit5-5.8.2-150200.3.6.1.noarch.rpm junit5-5.8.2-150200.3.6.1.src.rpm junit5-bom-5.8.2-150200.3.6.1.noarch.rpm junit5-guide-5.8.2-150200.3.6.1.noarch.rpm junit5-javadoc-5.8.2-150200.3.6.1.noarch.rpm mojo-executor-2.4.0-150200.3.3.12.noarch.rpm mojo-executor-2.4.0-150200.3.3.12.src.rpm mojo-executor-javadoc-2.4.0-150200.3.3.12.noarch.rpm mojo-parent-70-150200.3.7.1.noarch.rpm mojo-parent-70-150200.3.7.1.src.rpm openSUSE-SLE-15.5-2023-2096 Security update for netty, netty-tcnative important SUSE Updates openSUSE-SLE 15.5 This update for netty, netty-tcnative fixes the following issues: netty: - Security fixes included in this version update from 4.1.75 to 4.1.90: * CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for Java 6 and lower in io.netty:netty-codec-http (bsc#1199338) * CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360) * CVE-2022-41915: HTTP Response splitting from assigning header value iterator (bsc#1206379) - Other non-security bug fixes included in this version update from 4.1.75 to 4.1.90: * Build with Java 11 on ix86 architecture in order to avoid build failures * Fix `HttpHeaders.names` for non-String headers * Fix `FlowControlHandler` behaviour to pass read events when auto-reading is turned off * Fix brotli compression * Fix a bug in FlowControlHandler that broke auto-read * Fix a potential memory leak bug has been in the pooled allocator * Fix a scalability issue caused by instanceof and check-cast checks that lead to false-sharing on the `Klass::secondary_super_cache` field in the JVM * Fix a bug in our `PEMParser` when PEM files have multiple objects, and `BouncyCastle` is on the classpath * Fix several `NullPointerException` bugs * Fix a regression `SslContext` private key loading * Fix a bug in `SslContext` private key reading fall-back path * Fix a buffer leak regression in `HttpClientCodec` * Fix a bug where some `HttpMessage` implementations, that also implement `HttpContent`, were not handled correctly * Fix epoll bug when receiving zero-sized datagrams * Fix a bug in `SslHandler` so `handlerRemoved` works properly even if `handlerAdded` throws an exception * Fix an issue that allowed the multicast methods on `EpollDatagramChannel` to be called outside of an event-loop thread * Fix a bug where an OPT record was added to DNS queries that already had such a record * Fix a bug that caused an error when files uploaded with HTTP POST contained a backslash in their name * Fix an issue in the `BlockHound` integration that could occasionally cause NetUtil to be reported as performing blocking operation. A similar `BlockHound` issue was fixed for the `JdkSslContext` * Fix a bug that prevented preface or settings frames from being flushed, when an HTTP2 connection was established with prior-knowledge * Fix a bug where Netty fails to load a shaded native library * Fix and relax overly strict HTTP/2 header validation check that was rejecting requests from Chrome and Firefox * Fix OpenSSL and BoringSSL implementations to respect the `jdk.tls.client.protocols` and `jdk.tls.server.protocols` system properties, making them react to these in the same way the JDK SSL provider does * Fix inconsitencies in how `epoll`, `kqueue`, and `NIO` handle RDHUP * For a more detailed list of changes please consult the official release notes: + Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html + Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html + Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html + Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html + Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html + Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html + Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html + Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html + Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html + Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html + Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html + Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html + Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html + Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html netty-tcnative: - New artifact named `netty-tcnative-classes`, provided by this update is required by netty 4.1.90 which contains important security updates - No formal changelog present. This artifact is closely bound to the netty releases netty-4.1.90-150200.4.14.1.src.rpm netty-4.1.90-150200.4.14.1.x86_64.rpm netty-javadoc-4.1.90-150200.4.14.1.noarch.rpm netty-poms-4.1.90-150200.4.14.1.noarch.rpm netty-tcnative-2.0.59-150200.3.10.1.src.rpm netty-tcnative-2.0.59-150200.3.10.1.x86_64.rpm netty-tcnative-javadoc-2.0.59-150200.3.10.1.noarch.rpm netty-4.1.90-150200.4.14.1.s390x.rpm netty-tcnative-2.0.59-150200.3.10.1.s390x.rpm netty-4.1.90-150200.4.14.1.ppc64le.rpm netty-tcnative-2.0.59-150200.3.10.1.ppc64le.rpm netty-4.1.90-150200.4.14.1.aarch64.rpm netty-tcnative-2.0.59-150200.3.10.1.aarch64.rpm openSUSE-SLE-15.5-2023-2271 Feature update for xz-java moderate SUSE Updates openSUSE-SLE 15.5 This update for xz-java fixes the following issues: - Version update from 1.8 to 1.9: * For the list of fixes and changes see the release notes at /usr/share/doc/packages/xz-java/NEWS xz-java-1.9-150200.3.7.1.noarch.rpm xz-java-1.9-150200.3.7.1.src.rpm xz-java-javadoc-1.9-150200.3.7.1.noarch.rpm openSUSE-SLE-15.5-2023-2266 Feature update for apache-parent moderate SUSE Updates openSUSE-SLE 15.5 This update for apache-parent fixes the following issues: Version update from 21 to 28 (jsc#SLE-23217): - Respect property assembly.tarLongFileMode - Allow custom Release Distribution Repository - Upgrade fluido skin to 1.11.0 - Add ASF Data Privacy - Drop outdated maven-docck-plugin from pluginManagement - Upgrade fluido skin to 1.11.1 - Set minimum enforced Maven version to 3.2.5 - Update m-plugin-p to 3.6.4 - Disable m2e warning for m-remote-resource-p:process - Corrected Jira URL - Update minimum version to 3.1.1 - Assume Maven 3 - Remove outdated clirr-maven-plugin - Simplify m-javadoc-p configuration - Configure release profile with dedicated parameter - Upload SHA-512 only for source-release to staging repository - Enforce minimum Java build version 8 apache-parent-28-150200.3.9.1.noarch.rpm apache-parent-28-150200.3.9.1.src.rpm openSUSE-SLE-15.5-2023-2267 Feature update for glassfish-jax-rs-api and glassfish-jsp-api moderate SUSE Updates openSUSE-SLE 15.5 This update for glassfish-jax-rs-api and glassfish-jsp-api fixes the following issues: glassfish-jax-rs-api: - Version update from 2.1.5 to 2.1.6 (jsc#SLE-23217): * Fixed spec version and updated template to include Final Release if <status> is empty. * Added Eclipse copyright notice. * Set copyright footer to 2019 Eclipse Foundation. * Use Jakarta instead of Java. * Include link to license in footer as well. glassfish-jsp-api: - Add alias to javax.servlet.jsp:jsp-api (jsc#SLE-23217) glassfish-jax-rs-api-2.1.6-150200.3.7.11.noarch.rpm glassfish-jax-rs-api-2.1.6-150200.3.7.11.src.rpm glassfish-jax-rs-api-javadoc-2.1.6-150200.3.7.11.noarch.rpm glassfish-jsp-api-2.3.3-150200.3.3.1.noarch.rpm glassfish-jsp-api-2.3.3-150200.3.3.1.src.rpm glassfish-jsp-api-javadoc-2.3.3-150200.3.3.1.noarch.rpm openSUSE-SLE-15.5-2023-2628 Security update for cloud-init important SUSE Updates openSUSE-SLE 15.5 This update for cloud-init fixes the following issues: - CVE-2023-1786: Do not expose sensitive data gathered from the CSP. (bsc#1210277) - CVE-2022-2084: Fixed a bug which caused logging schema failures can include password hashes. (bsc#1210652) - Update to version 23.1 + Support transactional-updates for SUSE based distros + Set ownership for new folders in Write Files Module + add OpenCloudOS and TencentOS support + lxd: Retry if the server isn't ready + test: switch pycloudlib source to pypi + test: Fix integration test deprecation message + Recognize opensuse-microos, dev tooling fixes + sources/azure: refactor imds handler into own module + docs: deprecation generation support + add function is_virtual to distro/FreeBSD + cc_ssh: support multiple hostcertificates + Fix minor schema validation regression and fixup typing + doc: Reword user data debug section + cli: schema also validate vendordata*. + ci: sort and add checks for cla signers file + Add "ederst" as contributor + readme: add reference to packages dir + docs: update downstream package list + docs: add google search verification + docs: fix 404 render use default notfound_urls_prefix in RTD conf + Fix OpenStack datasource detection on bare metal + docs: add themed RTD 404 page and pointer to readthedocs-hosted + schema: fix gpt labels, use type string for GUID + cc_disk_setup: code cleanup + netplan: keep custom strict perms when 50-cloud-init.yaml exists + cloud-id: better handling of change in datasource files + Warn on empty network key + Fix Vultr cloud_interfaces usage + cc_puppet: Update puppet service name + docs: Clarify networking docs + lint: remove httpretty + cc_set_passwords: Prevent traceback when restarting ssh + tests: fix lp1912844 + tests: Skip ansible test on bionic + Wait for NetworkManager + docs: minor polishing + CI: migrate integration-test to GH actions + Fix permission of SSH host keys + Fix default route rendering on v2 ipv6 + doc: fix path in net_convert command + docs: update net_convert docs + doc: fix dead link + cc_set_hostname: ignore /var/lib/cloud/data/set-hostname if it's empty + distros/rhel.py: _read_hostname() missing strip on "hostname" + integration tests: add IBM VPC support + machine-id: set to uninitialized to trigger regeneration on clones + sources/azure: retry on connection error when fetching metdata + Ensure ssh state accurately obtained + bddeb: drop dh-systemd dependency on newer deb-based releases + doc: fix `config formats` link in cloudsigma.rst + Fix wrong subp syntax in cc_set_passwords.py + docs: update the PR template link to readthedocs + ci: switch unittests to gh actions + Add mount_default_fields for PhotonOS. + sources/azure: minor refactor for metadata source detection logic + add "CalvoM" as contributor + ci: doc to gh actions + lxd: handle 404 from missing devices route for LXD 4.0 + docs: Diataxis overhaul + vultr: Fix issue regarding cache and region codes + cc_set_passwords: Move ssh status checking later + Improve Wireguard module idempotency + network/netplan: add gateways as on-link when necessary + tests: test_lxd assert features.networks.zones when present + Use btrfs enquque when available (#1926) [Robert Schweikert] + sources/azure: fix device driver matching for net config (#1914) + BSD: fix duplicate macs in Ifconfig parser + pycloudlib: add lunar support for integration tests + nocloud: add support for dmi variable expansion for seedfrom URL + tools: read-version drop extra call to git describe --long + doc: improve cc_write_files doc + read-version: When insufficient tags, use cloudinit.version.get_version + mounts: document weird prefix in schema + Ensure network ready before cloud-init service runs on RHEL + docs: add copy button to code blocks + netplan: define features.NETPLAN_CONFIG_ROOT_READ_ONLY flag + azure: fix support for systems without az command installed + Fix the distro.osfamily output problem in the openEuler system. + pycloudlib: bump commit dropping azure api smoke test + net: netplan config root read-only as wifi config can contain creds + autoinstall: clarify docs for users + sources/azure: encode health report as utf-8 + Add back gateway4/6 deprecation to docs + networkd: Add support for multiple [Route] sections + doc: add qemu tutorial + lint: fix tip-flake8 and tip-mypy + Add support for setting uid when creating users on FreeBSD + Fix exception in BSD networking code-path + Append derivatives to is_rhel list in cloud.cfg.tmpl + FreeBSD init: use cloudinit_enable as only rcvar + feat: add support aliyun metadata security harden mode + docs: uprate analyze to performance page + test: fix lxd preseed managed network config + Add support for static IPv6 addresses for FreeBSD + Make 3.12 failures not fail the build + Docs: adding relative links + Fix setup.py to align with PEP 440 versioning replacing trailing + Add "nkukard" as contributor + doc: add how to render new module doc + doc: improve module creation explanation + Add Support for IPv6 metadata to OpenStack + add xiaoge1001 to .github-cla-signers + network: Deprecate gateway{4,6} keys in network config v2 + VMware: Move Guest Customization transport from OVF to VMware + doc: home page links added + net: skip duplicate mac check for netvsc nic and its VF This update for python-responses fixes the following issues: - update to 0.21.0: * Add `threading.Lock()` to allow `responses` working with `threading` module. * Add `urllib3` `Retry` mechanism. See #135 * Removed internal `_cookies_from_headers` function * Now `add`, `upsert`, `replace` methods return registered response. `remove` method returns list of removed responses. * Added null value support in `urlencoded_params_matcher` via `allow_blank` keyword argument * Added strict version of decorator. Now you can apply `@responses.activate(assert_all_requests_are_fired=True)` to your function to validate that all requests were executed in the wrapped function. See #183 cloud-init-23.1-150100.8.63.5.src.rpm cloud-init-23.1-150100.8.63.5.x86_64.rpm cloud-init-config-suse-23.1-150100.8.63.5.x86_64.rpm cloud-init-doc-23.1-150100.8.63.5.x86_64.rpm cloud-init-23.1-150100.8.63.5.s390x.rpm cloud-init-config-suse-23.1-150100.8.63.5.s390x.rpm cloud-init-doc-23.1-150100.8.63.5.s390x.rpm cloud-init-23.1-150100.8.63.5.ppc64le.rpm cloud-init-config-suse-23.1-150100.8.63.5.ppc64le.rpm cloud-init-doc-23.1-150100.8.63.5.ppc64le.rpm cloud-init-23.1-150100.8.63.5.aarch64.rpm cloud-init-config-suse-23.1-150100.8.63.5.aarch64.rpm cloud-init-doc-23.1-150100.8.63.5.aarch64.rpm openSUSE-SLE-15.5-2023-2245 Recommended update for libzypp, zypper moderate SUSE Updates openSUSE-SLE 15.5 This update for libzypp, zypper fixes the following issues: - Installing local RPM packages fails if /usr/bin/find is not installed (bsc#1195633) - multicurl: propagate ssl settings stored in repo url (bsc#1127591) - MediaCurl: Fix endless loop if wrong credentials are stored in credentials.cat (bsc#1210870) - zypp.conf: Introduce 'download.connect_timeout' [60 sec.] (bsc#1208329) - Teach MediaNetwork to retry on HTTP2 errors. - Fix selecting installed patterns from picklist (bsc#1209406) - man: better explanation of --priority libsolv-0.7.24-150400.3.6.4.src.rpm True libsolv-demo-0.7.24-150400.3.6.4.x86_64.rpm True libsolv-devel-0.7.24-150400.3.6.4.x86_64.rpm True libsolv-tools-0.7.24-150400.3.6.4.x86_64.rpm True libzypp-17.31.11-150400.3.25.2.src.rpm True libzypp-17.31.11-150400.3.25.2.x86_64.rpm True libzypp-devel-17.31.11-150400.3.25.2.x86_64.rpm True libzypp-devel-doc-17.31.11-150400.3.25.2.x86_64.rpm True perl-solv-0.7.24-150400.3.6.4.x86_64.rpm True python-solv-0.7.24-150400.3.6.4.x86_64.rpm True python3-solv-0.7.24-150400.3.6.4.x86_64.rpm True ruby-solv-0.7.24-150400.3.6.4.x86_64.rpm True zypper-1.14.60-150400.3.21.2.src.rpm True zypper-1.14.60-150400.3.21.2.x86_64.rpm True zypper-aptitude-1.14.60-150400.3.21.2.noarch.rpm True zypper-log-1.14.60-150400.3.21.2.noarch.rpm True zypper-needs-restarting-1.14.60-150400.3.21.2.noarch.rpm True libsolv-demo-0.7.24-150400.3.6.4.s390x.rpm True libsolv-devel-0.7.24-150400.3.6.4.s390x.rpm True libsolv-tools-0.7.24-150400.3.6.4.s390x.rpm True libzypp-17.31.11-150400.3.25.2.s390x.rpm True libzypp-devel-17.31.11-150400.3.25.2.s390x.rpm True libzypp-devel-doc-17.31.11-150400.3.25.2.s390x.rpm True perl-solv-0.7.24-150400.3.6.4.s390x.rpm True python-solv-0.7.24-150400.3.6.4.s390x.rpm True python3-solv-0.7.24-150400.3.6.4.s390x.rpm True ruby-solv-0.7.24-150400.3.6.4.s390x.rpm True zypper-1.14.60-150400.3.21.2.s390x.rpm True libsolv-demo-0.7.24-150400.3.6.4.ppc64le.rpm True libsolv-devel-0.7.24-150400.3.6.4.ppc64le.rpm True libsolv-tools-0.7.24-150400.3.6.4.ppc64le.rpm True libzypp-17.31.11-150400.3.25.2.ppc64le.rpm True libzypp-devel-17.31.11-150400.3.25.2.ppc64le.rpm True libzypp-devel-doc-17.31.11-150400.3.25.2.ppc64le.rpm True perl-solv-0.7.24-150400.3.6.4.ppc64le.rpm True python-solv-0.7.24-150400.3.6.4.ppc64le.rpm True python3-solv-0.7.24-150400.3.6.4.ppc64le.rpm True ruby-solv-0.7.24-150400.3.6.4.ppc64le.rpm True zypper-1.14.60-150400.3.21.2.ppc64le.rpm True libsolv-demo-0.7.24-150400.3.6.4.aarch64.rpm True libsolv-devel-0.7.24-150400.3.6.4.aarch64.rpm True libsolv-tools-0.7.24-150400.3.6.4.aarch64.rpm True libzypp-17.31.11-150400.3.25.2.aarch64.rpm True libzypp-devel-17.31.11-150400.3.25.2.aarch64.rpm True libzypp-devel-doc-17.31.11-150400.3.25.2.aarch64.rpm True perl-solv-0.7.24-150400.3.6.4.aarch64.rpm True python-solv-0.7.24-150400.3.6.4.aarch64.rpm True python3-solv-0.7.24-150400.3.6.4.aarch64.rpm True ruby-solv-0.7.24-150400.3.6.4.aarch64.rpm True zypper-1.14.60-150400.3.21.2.aarch64.rpm True openSUSE-SLE-15.5-2023-2239 Recommended update for zram-generator low SUSE Updates openSUSE-SLE 15.5 This update for zram-generator fixes the following issues: - Fixed typo in the description (bsc#1200961) zram-generator-1.1.1~git5.8612dbb-150400.3.3.2.src.rpm zram-generator-1.1.1~git5.8612dbb-150400.3.3.2.x86_64.rpm zram-generator-1.1.1~git5.8612dbb-150400.3.3.2.s390x.rpm zram-generator-1.1.1~git5.8612dbb-150400.3.3.2.ppc64le.rpm zram-generator-1.1.1~git5.8612dbb-150400.3.3.2.aarch64.rpm openSUSE-SLE-15.5-2023-2240 Recommended update for systemd moderate SUSE Updates openSUSE-SLE 15.5 This update for systemd fixes the following issues: - udev-rules: fix nvme symlink creation on namespace changes (bsc#1207410) - Optimize when hundred workers claim the same symlink with the same priority (bsc#1203141) - Add nss-resolve and systemd-network to Packagehub-Subpackages (MSC-626) libsystemd0-249.16-150400.8.28.3.x86_64.rpm libsystemd0-32bit-249.16-150400.8.28.3.x86_64.rpm libudev1-249.16-150400.8.28.3.x86_64.rpm libudev1-32bit-249.16-150400.8.28.3.x86_64.rpm nss-myhostname-249.16-150400.8.28.3.x86_64.rpm nss-myhostname-32bit-249.16-150400.8.28.3.x86_64.rpm nss-systemd-249.16-150400.8.28.3.x86_64.rpm systemd-249.16-150400.8.28.3.src.rpm systemd-249.16-150400.8.28.3.x86_64.rpm systemd-32bit-249.16-150400.8.28.3.x86_64.rpm systemd-container-249.16-150400.8.28.3.x86_64.rpm systemd-coredump-249.16-150400.8.28.3.x86_64.rpm systemd-devel-249.16-150400.8.28.3.x86_64.rpm systemd-doc-249.16-150400.8.28.3.x86_64.rpm systemd-experimental-249.16-150400.8.28.3.x86_64.rpm systemd-journal-remote-249.16-150400.8.28.3.x86_64.rpm systemd-lang-249.16-150400.8.28.3.noarch.rpm systemd-network-249.16-150400.8.28.3.x86_64.rpm systemd-portable-249.16-150400.8.28.3.x86_64.rpm systemd-sysvinit-249.16-150400.8.28.3.x86_64.rpm systemd-testsuite-249.16-150400.8.28.3.x86_64.rpm udev-249.16-150400.8.28.3.x86_64.rpm libsystemd0-249.16-150400.8.28.3.s390x.rpm libudev1-249.16-150400.8.28.3.s390x.rpm nss-myhostname-249.16-150400.8.28.3.s390x.rpm nss-systemd-249.16-150400.8.28.3.s390x.rpm systemd-249.16-150400.8.28.3.s390x.rpm systemd-container-249.16-150400.8.28.3.s390x.rpm systemd-coredump-249.16-150400.8.28.3.s390x.rpm systemd-devel-249.16-150400.8.28.3.s390x.rpm systemd-doc-249.16-150400.8.28.3.s390x.rpm systemd-experimental-249.16-150400.8.28.3.s390x.rpm systemd-journal-remote-249.16-150400.8.28.3.s390x.rpm systemd-network-249.16-150400.8.28.3.s390x.rpm systemd-portable-249.16-150400.8.28.3.s390x.rpm systemd-sysvinit-249.16-150400.8.28.3.s390x.rpm systemd-testsuite-249.16-150400.8.28.3.s390x.rpm udev-249.16-150400.8.28.3.s390x.rpm libsystemd0-249.16-150400.8.28.3.ppc64le.rpm libudev1-249.16-150400.8.28.3.ppc64le.rpm nss-myhostname-249.16-150400.8.28.3.ppc64le.rpm nss-systemd-249.16-150400.8.28.3.ppc64le.rpm systemd-249.16-150400.8.28.3.ppc64le.rpm systemd-container-249.16-150400.8.28.3.ppc64le.rpm systemd-coredump-249.16-150400.8.28.3.ppc64le.rpm systemd-devel-249.16-150400.8.28.3.ppc64le.rpm systemd-doc-249.16-150400.8.28.3.ppc64le.rpm systemd-experimental-249.16-150400.8.28.3.ppc64le.rpm systemd-journal-remote-249.16-150400.8.28.3.ppc64le.rpm systemd-network-249.16-150400.8.28.3.ppc64le.rpm systemd-portable-249.16-150400.8.28.3.ppc64le.rpm systemd-sysvinit-249.16-150400.8.28.3.ppc64le.rpm systemd-testsuite-249.16-150400.8.28.3.ppc64le.rpm udev-249.16-150400.8.28.3.ppc64le.rpm libsystemd0-249.16-150400.8.28.3.aarch64.rpm libudev1-249.16-150400.8.28.3.aarch64.rpm nss-myhostname-249.16-150400.8.28.3.aarch64.rpm nss-systemd-249.16-150400.8.28.3.aarch64.rpm systemd-249.16-150400.8.28.3.aarch64.rpm systemd-container-249.16-150400.8.28.3.aarch64.rpm systemd-coredump-249.16-150400.8.28.3.aarch64.rpm systemd-devel-249.16-150400.8.28.3.aarch64.rpm systemd-doc-249.16-150400.8.28.3.aarch64.rpm systemd-experimental-249.16-150400.8.28.3.aarch64.rpm systemd-journal-remote-249.16-150400.8.28.3.aarch64.rpm systemd-network-249.16-150400.8.28.3.aarch64.rpm systemd-portable-249.16-150400.8.28.3.aarch64.rpm systemd-sysvinit-249.16-150400.8.28.3.aarch64.rpm systemd-testsuite-249.16-150400.8.28.3.aarch64.rpm udev-249.16-150400.8.28.3.aarch64.rpm openSUSE-SLE-15.5-2023-2336 Recommended update for lsvpd moderate SUSE Updates openSUSE-SLE 15.5 This update for lsvpd fixes the following issues: - Fix NVMe information parsing with newer firmware (bsc#1208122) lsvpd-1.7.14-150400.3.10.1.ppc64le.rpm lsvpd-1.7.14-150400.3.10.1.src.rpm openSUSE-SLE-15.5-2023-2272 Recommended update for go moderate SUSE Updates openSUSE-SLE 15.5 This update for go fixes the following issues: Switch default go compiler to go1.20. (bsc#1206346) Packaging improvements: * Re-enable debuginfo bsc#1210938 remove spec comment "# nodebug" * Use Group: Development/Languages/Go instead of Other go-1.20-150000.3.29.1.src.rpm go-1.20-150000.3.29.1.x86_64.rpm go-doc-1.20-150000.3.29.1.x86_64.rpm go-race-1.20-150000.3.29.1.x86_64.rpm go-1.20-150000.3.29.1.s390x.rpm go-doc-1.20-150000.3.29.1.s390x.rpm go-race-1.20-150000.3.29.1.s390x.rpm go-1.20-150000.3.29.1.ppc64le.rpm go-doc-1.20-150000.3.29.1.ppc64le.rpm go-race-1.20-150000.3.29.1.ppc64le.rpm go-1.20-150000.3.29.1.aarch64.rpm go-doc-1.20-150000.3.29.1.aarch64.rpm go-race-1.20-150000.3.29.1.aarch64.rpm openSUSE-SLE-15.5-2023-2355 Recommended update for librelp moderate SUSE Updates openSUSE-SLE 15.5 This update for librelp fixes the following issues: - update to librelp 1.11.0 (bsc#1210649) librelp-1.11.0-150000.3.3.1.src.rpm librelp-devel-1.11.0-150000.3.3.1.x86_64.rpm librelp0-1.11.0-150000.3.3.1.x86_64.rpm librelp-devel-1.11.0-150000.3.3.1.s390x.rpm librelp0-1.11.0-150000.3.3.1.s390x.rpm librelp-devel-1.11.0-150000.3.3.1.ppc64le.rpm librelp0-1.11.0-150000.3.3.1.ppc64le.rpm librelp-devel-1.11.0-150000.3.3.1.aarch64.rpm librelp0-1.11.0-150000.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2224 Security update for curl important SUSE Updates openSUSE-SLE 15.5 This update for curl adds the following feature: Update to version 8.0.1 (jsc#PED-2580) - CVE-2023-28319: use-after-free in SSH sha256 fingerprint check (bsc#1211230). - CVE-2023-28320: siglongjmp race condition (bsc#1211231). - CVE-2023-28321: IDN wildcard matching (bsc#1211232). - CVE-2023-28322: POST-after-PUT confusion (bsc#1211233). curl-8.0.1-150400.5.23.1.src.rpm curl-8.0.1-150400.5.23.1.x86_64.rpm libcurl-devel-32bit-8.0.1-150400.5.23.1.x86_64.rpm libcurl-devel-8.0.1-150400.5.23.1.x86_64.rpm libcurl4-32bit-8.0.1-150400.5.23.1.x86_64.rpm libcurl4-8.0.1-150400.5.23.1.x86_64.rpm curl-8.0.1-150400.5.23.1.s390x.rpm libcurl-devel-8.0.1-150400.5.23.1.s390x.rpm libcurl4-8.0.1-150400.5.23.1.s390x.rpm curl-8.0.1-150400.5.23.1.ppc64le.rpm libcurl-devel-8.0.1-150400.5.23.1.ppc64le.rpm libcurl4-8.0.1-150400.5.23.1.ppc64le.rpm curl-8.0.1-150400.5.23.1.aarch64.rpm libcurl-devel-8.0.1-150400.5.23.1.aarch64.rpm libcurl4-8.0.1-150400.5.23.1.aarch64.rpm openSUSE-SLE-15.5-2023-2242 Security update for java-1_8_0-openjdk important SUSE Updates openSUSE-SLE 15.5 This update for java-1_8_0-openjdk fixes the following issues: - Updated to version jdk8u372 (icedtea-3.27.0): - CVE-2023-21930: Fixed an issue in the JSSE component that could allow an attacker to access critical data without authorization (bsc#1210628). - CVE-2023-21937: Fixed an issue in the Networking component that could allow an attacker to update, insert or delete some data without authorization (bsc#1210631). - CVE-2023-21938: Fixed an issue in the Libraries component that could allow an attacker to update, insert or delete some data without authorization (bsc#1210632). - CVE-2023-21939: Fixed an issue in the Swing component that could allow an attacker to update, insert or delete some data without authorization (bsc#1210634). - CVE-2023-21954: Fixed an issue in the Hotspot component that could allow an attacker to access critical data without authorization (bsc#1210635). - CVE-2023-21967: Fixed an issue in the JSSE component that could allow an attacker to cause a hang or frequently repeatable crash without authorization (bsc#1210636). - CVE-2023-21968: Fixed an issue in the Libraries component that could allow an attacker to update, insert or delete some data without authorization (bsc#1210637). java-1_8_0-openjdk-1.8.0.372-150000.3.79.1.src.rpm java-1_8_0-openjdk-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-accessibility-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-demo-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-devel-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-headless-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-javadoc-1.8.0.372-150000.3.79.1.noarch.rpm java-1_8_0-openjdk-src-1.8.0.372-150000.3.79.1.x86_64.rpm java-1_8_0-openjdk-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-accessibility-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-demo-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-devel-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-headless-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-src-1.8.0.372-150000.3.79.1.s390x.rpm java-1_8_0-openjdk-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-accessibility-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-demo-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-devel-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-headless-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-src-1.8.0.372-150000.3.79.1.ppc64le.rpm java-1_8_0-openjdk-1.8.0.372-150000.3.79.1.aarch64.rpm java-1_8_0-openjdk-accessibility-1.8.0.372-150000.3.79.1.aarch64.rpm java-1_8_0-openjdk-demo-1.8.0.372-150000.3.79.1.aarch64.rpm java-1_8_0-openjdk-devel-1.8.0.372-150000.3.79.1.aarch64.rpm java-1_8_0-openjdk-headless-1.8.0.372-150000.3.79.1.aarch64.rpm java-1_8_0-openjdk-src-1.8.0.372-150000.3.79.1.aarch64.rpm openSUSE-SLE-15.5-2023-2301 Recommended update for cosign moderate SUSE Updates openSUSE-SLE 15.5 This update for cosign fixes the following issues: cosign was updated to 2.0.1 (jsc#SLE-23879) - Enhancements - Add environment variable token provider (#2864) - Remove cosign policy command (#2846) - Allow customising 'go' executable with GOEXE var (#2841) - Consistent tlog warnings during verification (#2840) - Add riscv64 arch (#2821) - Default generated PEM labels to SIGSTORE (#2735) - Update privacy statement and confirmation (#2797) - Add exit codes for verify errors (#2766) - Add Buildkite provider (#2779) - verify-blob-attestation: Loosen arg requirements if --check-claims=false (#2746) - Bug Fixes - PKCS11 sessions are now opened read only (#2853) - Makefile: date format of log should not show signatures (#2835) - Add missing flags to cosign verify dockerfile/manifest (#2830) - Add a warning to remember how to configure a custom Gitlab host (#2816) - Remove tag warning message from save/copy commands (#2799) - Mark keyless pem files with b64 (#2671) - build against a maintained golang version (upstream uses go1.20) cosign was updated to 2.0.0 (jsc#SLE-23879) - Breaking Changes: - insecure-skip-tlog-verify: rename and adapt the cert expiration check (#2620) - Deprecate --certificate-email flag. Make --certificate-identity and -… (#2411) - Enhancements: - Change go module name to github.com/sigstore/cosign/v2 for Cosign 2.0 (#2544) - Allow users to pass in a path for the --identity-token flag (#2538) - Breaking change: Respect tlog-upload=false, default to true (#2505) - Support outputing a certificate without uploading to the tlog (#2506) - Attestation/Blob signing and verification using a RFC3161 time-stamping server (#2464) - respect tlog-upload flag with TSA (#2474) - Better feedback if specifying incompatible argument on cosign sign --attachment (#2449) - Support TSA and Rekor verifications (#2463) - add support for tsa signing and verification of images (#2460) - cosign policy sign: remove experimental flag and make keyless signing default (#2459) - Remove experimental mode from cosign attest and verify-attestation (#2458) - Remove experimental mode from sign-blob and verify-blob (#2457) - Add --offline flag to force offline verification (#2427) - Air gap support (#2299) - Breaking change: Change SCT verification behavior to default to enforcement (#2400) - Breaking change: remove --force flag from sign and attest and rely on --yes flag to skip confirmation (#2399) - Breaking change: replace --no-tlog-upload flag with --tlog-upload flag (#2397) - Remove experimental flag from cosign sign and cosign verify (#2387) - verify: remove SIGSTORE_TRUST_REKOR_API_PUBLIC_KEY test env var for using a key from rekor's API (#2362) - Add warning to use digest instead of tags to other cosign commands (#2650) - Fix up UI messages (#2629) - Remove hardcoded Fulcio from output (#2621) - Fix missing privacy statement, print in multiple locations (#2622) - feat: allows custom key names for import-key-pair (#2587) - feat: support keyless verification for verify-blob-attestation (#2525) - attest-blob: add functionality for keyless signing (#2515) - Rego: add support for custom error/warning messages when evaluating rego rules (#2577) - feat: add debug information to cert validation error (#2579) - Support non-Sigstore TSA requests (#2708) - Add COSIGN_OCI_EXPERIMENTAL, push .sig/.sbom using OCI 1.1+ digest tag (#2684) - Output certificate in bundle when entry is not uploaded to Rekor (#2715) - attach signature and attach sbom must use STDIN to upload raw string (#2637) - add generate-key-pair GitHub Enterprise server support (#2676) - add in format string for warning (#2699) - Support for fetching Fulcio certs with self-managed key (#2532) - 2476 predicate type download (#2484) - Bug Fixes: - Fix the file existence check. (#2552) - Fix timestamp verification, add verify-blob tests (#2527) - Fix(verify): Consolidate certificate expiry logic (#2504) - Updates to Timestamp signing and verification (#2499) - Fix: removes attestation payload from attest-blob's output & no base64 encoding (#2498) - Fix path for e2e-tests badge (#2490) - Fix spdx json media type (#2479) - Fix sct verificaction (#2426) - Fix: panic with unsigned local image (#2656) - Make sure a cert passed in via --cert matches the bundle cert (#2652) - Fix: fix github oidc post submit test (#2594) - Fix: add enhanced error messages for failing verification with TUF targets (#2589) - Fix: Add missing schemes to cosign predicate types. (#2717) - Fix: Drop the CosignPredicate wrapper around SBOM attestations. (#2718) - Fix prompts with Windows line endings (#2674) cosing was update to 1.13.1: - verify-blob-attestation: allow multiple subjects in in_toto attestation (#2341) - Nits for #2337 (#2342) - Add verify-blob-attestation command and tests (#2337) - Update warning when users sign images by tag. (#2313) - Remove experimental flags from attest-blob and refactor (#2338) - Add --output-attestation flag to attest-blob and remove experimental signing (#2332) - Add attest-blob command (#2286) - Add '--cert-identity' flag to support subject alternate names for ver… (#2278) - Update Dockerfile section of README (#2323) - Fix option description: "sign" --> "verify" (#2306) cosign was updated to 1.13.0: - feat: use stdin as an input for predicate by @developer-guy in https://github.com/sigstore/cosign/pull/2269 - feat: improve the verification message by @developer-guy in https://github.com/sigstore/cosign/pull/2268 - use scaffolding 0.4.8 for tests. by @vaikas in https://github.com/sigstore/cosign/pull/2280 - fix pivtool generate key touch policy by @cpanato in https://github.com/sigstore/cosign/pull/2282 - Check error on chain verification failure by @haydentherapper in https://github.com/sigstore/cosign/pull/2284 - Fix: Remove an extra registry request from verification path. by @mattmoor in https://github.com/sigstore/cosign/pull/2285 - Fix: Create a static copy of signatures as part of verification. by @mattmoor in https://github.com/sigstore/cosign/pull/2287 - Data race in FetchSignaturesForReference by @RTann in https://github.com/sigstore/cosign/pull/2283 - Add support for Fulcio username identity in SAN by @haydentherapper in https://github.com/sigstore/cosign/pull/2291 - fix: make tlog entry lookups for online verification shard-aware by @asraa in https://github.com/sigstore/cosign/pull/2297 - Better help text to sign and verify SBOM by @ChristianCiach in https://github.com/sigstore/cosign/pull/2308 - Adding warning to pin to digest by @ChaosInTheCRD in https://github.com/sigstore/cosign/pull/2311 - Add annotations for upload blob. by @cldmnky in https://github.com/sigstore/cosign/pull/2188 - replace deprecate package by @cpanato in https://github.com/sigstore/cosign/pull/2314 - update release images to use go1.19.2 and cosign v1.12.1 by @cpanato in https://github.com/sigstore/cosign/pull/2315 cosign was updated to 1.12.1: - fix: Pulls Fulcio root and intermediate when --certificate-chain is not passed into verify-blob command. The v1.12.0 release introduced a regression: when COSIGN_EXPERIMENTAL was not set, cosign verify-blob would check a --certificate (without a --certificate-chain provided) against the operating system root CA bundle. In this release, Cosign checks the certificate against Fulcio's CA root instead (restoring the earlier behavior). - fix: fix cert chain validation for verify-blob in non-experimental mode - fix: add COSIGN_EXPERIMENTAL=1 for verify-bloba - Fix BYO-root with intermediate to fetch intermediates from annotation - fix: fixing breaking changes in rekor v1.12.0 upgrade cosign-2.0.1-150400.3.9.1.src.rpm cosign-2.0.1-150400.3.9.1.x86_64.rpm cosign-2.0.1-150400.3.9.1.s390x.rpm cosign-2.0.1-150400.3.9.1.ppc64le.rpm cosign-2.0.1-150400.3.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2445 Security update for google-cloud-sap-agent important SUSE Updates openSUSE-SLE 15.5 This update of google-cloud-sap-agent fixes the following issues: - rebuild the package with the go 1.19 security release (bsc#1200441). - Update to version 1.5.1 (bsc#1210464) - Raise golang API version to 1.20 google-cloud-sap-agent-1.5.1-150100.3.7.1.src.rpm google-cloud-sap-agent-1.5.1-150100.3.7.1.x86_64.rpm google-cloud-sap-agent-1.5.1-150100.3.7.1.s390x.rpm google-cloud-sap-agent-1.5.1-150100.3.7.1.ppc64le.rpm google-cloud-sap-agent-1.5.1-150100.3.7.1.aarch64.rpm openSUSE-SLE-15.5-2023-2578 Security update for SUSE Manager Client Tools important SUSE Updates openSUSE-SLE 15.5 This update fixes the following issues: bind: - Provide bind dependencies and solve installation issues on SUSE Linux Enterprise Micro - There are no source changes dracut-saltboot: - Update to version 0.1.1681904360.84ef141 * Load network configuration even when missing protocol version (bsc#1210640) grafana: - Version update from 8.5.22 to 9.5.1 (jsc#PED-3694): * Security fixes: - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645) - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests (bnc#1210907) - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596) - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597) - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501) - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539) - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535) - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185) - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480) - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (bsc#1192696) - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154) - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function * Important changes: - Default named retention policies won't be used to query. Users who have a default named retention policy in their influxdb database, have to rename it to something else. To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy from dropdown and save the panel/dashboard. - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect "For" duration. - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it will default to false. - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4 and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either: Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` or `dashboard.json` - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function in your tests please update your code accordingly. - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3. - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and `getMappedValue` function from grafana-data. See the documentation for the migration. This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. Following this change scheduled alert rules are not updated unless the query is successful. - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds` - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0 won't be decryptable from any previous version (by default) because the way encrypted secrets are stored into the database has changed. Although secrets created or modified with previous versions will still be decryptable by Grafana v9.0. - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to keep envelope encryption disabled once updating to Grafana - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable). - As a final attempt to deal with issues related with the aforementioned situations, the `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to disable envelope encryption and/or roll back to a previous version of Grafana. Alternatively or complementarily to all the points above, backing up the Grafana database before updating could be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those updates/created with after updating to Grafana v9.0). - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode please switch to server access mode on the datasource configuration page. - Environment variables passed from Grafana to external Azure plugins have been renamed: `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`, `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`, `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`. There are no known plugins which were relying on these variables. Moving forward plugins should read Azure settings only via Grafana Azure SDK which properly handles old and new environment variables. - Removes support for for ElasticSearch versions after their end-of-life, currently versions < 7.10.0. To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+. - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally removed in 9.0. Deprecated queries will no longer be executed. - grafana/ui: Button now specifies a default type="button". The `Button` component provided by @grafana/ui now specifies a default `type="button"` when no type is provided. In previous versions, if the attribute was not specified for buttons associated with a `<form>` the default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the type attribute: `<Button type="submit" />` - The `Rename by regex` transformation has been improved to allow global patterns of the form `/<stringToReplace>/g`. Depending on the regex match used, this may cause some transformations to behave slightly differently. You can guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would become `/(.*)/` - `<Select />` menus will now portal to the document body by default. This is to give more consistent behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely remove that prop and behaviour will be the same. If you weren't explicitly setting that prop, there should be no visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}` this will continue to prevent the menu from portalling. - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now expects the data source UID as a path parameter instead of the data source numeric identifier. - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now expect the data source UID as a path parameter instead of the data source numeric identifier. - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect the data source UID as a path parameter instead of the data - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect the data source UID as a path parameter instead of the data source numeric identifier. - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with `error` and `debug`. The precision of timestamps has been increased. To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle `oldlog`. This option will be removed in a future minor release. - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more efficient format. The query-result is represented by a single dataframe with a "labels" column, instead of the separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or Transforms were used, adjustments may be necessary. For example, if you used the "labels to fields" transformation with the logs data, please switch to the "extract fields" transformation. * Deprecations: - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use the `go_sql_stats_*` metrics instead. - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when navigating to Explore using the deprecated format the URLs are automatically converted. If you have existing links pointing to Explore update them using the format generated by Explore upon navigation. You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as an array of strings, for example `&left=["now-1h","now"...]`. The standard explore URLs follow a key/value pattern, for example `&left={"datasource":"test"...}`. Please be sure to check your dashboards for any hardcoded links to Explore and update them to the standard URL pattern. - Chore: Remove deprecated DataSourceAPI methods. - Data: Remove deprecated types and functions from valueMappings. - Elasticsearch: Remove browser access mode. - Elasticsearch: Remove support for versions after their end of the life (<7.10.0). - Explore: Remove support for legacy, compact format URLs. - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels. - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will be removed in a future release. If you need to set a different query editor for Explore, conditionally render based on `props.app` in your regular query editor. * Changes: - User: Fix externalUserId not being populated. If you used any of these components please use them from grafana/experimental from now on: - AccessoryButton - EditorFieldGroup - EditorHeader - EditorField - EditorRow - EditorList - EditorRows - EditorSwitch - FlexItem - Stack - InlineSelect - InputGroup - Space - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL. - Logger: Enable new logging format by default. - Loki: Enable new visual query builder by default. - Plugins: Remove plugin list panel. - Install wrapper scripts under /usr/sbin - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin) - Chore: Upgrade typescript to 4.6.4. mgr-daemon: - Version 4.3.7-1 * Update translation strings spacecmd: - Version 4.3.21-1 * fix argument parsing of distribution_update (bsc#1210458) - Version 4.3.20-1 * Display activation key details after executing the corresponding command (bsc#1208719) * Show targetted packages before actually removing them (bsc#1207830) uyuni-common-libs: - Version 4.3.8-1 * Allow default component for context manager zypp-plugin-spacewalk: - 1.0.14 * SPEC cleanup dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.noarch.rpm dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1.src.rpm spacecmd-4.3.21-150000.3.98.1.noarch.rpm spacecmd-4.3.21-150000.3.98.1.src.rpm wire-0.5.0-150000.1.12.3.src.rpm wire-0.5.0-150000.1.12.3.x86_64.rpm wire-0.5.0-150000.1.12.3.s390x.rpm wire-0.5.0-150000.1.12.3.ppc64le.rpm wire-0.5.0-150000.1.12.3.aarch64.rpm openSUSE-SLE-15.5-2023-2575 Security update for SUSE Manager Client Tools important SUSE Updates openSUSE-SLE 15.5 This update fixes the following issues: grafana: - Version update from 8.5.22 to 9.5.1 (jsc#PED-3694): * Security fixes: - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645) - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests (bnc#1210907) - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596) - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597) - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501) - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539) - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535) - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185) - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480) - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (bsc#1192696) - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154) - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function * Important changes: - Default named retention policies won't be used to query. Users who have a default named retention policy in their influxdb database, have to rename it to something else. To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy from dropdown and save the panel/dashboard. - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect "For" duration. - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it will default to false. - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4 and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either: Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` or `dashboard.json` - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function in your tests please update your code accordingly. - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3. - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and `getMappedValue` function from grafana-data. See the documentation for the migration. This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. Following this change scheduled alert rules are not updated unless the query is successful. - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds` - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0 won't be decryptable from any previous version (by default) because the way encrypted secrets are stored into the database has changed. Although secrets created or modified with previous versions will still be decryptable by Grafana v9.0. - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to keep envelope encryption disabled once updating to Grafana - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable). - As a final attempt to deal with issues related with the aforementioned situations, the `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to disable envelope encryption and/or roll back to a previous version of Grafana. Alternatively or complementarily to all the points above, backing up the Grafana database before updating could be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those updates/created with after updating to Grafana v9.0). - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode please switch to server access mode on the datasource configuration page. - Environment variables passed from Grafana to external Azure plugins have been renamed: `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`, `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`, `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`. There are no known plugins which were relying on these variables. Moving forward plugins should read Azure settings only via Grafana Azure SDK which properly handles old and new environment variables. - Removes support for for ElasticSearch versions after their end-of-life, currently versions < 7.10.0. To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+. - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally removed in 9.0. Deprecated queries will no longer be executed. - grafana/ui: Button now specifies a default type="button". The `Button` component provided by @grafana/ui now specifies a default `type="button"` when no type is provided. In previous versions, if the attribute was not specified for buttons associated with a `<form>` the default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the type attribute: `<Button type="submit" />` - The `Rename by regex` transformation has been improved to allow global patterns of the form `/<stringToReplace>/g`. Depending on the regex match used, this may cause some transformations to behave slightly differently. You can guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would become `/(.*)/` - `<Select />` menus will now portal to the document body by default. This is to give more consistent behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely remove that prop and behaviour will be the same. If you weren't explicitly setting that prop, there should be no visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}` this will continue to prevent the menu from portalling. - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now expects the data source UID as a path parameter instead of the data source numeric identifier. - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now expect the data source UID as a path parameter instead of the data source numeric identifier. - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect the data source UID as a path parameter instead of the data - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect the data source UID as a path parameter instead of the data source numeric identifier. - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with `error` and `debug`. The precision of timestamps has been increased. To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle `oldlog`. This option will be removed in a future minor release. - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more efficient format. The query-result is represented by a single dataframe with a "labels" column, instead of the separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or Transforms were used, adjustments may be necessary. For example, if you used the "labels to fields" transformation with the logs data, please switch to the "extract fields" transformation. * Deprecations: - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use the `go_sql_stats_*` metrics instead. - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when navigating to Explore using the deprecated format the URLs are automatically converted. If you have existing links pointing to Explore update them using the format generated by Explore upon navigation. You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as an array of strings, for example `&left=["now-1h","now"...]`. The standard explore URLs follow a key/value pattern, for example `&left={"datasource":"test"...}`. Please be sure to check your dashboards for any hardcoded links to Explore and update them to the standard URL pattern. - Chore: Remove deprecated DataSourceAPI methods. - Data: Remove deprecated types and functions from valueMappings. - Elasticsearch: Remove browser access mode. - Elasticsearch: Remove support for versions after their end of the life (<7.10.0). - Explore: Remove support for legacy, compact format URLs. - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels. - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will be removed in a future release. If you need to set a different query editor for Explore, conditionally render based on `props.app` in your regular query editor. * Changes: - User: Fix externalUserId not being populated. If you used any of these components please use them from grafana/experimental from now on: - AccessoryButton - EditorFieldGroup - EditorHeader - EditorField - EditorRow - EditorList - EditorRows - EditorSwitch - FlexItem - Stack - InlineSelect - InputGroup - Space - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL. - Logger: Enable new logging format by default. - Loki: Enable new visual query builder by default. - Plugins: Remove plugin list panel. - Install wrapper scripts under /usr/sbin - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin) - Chore: Upgrade typescript to 4.6.4. grafana-9.5.1-150200.3.41.3.src.rpm grafana-9.5.1-150200.3.41.3.x86_64.rpm grafana-9.5.1-150200.3.41.3.s390x.rpm grafana-9.5.1-150200.3.41.3.ppc64le.rpm grafana-9.5.1-150200.3.41.3.aarch64.rpm openSUSE-SLE-15.5-2023-2253 Security update for terraform-provider-aws important SUSE Updates openSUSE-SLE 15.5 This update of terraform-provider-aws fixes the following issues: - rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658). terraform-provider-aws-3.11.0-150200.6.5.1.src.rpm terraform-provider-aws-3.11.0-150200.6.5.1.x86_64.rpm terraform-provider-aws-3.11.0-150200.6.5.1.s390x.rpm terraform-provider-aws-3.11.0-150200.6.5.1.ppc64le.rpm terraform-provider-aws-3.11.0-150200.6.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-2261 Security update for terraform-provider-null important SUSE Updates openSUSE-SLE 15.5 This update of terraform-provider-null fixes the following issues: - rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658). terraform-provider-null-3.0.0-150200.6.5.1.src.rpm terraform-provider-null-3.0.0-150200.6.5.1.x86_64.rpm terraform-provider-null-3.0.0-150200.6.5.1.s390x.rpm terraform-provider-null-3.0.0-150200.6.5.1.ppc64le.rpm terraform-provider-null-3.0.0-150200.6.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-2273 Security update for geoipupdate important SUSE Updates openSUSE-SLE 15.5 This update of geoipupdate fixes the following issues: - rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658). geoipupdate-4.2.2-150000.1.10.1.src.rpm geoipupdate-4.2.2-150000.1.10.1.x86_64.rpm geoipupdate-legacy-4.2.2-150000.1.10.1.x86_64.rpm geoipupdate-4.2.2-150000.1.10.1.s390x.rpm geoipupdate-legacy-4.2.2-150000.1.10.1.s390x.rpm geoipupdate-4.2.2-150000.1.10.1.ppc64le.rpm geoipupdate-legacy-4.2.2-150000.1.10.1.ppc64le.rpm geoipupdate-4.2.2-150000.1.10.1.aarch64.rpm geoipupdate-legacy-4.2.2-150000.1.10.1.aarch64.rpm openSUSE-SLE-15.5-2023-2297 Security update for golang-github-vpenso-prometheus_slurm_exporter important SUSE Updates openSUSE-SLE 15.5 This update of golang-github-vpenso-prometheus_slurm_exporter fixes the following issues: - rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658). golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1.src.rpm golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1.x86_64.rpm golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1.s390x.rpm golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1.ppc64le.rpm golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-2585 Security update for salt and python-pyzmq moderate SUSE Updates openSUSE-SLE 15.5 This update for salt and python-pyzmq fixes the following issues: salt: - Update to Salt release version 3006.0 (jsc#PED-4361) * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html - Add missing patch after rebase to fix collections Mapping issues - Add python3-looseversion as new dependency for salt - Add python3-packaging as new dependency for salt - Allow entrypoint compatibility for "importlib-metadata>=5.0.0" (bsc#1207071) - Avoid conflicts with Salt dependencies versions (bsc#1211612) - Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754) - Create new salt-tests subpackage containing Salt tests - Drop conflictive patch dicarded from upstream - Fix package build with old setuptools versions - Fix SLS rendering error when Jinja macros are used - Fix version detection and avoid building and testing failures - Prevent deadlocks in salt-ssh executions - Require python3-jmespath runtime dependency (bsc#1209233) - Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517) python-pyzmq: - Update python-pyzmq to version 17.1.2 in LTSS products (bsc#1186945) python-pyzmq-17.1.2-150000.3.5.2.src.rpm True python3-pyzmq-17.1.2-150000.3.5.2.x86_64.rpm True python3-pyzmq-devel-17.1.2-150000.3.5.2.x86_64.rpm True python3-pyzmq-17.1.2-150000.3.5.2.s390x.rpm True python3-pyzmq-devel-17.1.2-150000.3.5.2.s390x.rpm True python3-pyzmq-17.1.2-150000.3.5.2.ppc64le.rpm True python3-pyzmq-devel-17.1.2-150000.3.5.2.ppc64le.rpm True python3-pyzmq-17.1.2-150000.3.5.2.aarch64.rpm True python3-pyzmq-devel-17.1.2-150000.3.5.2.aarch64.rpm True openSUSE-SLE-15.5-2023-2571 Security update for Salt moderate SUSE Updates openSUSE-SLE 15.5 This update for salt fixes the following issues: salt: - Update to Salt release version 3006.0 (jsc#PED-4361) * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html - Add missing patch after rebase to fix collections Mapping issues - Add python3-looseversion as new dependency for salt - Add python3-packaging as new dependency for salt - Allow entrypoint compatibility for "importlib-metadata>=5.0.0" (bsc#1207071) - Avoid conflicts with Salt dependencies versions (bsc#1211612) - Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754) - Create new salt-tests subpackage containing Salt tests - Drop conflictive patch dicarded from upstream - Fix package build with old setuptools versions - Fix SLS rendering error when Jinja macros are used - Fix version detection and avoid building and testing failures - Prevent deadlocks in salt-ssh executions - Require python3-jmespath runtime dependency (bsc#1209233) - Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517) python-jmespath: - Deliver python3-jmespath to SUSE Linux Enterprise Micro on s390x architecture as it is now required by Salt (no source changes) python-ply: - Deliver python3-ply to SUSE Linux Enterprise Micro on s390x architecture as it is a requirement for python-jmespath (no source changes) python-jmespath-0.9.3-150000.3.3.4.src.rpm True python-ply-3.10-150000.3.3.4.src.rpm True python-ply-doc-3.10-150000.3.3.4.noarch.rpm True python-simplejson-3.17.2-150300.3.2.3.src.rpm True python3-jmespath-0.9.3-150000.3.3.4.noarch.rpm True python3-ply-3.10-150000.3.3.4.noarch.rpm True python3-simplejson-3.17.2-150300.3.2.3.x86_64.rpm True python3-simplejson-3.17.2-150300.3.2.3.s390x.rpm True python3-simplejson-3.17.2-150300.3.2.3.ppc64le.rpm True python3-simplejson-3.17.2-150300.3.2.3.aarch64.rpm True openSUSE-SLE-15.5-2023-2236 Security update for python-looseversion critical SUSE Updates openSUSE-SLE 15.5 This update for python-looseversion fixes the following issues: - Provide python-looseversion version 1.0.2 as new Salt 3006 dependency. (jsc#PED-4360) python-looseversion-1.0.2-150100.3.3.1.src.rpm python3-looseversion-1.0.2-150100.3.3.1.noarch.rpm openSUSE-SLE-15.5-2023-2298 Security update for distribution important SUSE Updates openSUSE-SLE 15.5 This update for distribution fixes the following issues: Update to verison 2.8.2: - Revert registry/client: set `Accept: identity` header when getting layers - Parse `http` forbidden as denied - Fix CVE-2023-2253 runaway allocation on /v2/_catalog (bsc#1207705) - Fix panic in inmemory driver - update to go1.19.9 - Add code to handle pagination of parts. Fixes max layer size of 10GB bug - Dockerfile: fix filenames of artifacts distribution-2.8.2-150400.9.21.1.src.rpm distribution-registry-2.8.2-150400.9.21.1.x86_64.rpm distribution-registry-2.8.2-150400.9.21.1.s390x.rpm distribution-registry-2.8.2-150400.9.21.1.ppc64le.rpm distribution-registry-2.8.2-150400.9.21.1.aarch64.rpm openSUSE-SLE-15.5-2023-2518 Security update for frr important SUSE Updates openSUSE-SLE 15.5 This update for frr fixes the following issues: - CVE-2023-31489: Fixed a remote denial of service via a malformed BGP packet (bsc#1211248). - CVE-2023-31490: Fixed a remote denial of service via a malformed BGP packet (bsc#1211249). frr-8.4-150500.4.3.1.src.rpm frr-8.4-150500.4.3.1.x86_64.rpm frr-devel-8.4-150500.4.3.1.x86_64.rpm libfrr0-8.4-150500.4.3.1.x86_64.rpm libfrr_pb0-8.4-150500.4.3.1.x86_64.rpm libfrrcares0-8.4-150500.4.3.1.x86_64.rpm libfrrfpm_pb0-8.4-150500.4.3.1.x86_64.rpm libfrrospfapiclient0-8.4-150500.4.3.1.x86_64.rpm libfrrsnmp0-8.4-150500.4.3.1.x86_64.rpm libfrrzmq0-8.4-150500.4.3.1.x86_64.rpm libmlag_pb0-8.4-150500.4.3.1.x86_64.rpm frr-8.4-150500.4.3.1.s390x.rpm frr-devel-8.4-150500.4.3.1.s390x.rpm libfrr0-8.4-150500.4.3.1.s390x.rpm libfrr_pb0-8.4-150500.4.3.1.s390x.rpm libfrrcares0-8.4-150500.4.3.1.s390x.rpm libfrrfpm_pb0-8.4-150500.4.3.1.s390x.rpm libfrrospfapiclient0-8.4-150500.4.3.1.s390x.rpm libfrrsnmp0-8.4-150500.4.3.1.s390x.rpm libfrrzmq0-8.4-150500.4.3.1.s390x.rpm libmlag_pb0-8.4-150500.4.3.1.s390x.rpm frr-8.4-150500.4.3.1.ppc64le.rpm frr-devel-8.4-150500.4.3.1.ppc64le.rpm libfrr0-8.4-150500.4.3.1.ppc64le.rpm libfrr_pb0-8.4-150500.4.3.1.ppc64le.rpm libfrrcares0-8.4-150500.4.3.1.ppc64le.rpm libfrrfpm_pb0-8.4-150500.4.3.1.ppc64le.rpm libfrrospfapiclient0-8.4-150500.4.3.1.ppc64le.rpm libfrrsnmp0-8.4-150500.4.3.1.ppc64le.rpm libfrrzmq0-8.4-150500.4.3.1.ppc64le.rpm libmlag_pb0-8.4-150500.4.3.1.ppc64le.rpm frr-8.4-150500.4.3.1.aarch64.rpm frr-devel-8.4-150500.4.3.1.aarch64.rpm libfrr0-8.4-150500.4.3.1.aarch64.rpm libfrr_pb0-8.4-150500.4.3.1.aarch64.rpm libfrrcares0-8.4-150500.4.3.1.aarch64.rpm libfrrfpm_pb0-8.4-150500.4.3.1.aarch64.rpm libfrrospfapiclient0-8.4-150500.4.3.1.aarch64.rpm libfrrsnmp0-8.4-150500.4.3.1.aarch64.rpm libfrrzmq0-8.4-150500.4.3.1.aarch64.rpm libmlag_pb0-8.4-150500.4.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2618 Security update for dav1d moderate SUSE Updates openSUSE-SLE 15.5 This update for dav1d fixes the following issues: - CVE-2023-32570: Fixed possible crash when decoding a frame (bsc#1211262). dav1d-1.0.0-150500.3.3.1.src.rpm dav1d-1.0.0-150500.3.3.1.x86_64.rpm dav1d-devel-1.0.0-150500.3.3.1.x86_64.rpm libdav1d6-1.0.0-150500.3.3.1.x86_64.rpm libdav1d6-32bit-1.0.0-150500.3.3.1.x86_64.rpm dav1d-1.0.0-150500.3.3.1.s390x.rpm dav1d-devel-1.0.0-150500.3.3.1.s390x.rpm libdav1d6-1.0.0-150500.3.3.1.s390x.rpm dav1d-1.0.0-150500.3.3.1.ppc64le.rpm dav1d-devel-1.0.0-150500.3.3.1.ppc64le.rpm libdav1d6-1.0.0-150500.3.3.1.ppc64le.rpm dav1d-1.0.0-150500.3.3.1.aarch64.rpm dav1d-devel-1.0.0-150500.3.3.1.aarch64.rpm libdav1d6-1.0.0-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2582 Recommended update for salt moderate SUSE Updates openSUSE-SLE 15.5 This update for salt fixes the following issues: - Update to Salt release version 3006.0 (jsc#PED-3139) * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html - Add python3-looseversion as new dependency for salt - Add python3-packaging as new dependency for salt - Avoid conflicts with Salt dependencies versions (bsc#1211612) - Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754) - Drop conflictive patch dicarded from upstream - Fix package build with old setuptools versions - Fix SLS rendering error when Jinja macros are used - Fix version detection and avoid building and testing failures - Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517) python3-salt-3006.0-150500.4.9.2.x86_64.rpm True salt-3006.0-150500.4.9.2.src.rpm True salt-3006.0-150500.4.9.2.x86_64.rpm True salt-api-3006.0-150500.4.9.2.x86_64.rpm True salt-bash-completion-3006.0-150500.4.9.2.noarch.rpm True salt-cloud-3006.0-150500.4.9.2.x86_64.rpm True salt-doc-3006.0-150500.4.9.2.x86_64.rpm True salt-fish-completion-3006.0-150500.4.9.2.noarch.rpm True salt-master-3006.0-150500.4.9.2.x86_64.rpm True salt-minion-3006.0-150500.4.9.2.x86_64.rpm True salt-proxy-3006.0-150500.4.9.2.x86_64.rpm True salt-ssh-3006.0-150500.4.9.2.x86_64.rpm True salt-standalone-formulas-configuration-3006.0-150500.4.9.2.x86_64.rpm True salt-syndic-3006.0-150500.4.9.2.x86_64.rpm True salt-tests-3006.0-150500.4.9.2.x86_64.rpm True salt-transactional-update-3006.0-150500.4.9.2.x86_64.rpm True salt-zsh-completion-3006.0-150500.4.9.2.noarch.rpm True python3-salt-3006.0-150500.4.9.2.s390x.rpm True salt-3006.0-150500.4.9.2.s390x.rpm True salt-api-3006.0-150500.4.9.2.s390x.rpm True salt-cloud-3006.0-150500.4.9.2.s390x.rpm True salt-doc-3006.0-150500.4.9.2.s390x.rpm True salt-master-3006.0-150500.4.9.2.s390x.rpm True salt-minion-3006.0-150500.4.9.2.s390x.rpm True salt-proxy-3006.0-150500.4.9.2.s390x.rpm True salt-ssh-3006.0-150500.4.9.2.s390x.rpm True salt-standalone-formulas-configuration-3006.0-150500.4.9.2.s390x.rpm True salt-syndic-3006.0-150500.4.9.2.s390x.rpm True salt-tests-3006.0-150500.4.9.2.s390x.rpm True salt-transactional-update-3006.0-150500.4.9.2.s390x.rpm True python3-salt-3006.0-150500.4.9.2.ppc64le.rpm True salt-3006.0-150500.4.9.2.ppc64le.rpm True salt-api-3006.0-150500.4.9.2.ppc64le.rpm True salt-cloud-3006.0-150500.4.9.2.ppc64le.rpm True salt-doc-3006.0-150500.4.9.2.ppc64le.rpm True salt-master-3006.0-150500.4.9.2.ppc64le.rpm True salt-minion-3006.0-150500.4.9.2.ppc64le.rpm True salt-proxy-3006.0-150500.4.9.2.ppc64le.rpm True salt-ssh-3006.0-150500.4.9.2.ppc64le.rpm True salt-standalone-formulas-configuration-3006.0-150500.4.9.2.ppc64le.rpm True salt-syndic-3006.0-150500.4.9.2.ppc64le.rpm True salt-tests-3006.0-150500.4.9.2.ppc64le.rpm True salt-transactional-update-3006.0-150500.4.9.2.ppc64le.rpm True python3-salt-3006.0-150500.4.9.2.aarch64.rpm True salt-3006.0-150500.4.9.2.aarch64.rpm True salt-api-3006.0-150500.4.9.2.aarch64.rpm True salt-cloud-3006.0-150500.4.9.2.aarch64.rpm True salt-doc-3006.0-150500.4.9.2.aarch64.rpm True salt-master-3006.0-150500.4.9.2.aarch64.rpm True salt-minion-3006.0-150500.4.9.2.aarch64.rpm True salt-proxy-3006.0-150500.4.9.2.aarch64.rpm True salt-ssh-3006.0-150500.4.9.2.aarch64.rpm True salt-standalone-formulas-configuration-3006.0-150500.4.9.2.aarch64.rpm True salt-syndic-3006.0-150500.4.9.2.aarch64.rpm True salt-tests-3006.0-150500.4.9.2.aarch64.rpm True salt-transactional-update-3006.0-150500.4.9.2.aarch64.rpm True openSUSE-SLE-15.5-2023-2536 Security update for openvswitch3 important SUSE Updates openSUSE-SLE 15.5 This update for openvswitch3 fixes the following issues: - CVE-2023-1668: Fixed a remote denial of service that could be triggered via malformed IP packets (bsc#1210054). libopenvswitch-3_1-0-3.1.0-150500.3.3.1.x86_64.rpm libovn-23_03-0-23.03.0-150500.3.3.1.x86_64.rpm openvswitch3-3.1.0-150500.3.3.1.src.rpm openvswitch3-3.1.0-150500.3.3.1.x86_64.rpm openvswitch3-devel-3.1.0-150500.3.3.1.x86_64.rpm openvswitch3-doc-3.1.0-150500.3.3.1.noarch.rpm openvswitch3-ipsec-3.1.0-150500.3.3.1.x86_64.rpm openvswitch3-pki-3.1.0-150500.3.3.1.x86_64.rpm openvswitch3-test-3.1.0-150500.3.3.1.x86_64.rpm openvswitch3-vtep-3.1.0-150500.3.3.1.x86_64.rpm ovn3-23.03.0-150500.3.3.1.x86_64.rpm ovn3-central-23.03.0-150500.3.3.1.x86_64.rpm ovn3-devel-23.03.0-150500.3.3.1.x86_64.rpm ovn3-doc-23.03.0-150500.3.3.1.noarch.rpm ovn3-docker-23.03.0-150500.3.3.1.x86_64.rpm ovn3-host-23.03.0-150500.3.3.1.x86_64.rpm ovn3-vtep-23.03.0-150500.3.3.1.x86_64.rpm python3-ovs3-3.1.0-150500.3.3.1.x86_64.rpm libopenvswitch-3_1-0-3.1.0-150500.3.3.1.s390x.rpm libovn-23_03-0-23.03.0-150500.3.3.1.s390x.rpm openvswitch3-3.1.0-150500.3.3.1.s390x.rpm openvswitch3-devel-3.1.0-150500.3.3.1.s390x.rpm openvswitch3-ipsec-3.1.0-150500.3.3.1.s390x.rpm openvswitch3-pki-3.1.0-150500.3.3.1.s390x.rpm openvswitch3-test-3.1.0-150500.3.3.1.s390x.rpm openvswitch3-vtep-3.1.0-150500.3.3.1.s390x.rpm ovn3-23.03.0-150500.3.3.1.s390x.rpm ovn3-central-23.03.0-150500.3.3.1.s390x.rpm ovn3-devel-23.03.0-150500.3.3.1.s390x.rpm ovn3-docker-23.03.0-150500.3.3.1.s390x.rpm ovn3-host-23.03.0-150500.3.3.1.s390x.rpm ovn3-vtep-23.03.0-150500.3.3.1.s390x.rpm python3-ovs3-3.1.0-150500.3.3.1.s390x.rpm libopenvswitch-3_1-0-3.1.0-150500.3.3.1.ppc64le.rpm libovn-23_03-0-23.03.0-150500.3.3.1.ppc64le.rpm openvswitch3-3.1.0-150500.3.3.1.ppc64le.rpm openvswitch3-devel-3.1.0-150500.3.3.1.ppc64le.rpm openvswitch3-ipsec-3.1.0-150500.3.3.1.ppc64le.rpm openvswitch3-pki-3.1.0-150500.3.3.1.ppc64le.rpm openvswitch3-test-3.1.0-150500.3.3.1.ppc64le.rpm openvswitch3-vtep-3.1.0-150500.3.3.1.ppc64le.rpm ovn3-23.03.0-150500.3.3.1.ppc64le.rpm ovn3-central-23.03.0-150500.3.3.1.ppc64le.rpm ovn3-devel-23.03.0-150500.3.3.1.ppc64le.rpm ovn3-docker-23.03.0-150500.3.3.1.ppc64le.rpm ovn3-host-23.03.0-150500.3.3.1.ppc64le.rpm ovn3-vtep-23.03.0-150500.3.3.1.ppc64le.rpm python3-ovs3-3.1.0-150500.3.3.1.ppc64le.rpm libopenvswitch-3_1-0-3.1.0-150500.3.3.1.aarch64.rpm libovn-23_03-0-23.03.0-150500.3.3.1.aarch64.rpm openvswitch3-3.1.0-150500.3.3.1.aarch64.rpm openvswitch3-devel-3.1.0-150500.3.3.1.aarch64.rpm openvswitch3-ipsec-3.1.0-150500.3.3.1.aarch64.rpm openvswitch3-pki-3.1.0-150500.3.3.1.aarch64.rpm openvswitch3-test-3.1.0-150500.3.3.1.aarch64.rpm openvswitch3-vtep-3.1.0-150500.3.3.1.aarch64.rpm ovn3-23.03.0-150500.3.3.1.aarch64.rpm ovn3-central-23.03.0-150500.3.3.1.aarch64.rpm ovn3-devel-23.03.0-150500.3.3.1.aarch64.rpm ovn3-docker-23.03.0-150500.3.3.1.aarch64.rpm ovn3-host-23.03.0-150500.3.3.1.aarch64.rpm ovn3-vtep-23.03.0-150500.3.3.1.aarch64.rpm python3-ovs3-3.1.0-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2383 Recommended update for jansi moderate SUSE Updates openSUSE-SLE 15.5 This update for jansi contains the following fix: - Fetch sources using source_service and don't distribute legally spurious files. (bsc#1210877) jansi-2.4.0-150200.3.7.1.src.rpm jansi-2.4.0-150200.3.7.1.x86_64.rpm jansi-javadoc-2.4.0-150200.3.7.1.noarch.rpm jansi-2.4.0-150200.3.7.1.s390x.rpm jansi-2.4.0-150200.3.7.1.ppc64le.rpm jansi-2.4.0-150200.3.7.1.aarch64.rpm openSUSE-SLE-15.5-2023-2296 Security update for openvswitch important SUSE Updates openSUSE-SLE 15.5 This update for openvswitch fixes the following issues: - CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054). libopenvswitch-2_14-0-2.14.2-150400.24.9.1.x86_64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.x86_64.rpm openvswitch-2.14.2-150400.24.9.1.src.rpm openvswitch-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-devel-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-doc-2.14.2-150400.24.9.1.noarch.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-pki-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-test-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.x86_64.rpm ovn-20.06.2-150400.24.9.1.x86_64.rpm ovn-central-20.06.2-150400.24.9.1.x86_64.rpm ovn-devel-20.06.2-150400.24.9.1.x86_64.rpm ovn-doc-20.06.2-150400.24.9.1.noarch.rpm ovn-docker-20.06.2-150400.24.9.1.x86_64.rpm ovn-host-20.06.2-150400.24.9.1.x86_64.rpm ovn-vtep-20.06.2-150400.24.9.1.x86_64.rpm python3-ovs-2.14.2-150400.24.9.1.x86_64.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.s390x.rpm libovn-20_06-0-20.06.2-150400.24.9.1.s390x.rpm openvswitch-2.14.2-150400.24.9.1.s390x.rpm openvswitch-devel-2.14.2-150400.24.9.1.s390x.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.s390x.rpm openvswitch-pki-2.14.2-150400.24.9.1.s390x.rpm openvswitch-test-2.14.2-150400.24.9.1.s390x.rpm openvswitch-vtep-2.14.2-150400.24.9.1.s390x.rpm ovn-20.06.2-150400.24.9.1.s390x.rpm ovn-central-20.06.2-150400.24.9.1.s390x.rpm ovn-devel-20.06.2-150400.24.9.1.s390x.rpm ovn-docker-20.06.2-150400.24.9.1.s390x.rpm ovn-host-20.06.2-150400.24.9.1.s390x.rpm ovn-vtep-20.06.2-150400.24.9.1.s390x.rpm python3-ovs-2.14.2-150400.24.9.1.s390x.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.ppc64le.rpm libovn-20_06-0-20.06.2-150400.24.9.1.ppc64le.rpm openvswitch-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-devel-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-pki-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-test-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-vtep-2.14.2-150400.24.9.1.ppc64le.rpm ovn-20.06.2-150400.24.9.1.ppc64le.rpm ovn-central-20.06.2-150400.24.9.1.ppc64le.rpm ovn-devel-20.06.2-150400.24.9.1.ppc64le.rpm ovn-docker-20.06.2-150400.24.9.1.ppc64le.rpm ovn-host-20.06.2-150400.24.9.1.ppc64le.rpm ovn-vtep-20.06.2-150400.24.9.1.ppc64le.rpm python3-ovs-2.14.2-150400.24.9.1.ppc64le.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.aarch64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.aarch64.rpm openvswitch-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-devel-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-pki-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-test-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.aarch64.rpm ovn-20.06.2-150400.24.9.1.aarch64.rpm ovn-central-20.06.2-150400.24.9.1.aarch64.rpm ovn-devel-20.06.2-150400.24.9.1.aarch64.rpm ovn-docker-20.06.2-150400.24.9.1.aarch64.rpm ovn-host-20.06.2-150400.24.9.1.aarch64.rpm ovn-vtep-20.06.2-150400.24.9.1.aarch64.rpm python3-ovs-2.14.2-150400.24.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2539 Security update for jetty-minimal moderate SUSE Updates openSUSE-SLE 15.5 This update for jetty-minimal fixes the following issues: Updated to version 9.4.51.v20230217: - CVE-2023-26048: Fixed an excessive memory consumption when processing a large multipart request (bsc#1210620) - CVE-2023-26049: Fixed a cookie exfiltration issue due to improper parsing (bsc#1210621). jetty-annotations-9.4.51-150200.3.19.2.noarch.rpm jetty-ant-9.4.51-150200.3.19.2.noarch.rpm jetty-cdi-9.4.51-150200.3.19.2.noarch.rpm jetty-client-9.4.51-150200.3.19.2.noarch.rpm jetty-continuation-9.4.51-150200.3.19.2.noarch.rpm jetty-deploy-9.4.51-150200.3.19.2.noarch.rpm jetty-fcgi-9.4.51-150200.3.19.2.noarch.rpm jetty-http-9.4.51-150200.3.19.2.noarch.rpm jetty-http-spi-9.4.51-150200.3.19.2.noarch.rpm jetty-io-9.4.51-150200.3.19.2.noarch.rpm jetty-jaas-9.4.51-150200.3.19.2.noarch.rpm jetty-jmx-9.4.51-150200.3.19.2.noarch.rpm jetty-jndi-9.4.51-150200.3.19.2.noarch.rpm jetty-jsp-9.4.51-150200.3.19.2.noarch.rpm jetty-minimal-9.4.51-150200.3.19.2.src.rpm jetty-minimal-javadoc-9.4.51-150200.3.19.2.noarch.rpm jetty-openid-9.4.51-150200.3.19.2.noarch.rpm jetty-plus-9.4.51-150200.3.19.2.noarch.rpm jetty-proxy-9.4.51-150200.3.19.2.noarch.rpm jetty-quickstart-9.4.51-150200.3.19.2.noarch.rpm jetty-rewrite-9.4.51-150200.3.19.2.noarch.rpm jetty-security-9.4.51-150200.3.19.2.noarch.rpm jetty-server-9.4.51-150200.3.19.2.noarch.rpm jetty-servlet-9.4.51-150200.3.19.2.noarch.rpm jetty-servlets-9.4.51-150200.3.19.2.noarch.rpm jetty-start-9.4.51-150200.3.19.2.noarch.rpm jetty-util-9.4.51-150200.3.19.2.noarch.rpm jetty-util-ajax-9.4.51-150200.3.19.2.noarch.rpm jetty-webapp-9.4.51-150200.3.19.2.noarch.rpm jetty-xml-9.4.51-150200.3.19.2.noarch.rpm openSUSE-SLE-15.5-2023-2625 Recommended update for gcc12 moderate SUSE Updates openSUSE-SLE 15.5 This update for gcc12 fixes the following issues: - Update to GCC 12.3 release, 0c61aa720e62f1baf0bfd178e283, git1204 * includes regression and other bug fixes - Speed up builds with --enable-link-serialization. - Update embedded newlib to version 4.2.0 cpp12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-aarch64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-aarch64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-arm-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-arm-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-arm-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-hppa-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-hppa-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-hppa-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-m68k-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-m68k-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-m68k-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-mips-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-mips-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-mips-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-nvptx-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-nvptx-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-ppc64-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-ppc64-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-ppc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-ppc64le-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-ppc64le-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-ppc64le-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.src.rpm cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-s390x-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-s390x-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-s390x-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-sparc-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-sparc-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-sparc64-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-sparc64-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-sparc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm cross-sparcv9-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-12.3.0+git1204-150000.1.10.1.src.rpm gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-PIE-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-ada-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-ada-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-c++-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-c++-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-d-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-d-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-fortran-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-fortran-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-go-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-go-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-info-12.3.0+git1204-150000.1.10.1.noarch.rpm gcc12-locale-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-obj-c++-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-objc-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-objc-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm gcc12-testresults-12.3.0+git1204-150000.1.10.1.src.rpm gcc12-testresults-12.3.0+git1204-150000.1.10.1.x86_64.rpm libada12-12.3.0+git1204-150000.1.10.1.x86_64.rpm libada12-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libasan8-12.3.0+git1204-150000.1.10.1.x86_64.rpm libasan8-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libatomic1-12.3.0+git1204-150000.1.10.1.x86_64.rpm libatomic1-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgcc_s1-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgcc_s1-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgdruntime3-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgdruntime3-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgfortran5-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgfortran5-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgo21-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgo21-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgomp1-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgomp1-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgphobos3-12.3.0+git1204-150000.1.10.1.x86_64.rpm libgphobos3-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libitm1-12.3.0+git1204-150000.1.10.1.x86_64.rpm libitm1-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm liblsan0-12.3.0+git1204-150000.1.10.1.x86_64.rpm libobjc4-12.3.0+git1204-150000.1.10.1.x86_64.rpm libobjc4-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libquadmath0-12.3.0+git1204-150000.1.10.1.x86_64.rpm libquadmath0-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-locale-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-pp-12.3.0+git1204-150000.1.10.1.x86_64.rpm libstdc++6-pp-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm libtsan2-12.3.0+git1204-150000.1.10.1.x86_64.rpm libubsan1-12.3.0+git1204-150000.1.10.1.x86_64.rpm libubsan1-32bit-12.3.0+git1204-150000.1.10.1.x86_64.rpm cpp12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-aarch64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-arm-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-arm-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-hppa-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-hppa-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-m68k-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-m68k-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-mips-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-mips-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-ppc64-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-ppc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-ppc64le-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-ppc64le-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-sparc-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-sparc64-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-sparc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-sparcv9-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-x86_64-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm cross-x86_64-gcc12-12.3.0+git1204-150000.1.10.1.src.rpm cross-x86_64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-PIE-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-ada-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-ada-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-c++-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-c++-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-d-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-d-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-fortran-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-fortran-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-go-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-go-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-locale-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-obj-c++-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-objc-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-objc-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm gcc12-testresults-12.3.0+git1204-150000.1.10.1.s390x.rpm libada12-12.3.0+git1204-150000.1.10.1.s390x.rpm libada12-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libasan8-12.3.0+git1204-150000.1.10.1.s390x.rpm libasan8-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libatomic1-12.3.0+git1204-150000.1.10.1.s390x.rpm libatomic1-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgcc_s1-12.3.0+git1204-150000.1.10.1.s390x.rpm libgcc_s1-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgdruntime3-12.3.0+git1204-150000.1.10.1.s390x.rpm libgdruntime3-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgfortran5-12.3.0+git1204-150000.1.10.1.s390x.rpm libgfortran5-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgo21-12.3.0+git1204-150000.1.10.1.s390x.rpm libgo21-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgomp1-12.3.0+git1204-150000.1.10.1.s390x.rpm libgomp1-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libgphobos3-12.3.0+git1204-150000.1.10.1.s390x.rpm libgphobos3-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libitm1-12.3.0+git1204-150000.1.10.1.s390x.rpm libitm1-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm liblsan0-12.3.0+git1204-150000.1.10.1.s390x.rpm libobjc4-12.3.0+git1204-150000.1.10.1.s390x.rpm libobjc4-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-locale-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-pp-12.3.0+git1204-150000.1.10.1.s390x.rpm libstdc++6-pp-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm libtsan2-12.3.0+git1204-150000.1.10.1.s390x.rpm libubsan1-12.3.0+git1204-150000.1.10.1.s390x.rpm libubsan1-32bit-12.3.0+git1204-150000.1.10.1.s390x.rpm cpp12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-aarch64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-arm-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-arm-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-hppa-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-hppa-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-m68k-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-m68k-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-mips-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-mips-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-ppc64-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-ppc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-s390x-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-s390x-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-sparc-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-sparc64-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-sparc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-sparcv9-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-x86_64-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cross-x86_64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-PIE-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-ada-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-c++-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-fortran-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-go-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-locale-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-obj-c++-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-objc-12.3.0+git1204-150000.1.10.1.ppc64le.rpm gcc12-testresults-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libada12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libasan8-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libatomic1-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libgcc_s1-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libgfortran5-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libgo21-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libgomp1-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libitm1-12.3.0+git1204-150000.1.10.1.ppc64le.rpm liblsan0-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libobjc4-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libquadmath0-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libstdc++6-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libstdc++6-locale-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libstdc++6-pp-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libtsan2-12.3.0+git1204-150000.1.10.1.ppc64le.rpm libubsan1-12.3.0+git1204-150000.1.10.1.ppc64le.rpm cpp12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-arm-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-arm-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-hppa-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-hppa-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-m68k-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-m68k-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-mips-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-mips-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-ppc64-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-ppc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-ppc64le-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-ppc64le-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-s390x-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-s390x-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-sparc-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-sparc64-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-sparc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-sparcv9-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-x86_64-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm cross-x86_64-gcc12-icecream-backend-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-PIE-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-ada-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-c++-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-d-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-fortran-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-go-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-locale-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-obj-c++-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-objc-12.3.0+git1204-150000.1.10.1.aarch64.rpm gcc12-testresults-12.3.0+git1204-150000.1.10.1.aarch64.rpm libada12-12.3.0+git1204-150000.1.10.1.aarch64.rpm libasan8-12.3.0+git1204-150000.1.10.1.aarch64.rpm libatomic1-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgcc_s1-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgdruntime3-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgfortran5-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgo21-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgomp1-12.3.0+git1204-150000.1.10.1.aarch64.rpm libgphobos3-12.3.0+git1204-150000.1.10.1.aarch64.rpm libhwasan0-12.3.0+git1204-150000.1.10.1.aarch64.rpm libitm1-12.3.0+git1204-150000.1.10.1.aarch64.rpm liblsan0-12.3.0+git1204-150000.1.10.1.aarch64.rpm libobjc4-12.3.0+git1204-150000.1.10.1.aarch64.rpm libstdc++6-12.3.0+git1204-150000.1.10.1.aarch64.rpm libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.10.1.aarch64.rpm libstdc++6-locale-12.3.0+git1204-150000.1.10.1.aarch64.rpm libstdc++6-pp-12.3.0+git1204-150000.1.10.1.aarch64.rpm libtsan2-12.3.0+git1204-150000.1.10.1.aarch64.rpm libubsan1-12.3.0+git1204-150000.1.10.1.aarch64.rpm openSUSE-SLE-15.5-2023-2313 Security update for c-ares important SUSE Updates openSUSE-SLE 15.5 This update for c-ares fixes the following issues: Update to version 1.19.1: - CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604) - CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605) - CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606) - CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607) - Fix uninitialized memory warning in test - ares_getaddrinfo() should allow a port of 0 - Fix memory leak in ares_send() on error - Fix comment style in ares_data.h - Fix typo in ares_init_options.3 - Sync ax_pthread.m4 with upstream - Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support c-ares-1.19.1-150000.3.23.1.src.rpm c-ares-devel-1.19.1-150000.3.23.1.x86_64.rpm c-ares-utils-1.19.1-150000.3.23.1.x86_64.rpm libcares2-1.19.1-150000.3.23.1.x86_64.rpm libcares2-32bit-1.19.1-150000.3.23.1.x86_64.rpm c-ares-devel-1.19.1-150000.3.23.1.s390x.rpm c-ares-utils-1.19.1-150000.3.23.1.s390x.rpm libcares2-1.19.1-150000.3.23.1.s390x.rpm c-ares-devel-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-utils-1.19.1-150000.3.23.1.ppc64le.rpm libcares2-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-devel-1.19.1-150000.3.23.1.aarch64.rpm c-ares-utils-1.19.1-150000.3.23.1.aarch64.rpm libcares2-1.19.1-150000.3.23.1.aarch64.rpm openSUSE-SLE-15.5-2023-2505 Security update for tomcat important SUSE Updates openSUSE-SLE 15.5 This update for tomcat fixes the following issues: Updated to version 9.0.75: - CVE-2023-28709: Mended an incomplete fix for CVE-2023-24998 (bsc#1208513, bsc#1211608). tomcat-9.0.75-150200.41.1.noarch.rpm tomcat-9.0.75-150200.41.1.src.rpm tomcat-admin-webapps-9.0.75-150200.41.1.noarch.rpm tomcat-docs-webapp-9.0.75-150200.41.1.noarch.rpm tomcat-el-3_0-api-9.0.75-150200.41.1.noarch.rpm tomcat-embed-9.0.75-150200.41.1.noarch.rpm tomcat-javadoc-9.0.75-150200.41.1.noarch.rpm tomcat-jsp-2_3-api-9.0.75-150200.41.1.noarch.rpm tomcat-jsvc-9.0.75-150200.41.1.noarch.rpm tomcat-lib-9.0.75-150200.41.1.noarch.rpm tomcat-servlet-4_0-api-9.0.75-150200.41.1.noarch.rpm tomcat-webapps-9.0.75-150200.41.1.noarch.rpm openSUSE-SLE-15.5-2023-2390 Security update for apache-commons-fileupload important SUSE Updates openSUSE-SLE 15.5 This update for apache-commons-fileupload fixes the following issues: Updated to version 1.5: - CVE-2023-24998: Added a configurable maximum number of files to upload per request (bsc#1208513). apache-commons-fileupload-1.5-150200.3.9.1.noarch.rpm apache-commons-fileupload-1.5-150200.3.9.1.src.rpm apache-commons-fileupload-javadoc-1.5-150200.3.9.1.noarch.rpm openSUSE-SLE-15.5-2023-2312 Security update for go1.18-openssl important SUSE Updates openSUSE-SLE 15.5 This update for go1.18-openssl fixes the following issues: - Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962) * Main go1.x package included libstd.so in previous versions * Split libstd.so into subpackage that can be installed standalone * Continues the slimming down of main go1.x package by 40 Mb * Experimental and not recommended for general use, Go currently has no ABI * Upstream Go has not committed to support buildmode=shared long-term * Do not use in packaging, build static single binaries (the default) * Upstream Go go1.x binary releases do not include libstd.so * go1.x Suggests go1.x-libstd so not installed by default Recommends * go1.x-libstd does not Require: go1.x so can install standalone * Provides go-libstd unversioned package name * Fix build step -buildmode=shared std to omit -linkshared - Packaging improvements: * go1.x Suggests go1.x-doc so not installed by default Recommends * Use Group: Development/Languages/Go instead of Other - Improvements to go1.x packaging spec: * On Tumbleweed bootstrap with current default gcc13 and gccgo118 * On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap using go1.x package (%bcond_without gccgo). This is no longer needed on current SLE-12:Update and removing will consolidate the build configurations used. * Change source URLs to go.dev as per Go upstream * On x86_64 export GOAMD64=v1 as per the current baseline. At this time forgo GOAMD64=v3 option for x86_64_v3 support. * On x86_64 %define go_amd64=v1 as current instruction baseline - Update to version 1.18.10.1 cut from the go1.18-openssl-fips branch at the revision tagged go1.18.10-1-openssl-fips. * Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips * Merge go1.18.10 into dev.boringcrypto.go1.18 - go1.18.10 (released 2023-01-10) includes fixes to cgo, the compiler, the linker, and the crypto/x509, net/http, and syscall packages. Refs bsc#1193742 go1.18 release tracking * go#57705 misc/cgo: backport needed for dlltool fix * go#57426 crypto/x509: Verify on macOS does not return typed errors * go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its "old" argument. * go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices * go#57213 os: TestLstat failure on Linux Aarch64 * go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length * go#57057 cmd/go: remove test dependency on gopkg.in service * go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders * go#57044 cgo: malformed DWARF TagVariable entry * go#57028 cmd/cgo: Wrong types in compiler errors with clang 14 * go#56833 cmd/link/internal/ppc64: too-far trampoline is reused * go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target * go#56323 net/http: bad handling of HEAD requests with a body go1.18-openssl-1.18.10.1-150000.1.9.1.src.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2347 Security update for cups important SUSE Updates openSUSE-SLE 15.5 This update for cups fixes the following issues: - CVE-2023-32324: Fixed a buffer overflow in format_log_line() which could cause a denial-of-service (bsc#1211643). cups-2.2.7-150000.3.43.1.src.rpm cups-2.2.7-150000.3.43.1.x86_64.rpm cups-client-2.2.7-150000.3.43.1.x86_64.rpm cups-config-2.2.7-150000.3.43.1.x86_64.rpm cups-ddk-2.2.7-150000.3.43.1.x86_64.rpm cups-devel-2.2.7-150000.3.43.1.x86_64.rpm cups-devel-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcups2-2.2.7-150000.3.43.1.x86_64.rpm libcups2-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupscgi1-2.2.7-150000.3.43.1.x86_64.rpm libcupscgi1-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsimage2-2.2.7-150000.3.43.1.x86_64.rpm libcupsimage2-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsmime1-2.2.7-150000.3.43.1.x86_64.rpm libcupsmime1-32bit-2.2.7-150000.3.43.1.x86_64.rpm libcupsppdc1-2.2.7-150000.3.43.1.x86_64.rpm libcupsppdc1-32bit-2.2.7-150000.3.43.1.x86_64.rpm cups-2.2.7-150000.3.43.1.s390x.rpm cups-client-2.2.7-150000.3.43.1.s390x.rpm cups-config-2.2.7-150000.3.43.1.s390x.rpm cups-ddk-2.2.7-150000.3.43.1.s390x.rpm cups-devel-2.2.7-150000.3.43.1.s390x.rpm libcups2-2.2.7-150000.3.43.1.s390x.rpm libcupscgi1-2.2.7-150000.3.43.1.s390x.rpm libcupsimage2-2.2.7-150000.3.43.1.s390x.rpm libcupsmime1-2.2.7-150000.3.43.1.s390x.rpm libcupsppdc1-2.2.7-150000.3.43.1.s390x.rpm cups-2.2.7-150000.3.43.1.ppc64le.rpm cups-client-2.2.7-150000.3.43.1.ppc64le.rpm cups-config-2.2.7-150000.3.43.1.ppc64le.rpm cups-ddk-2.2.7-150000.3.43.1.ppc64le.rpm cups-devel-2.2.7-150000.3.43.1.ppc64le.rpm libcups2-2.2.7-150000.3.43.1.ppc64le.rpm libcupscgi1-2.2.7-150000.3.43.1.ppc64le.rpm libcupsimage2-2.2.7-150000.3.43.1.ppc64le.rpm libcupsmime1-2.2.7-150000.3.43.1.ppc64le.rpm libcupsppdc1-2.2.7-150000.3.43.1.ppc64le.rpm cups-2.2.7-150000.3.43.1.aarch64.rpm cups-client-2.2.7-150000.3.43.1.aarch64.rpm cups-config-2.2.7-150000.3.43.1.aarch64.rpm cups-ddk-2.2.7-150000.3.43.1.aarch64.rpm cups-devel-2.2.7-150000.3.43.1.aarch64.rpm libcups2-2.2.7-150000.3.43.1.aarch64.rpm libcupscgi1-2.2.7-150000.3.43.1.aarch64.rpm libcupsimage2-2.2.7-150000.3.43.1.aarch64.rpm libcupsmime1-2.2.7-150000.3.43.1.aarch64.rpm libcupsppdc1-2.2.7-150000.3.43.1.aarch64.rpm openSUSE-SLE-15.5-2023-2479 Security update for mariadb low SUSE Updates openSUSE-SLE 15.5 This update for mariadb fixes the following issues: Updated to version 10.6.13: - CVE-2022-47015: Fixed a denial of service that could be triggered by a crafted SQL query (bsc#1207404). libmariadbd-devel-10.6.13-150400.3.23.1.x86_64.rpm libmariadbd19-10.6.13-150400.3.23.1.x86_64.rpm mariadb-10.6.13-150400.3.23.1.src.rpm mariadb-10.6.13-150400.3.23.1.x86_64.rpm mariadb-bench-10.6.13-150400.3.23.1.x86_64.rpm mariadb-client-10.6.13-150400.3.23.1.x86_64.rpm mariadb-errormessages-10.6.13-150400.3.23.1.noarch.rpm mariadb-galera-10.6.13-150400.3.23.1.x86_64.rpm mariadb-rpm-macros-10.6.13-150400.3.23.1.x86_64.rpm mariadb-test-10.6.13-150400.3.23.1.x86_64.rpm mariadb-tools-10.6.13-150400.3.23.1.x86_64.rpm libmariadbd-devel-10.6.13-150400.3.23.1.s390x.rpm libmariadbd19-10.6.13-150400.3.23.1.s390x.rpm mariadb-10.6.13-150400.3.23.1.s390x.rpm mariadb-bench-10.6.13-150400.3.23.1.s390x.rpm mariadb-client-10.6.13-150400.3.23.1.s390x.rpm mariadb-galera-10.6.13-150400.3.23.1.s390x.rpm mariadb-rpm-macros-10.6.13-150400.3.23.1.s390x.rpm mariadb-test-10.6.13-150400.3.23.1.s390x.rpm mariadb-tools-10.6.13-150400.3.23.1.s390x.rpm libmariadbd-devel-10.6.13-150400.3.23.1.ppc64le.rpm libmariadbd19-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-bench-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-client-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-galera-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-rpm-macros-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-test-10.6.13-150400.3.23.1.ppc64le.rpm mariadb-tools-10.6.13-150400.3.23.1.ppc64le.rpm libmariadbd-devel-10.6.13-150400.3.23.1.aarch64.rpm libmariadbd19-10.6.13-150400.3.23.1.aarch64.rpm mariadb-10.6.13-150400.3.23.1.aarch64.rpm mariadb-bench-10.6.13-150400.3.23.1.aarch64.rpm mariadb-client-10.6.13-150400.3.23.1.aarch64.rpm mariadb-galera-10.6.13-150400.3.23.1.aarch64.rpm mariadb-rpm-macros-10.6.13-150400.3.23.1.aarch64.rpm mariadb-test-10.6.13-150400.3.23.1.aarch64.rpm mariadb-tools-10.6.13-150400.3.23.1.aarch64.rpm openSUSE-SLE-15.5-2023-2541 Security update for kubernetes1.18 important SUSE Updates openSUSE-SLE 15.5 This update for kubernetes1.18 fixes the following issues: - CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630). - CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631). kubernetes1.18-1.18.10-150200.5.10.1.src.rpm kubernetes1.18-client-1.18.10-150200.5.10.1.x86_64.rpm kubernetes1.18-client-common-1.18.10-150200.5.10.1.x86_64.rpm kubernetes1.18-client-1.18.10-150200.5.10.1.s390x.rpm kubernetes1.18-client-common-1.18.10-150200.5.10.1.s390x.rpm kubernetes1.18-client-1.18.10-150200.5.10.1.ppc64le.rpm kubernetes1.18-client-common-1.18.10-150200.5.10.1.ppc64le.rpm kubernetes1.18-client-1.18.10-150200.5.10.1.aarch64.rpm kubernetes1.18-client-common-1.18.10-150200.5.10.1.aarch64.rpm openSUSE-SLE-15.5-2023-2334 Security update for tiff moderate SUSE Updates openSUSE-SLE 15.5 This update for tiff fixes the following issues: Fixed multiple out of bounds read/write security issues: CVE-2023-0795 (bsc#1208226), CVE-2023-0796 (bsc#1208227), CVE-2023-0797 (bsc#1208228), CVE-2023-0798 (bsc#1208229), CVE-2023-0799 (bsc#1208230), CVE-2023-0800 (bsc#1208231), CVE-2023-0801 (bsc#1208232), CVE-2023-0802 (bsc#1208233), CVE-2023-0803 (bsc#1208234), CVE-2023-0804 (bsc#1208236). libtiff-devel-32bit-4.0.9-150000.45.28.1.x86_64.rpm libtiff-devel-4.0.9-150000.45.28.1.x86_64.rpm libtiff5-32bit-4.0.9-150000.45.28.1.x86_64.rpm libtiff5-4.0.9-150000.45.28.1.x86_64.rpm tiff-4.0.9-150000.45.28.1.src.rpm tiff-4.0.9-150000.45.28.1.x86_64.rpm libtiff-devel-4.0.9-150000.45.28.1.s390x.rpm libtiff5-4.0.9-150000.45.28.1.s390x.rpm tiff-4.0.9-150000.45.28.1.s390x.rpm libtiff-devel-4.0.9-150000.45.28.1.ppc64le.rpm libtiff5-4.0.9-150000.45.28.1.ppc64le.rpm tiff-4.0.9-150000.45.28.1.ppc64le.rpm libtiff-devel-4.0.9-150000.45.28.1.aarch64.rpm libtiff5-4.0.9-150000.45.28.1.aarch64.rpm tiff-4.0.9-150000.45.28.1.aarch64.rpm openSUSE-SLE-15.5-2023-2598 Security update for golang-github-prometheus-prometheus important SUSE Updates openSUSE-SLE 15.5 This update for golang-github-prometheus-prometheus fixes the following issues: golang-github-prometheus-prometheus: - Security issues fixed in this version update to 2.37.6: * CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576) * CVE-2022-41715: Update our regexp library to fix upstream (bsc#1204023) * CVE-2022-41723: Fixed go issue to avoid quadratic complexity in HPACK decoding (bsc#1208298) - Other non-security bugs fixed and changes in this version update to 2.37.6: * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak. * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup. * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired. * [BUGFIX] Properly close file descriptor when logging unfinished queries. * [BUGFIX] TSDB: In the WAL watcher metrics, expose the type="exemplar" label instead of type="unknown" for exemplar records. * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued. * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file. * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures. * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads. * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled. * [BUGFIX] TSDB: Fix panic if series is not found when deleting series. * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors. * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration values. * [BUGFIX] Fix serving of static assets like fonts and favicon. * [BUGFIX] promtool: Add --lint-fatal option. * [BUGFIX] Changing TotalQueryableSamples from int to int64. * [BUGFIX] tsdb/agent: Ignore duplicate exemplars. * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate. * [BUGFIX] Stop rule manager before TSDB is stopped. * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io. * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly. * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page. * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false. * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments. * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue. * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset. * [BUGFIX] UI: Fix bug that sets the range input to the resolution. * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled. * [BUGFIX] Parser: Specify type in metadata parser errors. * [BUGFIX] Scrape: Fix label limit changes not applying. * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch. * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk. * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set. * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set. * [BUGFIX] Remote-write: Fix deadlock when stopping a shard. * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s. * [BUGFIX] Promtool: Make exit codes more consistent. * [BUGFIX] Promtool: Fix flakiness of rule testing. * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write irrecoverably fails. * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator. * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks. * [BUGFIX] TSDB: Fix logging of exemplar storage size. * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes. * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets. * [BUGFIX] UI: Fix autocompletion when expression is empty. * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write. * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts. * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting in a new exit code (3) for linter errors. * [CHANGE] UI: Classic UI removed. * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing. * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features. * [CHANGE] Web: Promote remote-write-receiver to stable. * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery. * [FEATURE] Add lowercase and uppercase relabel action. * [FEATURE] SD: Add IONOS Cloud integration. * [FEATURE] SD: Add Vultr integration. * [FEATURE] SD: Add Linode SD failure count metric. * [FEATURE] Add prometheus_ready metric. * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. Enable with the flag `--enable-feature=auto-gomaxprocs`. * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. Additionally, per-step statistics are available with --enable-feature=promql-per-step-stats and using stats=all in the query API. Enable with the flag `--enable-feature=per-step-stats`. * [FEATURE] Config: Add stripPort template function. * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended. * [FEATURE] SD: Enable target discovery in own K8s namespace. * [FEATURE] SD: Add provider ID label in K8s SD. * [FEATURE] Web: Add limit field to the rules API. * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role. * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels. * [ENHANCEMENT] TSDB: Memory optimizations. * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL. * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header. * [ENHANCEMENT] Add stripDomain to template function. * [ENHANCEMENT] UI: Enable active search through dropped targets. * [ENHANCEMENT] promtool: support matchers when querying label * [ENHANCEMENT] Add agent mode identifier. * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup. * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures. * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration. * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1 EndpointSlice (previously only discovery.k8s.io/v1beta1 EndpointSlice was supported). * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods. * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens. * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2. * [ENHANCEMENT] Config: Support overriding minimum TLS version. * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag `--storage.tsdb.head-chunks-write-queue-size`. * [ENHANCEMENT] HTTP SD: Add a failure counter. * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests. * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni. * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape. * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1. * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read. * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar. * [ENHANCEMENT] UI: Improve graph colors that were hard to see. * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels. * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces. * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver. * [ENHANCEMENT] Remote-write: Shard up more when backlogged. * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance. * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap. * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write. * [ENHANCEMENT] TSDB: Improve label matching performance. * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar. * [ENHANCEMENT] UI: Optimize the target page and add a search bar. firewalld-prometheus-config-0.1-150100.4.17.1.x86_64.rpm golang-github-prometheus-prometheus-2.37.6-150100.4.17.1.src.rpm golang-github-prometheus-prometheus-2.37.6-150100.4.17.1.x86_64.rpm firewalld-prometheus-config-0.1-150100.4.17.1.s390x.rpm golang-github-prometheus-prometheus-2.37.6-150100.4.17.1.s390x.rpm firewalld-prometheus-config-0.1-150100.4.17.1.ppc64le.rpm golang-github-prometheus-prometheus-2.37.6-150100.4.17.1.ppc64le.rpm firewalld-prometheus-config-0.1-150100.4.17.1.aarch64.rpm golang-github-prometheus-prometheus-2.37.6-150100.4.17.1.aarch64.rpm openSUSE-SLE-15.5-2023-2430 Recommended update for supportutils-plugin-suse-public-cloud critical SUSE Updates openSUSE-SLE 15.5 This update for supportutils-plugin-suse-public-cloud fixes the following issues: - This update will be delivered to SLE Micro. (SMO-219) supportutils-plugin-suse-public-cloud-1.0.7-150000.3.14.1.noarch.rpm supportutils-plugin-suse-public-cloud-1.0.7-150000.3.14.1.src.rpm openSUSE-SLE-15.5-2023-2331 Security update for openssl-1_0_0 important SUSE Updates openSUSE-SLE 15.5 This update for openssl-1_0_0 fixes the following issues: - CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430). libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl10-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.x86_64.rpm libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.src.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.x86_64.rpm openssl-1_0_0-doc-1.0.2p-150000.3.76.1.noarch.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.s390x.rpm libopenssl10-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.s390x.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.s390x.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.s390x.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.s390x.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl10-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.ppc64le.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.ppc64le.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.ppc64le.rpm libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl10-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1.aarch64.rpm libopenssl1_0_0-steam-1.0.2p-150000.3.76.1.aarch64.rpm openssl-1_0_0-1.0.2p-150000.3.76.1.aarch64.rpm openssl-1_0_0-cavs-1.0.2p-150000.3.76.1.aarch64.rpm openSUSE-SLE-15.5-2023-2535 Security update for xen important SUSE Updates openSUSE-SLE 15.5 This update for xen fixes the following issues: Security fixes: - CVE-2022-42336: Fix an issue where guests configuring AMD Speculative Store Bypass Disable would have no effect (XSA-431) (bsc#1211433). - CVE-2022-42335: Fixed an issue where guests running under shadow mode with a PCI devices passed through could force the hypervisor to dereference arbitrary memory, leading to a denial of service (XSA-430) (bsc#1210315). Non-security fixes: - Fixed a build warning false positive (bsc#1210570). - Added missing debug-info to xen-syms (bsc#1209237). - Updated to version 4.17.1 (bsc#1027519). - Fixed a failure during VM destruction when using host-assisted kexec and kdump (bsc#1209245). - Other upstream fixes (bsc#1027519). xen-4.17.1_04-150500.3.3.1.src.rpm True xen-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-devel-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-doc-html-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-libs-32bit-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-libs-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-tools-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-tools-domU-4.17.1_04-150500.3.3.1.x86_64.rpm True xen-tools-xendomains-wait-disk-4.17.1_04-150500.3.3.1.noarch.rpm True xen-4.17.1_04-150500.3.3.1.aarch64.rpm True xen-devel-4.17.1_04-150500.3.3.1.aarch64.rpm True xen-doc-html-4.17.1_04-150500.3.3.1.aarch64.rpm True xen-libs-4.17.1_04-150500.3.3.1.aarch64.rpm True xen-tools-4.17.1_04-150500.3.3.1.aarch64.rpm True xen-tools-domU-4.17.1_04-150500.3.3.1.aarch64.rpm True openSUSE-SLE-15.5-2023-2320 Security update for wireshark moderate SUSE Updates openSUSE-SLE 15.5 This update for wireshark fixes the following issues: Updated to version 3.6.14: - CVE-2023-2855: Fixed a crash in the Candump log file parser (boo#1211703). - CVE-2023-2856: Fixed a crash in the VMS TCPIPtrace file parser (boo#1211707). - CVE-2023-2857: Fixed a crash in the BLF file parser (boo#1211705). - CVE-2023-2858: Fixed a crash in the NetScaler file parser (boo#1211706). - CVE-2023-0668: Fixed a crash in the IEEE C37.118 Synchrophasor dissector (boo#1211710). - CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793). Further features, bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-3.6.14.html libwireshark15-3.6.14-150000.3.92.1.x86_64.rpm libwiretap12-3.6.14-150000.3.92.1.x86_64.rpm libwsutil13-3.6.14-150000.3.92.1.x86_64.rpm wireshark-3.6.14-150000.3.92.1.src.rpm wireshark-3.6.14-150000.3.92.1.x86_64.rpm wireshark-devel-3.6.14-150000.3.92.1.x86_64.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.x86_64.rpm libwireshark15-3.6.14-150000.3.92.1.s390x.rpm libwiretap12-3.6.14-150000.3.92.1.s390x.rpm libwsutil13-3.6.14-150000.3.92.1.s390x.rpm wireshark-3.6.14-150000.3.92.1.s390x.rpm wireshark-devel-3.6.14-150000.3.92.1.s390x.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.s390x.rpm libwireshark15-3.6.14-150000.3.92.1.ppc64le.rpm libwiretap12-3.6.14-150000.3.92.1.ppc64le.rpm libwsutil13-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-devel-3.6.14-150000.3.92.1.ppc64le.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.ppc64le.rpm libwireshark15-3.6.14-150000.3.92.1.aarch64.rpm libwiretap12-3.6.14-150000.3.92.1.aarch64.rpm libwsutil13-3.6.14-150000.3.92.1.aarch64.rpm wireshark-3.6.14-150000.3.92.1.aarch64.rpm wireshark-devel-3.6.14-150000.3.92.1.aarch64.rpm wireshark-ui-qt-3.6.14-150000.3.92.1.aarch64.rpm openSUSE-SLE-15.5-2023-2381 Recommended update for bouncycastle moderate SUSE Updates openSUSE-SLE 15.5 This update for bouncycastle fixes the following issues: bouncycastle was updated to version 1.73: [jsc#PED-3756] Defects Fixed: - BCJSSE: Instantiating a JSSE provider in some contexts could cause an AccessControl exception. - The EC key pair generator can generate out of range private keys when used with SM2. A specific SM2KeyPairGenerator has been added to the low-level API and is used by KeyPairGenerator.getInstance("SM2", "BC"). The SM2 signer has been updated to check for out of range keys as well.. - The attached signature type byte was still present in Falcon signatures as well as the detached signature byte. - There was an off-by-one error in engineGetOutputSize() for ECIES. - The method for invoking read() internally in BCPGInputStream could result in inconsistent behaviour if the class was extended. - Fixed a rounding issue with FF1 Format Preserving Encryption algorithm for certain radices. - Fixed RFC3394WrapEngine handling of 64 bit keys. - Internal buffer for blake2sp was too small and could result in an ArrayIndexOutOfBoundsException. - JCA PSS Signatures using SHAKE128 and SHAKE256 now support encoding of algorithm parameters. - PKCS10CertificationRequest now checks for empty extension parameters. - Parsing errors in the processing of PGP Armored Data now throw an explicit exception ArmoredInputException. - PGP AEAD streams could occassionally be truncated. - The ESTService class now supports processing of chunked HTTP data. - A constructed ASN.1 OCTET STRING with a single member would sometimes be re-encoded as a definite-length OCTET STRING. The encoding has been adjusted to preserve the BER status of the object. - PKIXCertPathReviewer could fail if the trust anchor was also included in the certificate store being used for path analysis. - UTF-8 parsing of an array range ignored the provided length. - IPAddress has been written to provide stricter checking and avoid the use of Integer.parseInt(). - A Java 7 class snuck into the Java 5 to Java 8 build. Additional Features and Functionality: - The Rainbow NIST Post Quantum Round-3 Candidate has been added to the low-level API and the BCPQC provider (level 3 and level 5 parameter sets only). - The GeMSS NIST Post Quantum Round-3 Candidate has been added to the low-level API. - The org.bouncycastle.rsa.max_mr_tests property check has been added to allow capping of MR tests done on RSA moduli. - Significant performance improvements in PQC algorithms, especially BIKE, CMCE, Frodo, HQC, Picnic. - EdDSA verification now conforms to the recommendations of Taming the many EdDSAs, in particular cofactored verification. As a side benefit, Pornin's basis reduction is now used for EdDSA verification, giving a significant performance boost. - Major performance improvements for Anomalous Binary (Koblitz) Curves. - The lightweight Cryptography finalists Ascon, ISAP, Elephant, PhotonBeetle, Sparkle, and Xoodyak have been added to the light-weight cryptography API. - BLAKE2bp and BLAKE2sp have been added to the light-weight cryptography API. - Support has been added for X.509, Section 9.8, hybrid certificates and CRLs using alternate public keys and alternate signatures. - The property "org.bouncycastle.emulate.oracle" has been added to signal the provider should return algorithm names on some algorithms in the same manner as the Oracle JCE provider. - An extra replaceSigners method has been added to CMSSignedData which allows for specifying the digest algorithm IDs to be used in the new CMSSignedData object. - Parsing and re-encoding of ASN.1 PEM data has been further optimized to prevent unecessary conversions between basic encoding, definite length, and DER. - Support has been added for KEM ciphers in CMS in accordance with draft-ietf-lamps-cms-kemri - Support has been added for certEncr in CRMF to allow issuing of certificates for KEM public keys. - Further speedups have been made to CRC24. - GCMParameterSpec constructor caching has been added to improve performance for JVMs that have the class available. - The PGPEncrytedDataGenerator now supports injecting the session key to be used for PGP PBE encrypted data. - The CRMF CertificateRequestMessageBuilder now supports optional attributes. - Improvements to the s calculation in JPAKE. - A general purpose PQCOtherInfoGenerator has been added which supports all Kyber and NTRU. - An implementation of HPKE (RFC 9180 - Hybrid Public Key Encryption) has been added to the light-weight cryptography API. Security Advisories: - The PQC implementations have now been subject to formal review for secret leakage and side channels, there were issues in BIKE, Falcon, Frodo, HQC which have now been fixed. Some weak positives also showed up in Rainbow, Picnic, SIKE, and GeMSS - for now this last set has been ignored as the algorithms will either be updated if they reappear in the Signature Round, or deleted, as is already the case for SIKE (it is now in the legacy package). Details on the group responsible for the testing can be found in the CONTRIBUTORS file. - For at least some ECIES variants (e.g. when using CBC) there is an issue with potential malleability of a nonce (implying silent malleability of the plaintext) that must be sent alongside the ciphertext but is outside the IES integrity check. For this reason the automatic generation of nonces with IED is now disabled and they have to be passed in using an IESParameterSpec. The current advice is to agree on a nonce between parties and then rely on the use of the ephemeral key component to allow the nonce (rather the so called nonce) usage to be extended. bouncycastle-1.73-150200.3.18.1.noarch.rpm bouncycastle-1.73-150200.3.18.1.src.rpm bouncycastle-javadoc-1.73-150200.3.18.1.noarch.rpm bouncycastle-jmail-1.73-150200.3.18.1.noarch.rpm bouncycastle-mail-1.73-150200.3.18.1.noarch.rpm bouncycastle-pg-1.73-150200.3.18.1.noarch.rpm bouncycastle-pkix-1.73-150200.3.18.1.noarch.rpm bouncycastle-tls-1.73-150200.3.18.1.noarch.rpm bouncycastle-util-1.73-150200.3.18.1.noarch.rpm openSUSE-SLE-15.5-2023-2484 Security update for openldap2 moderate SUSE Updates openSUSE-SLE 15.5 This update for openldap2 fixes the following issues: - CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795). libldap-2_4-2-2.4.46-150200.14.14.1.x86_64.rpm libldap-2_4-2-32bit-2.4.46-150200.14.14.1.x86_64.rpm libldap-data-2.4.46-150200.14.14.1.noarch.rpm openldap2-2.4.46-150200.14.14.1.src.rpm openldap2-2.4.46-150200.14.14.1.x86_64.rpm openldap2-back-meta-2.4.46-150200.14.14.1.x86_64.rpm openldap2-back-perl-2.4.46-150200.14.14.1.x86_64.rpm openldap2-back-sock-2.4.46-150200.14.14.1.x86_64.rpm openldap2-back-sql-2.4.46-150200.14.14.1.x86_64.rpm openldap2-client-2.4.46-150200.14.14.1.x86_64.rpm openldap2-contrib-2.4.46-150200.14.14.1.x86_64.rpm openldap2-devel-2.4.46-150200.14.14.1.x86_64.rpm openldap2-devel-32bit-2.4.46-150200.14.14.1.x86_64.rpm openldap2-devel-static-2.4.46-150200.14.14.1.x86_64.rpm openldap2-doc-2.4.46-150200.14.14.1.noarch.rpm openldap2-ppolicy-check-password-1.2-150200.14.14.1.x86_64.rpm libldap-2_4-2-2.4.46-150200.14.14.1.s390x.rpm openldap2-2.4.46-150200.14.14.1.s390x.rpm openldap2-back-meta-2.4.46-150200.14.14.1.s390x.rpm openldap2-back-perl-2.4.46-150200.14.14.1.s390x.rpm openldap2-back-sock-2.4.46-150200.14.14.1.s390x.rpm openldap2-back-sql-2.4.46-150200.14.14.1.s390x.rpm openldap2-client-2.4.46-150200.14.14.1.s390x.rpm openldap2-contrib-2.4.46-150200.14.14.1.s390x.rpm openldap2-devel-2.4.46-150200.14.14.1.s390x.rpm openldap2-devel-static-2.4.46-150200.14.14.1.s390x.rpm openldap2-ppolicy-check-password-1.2-150200.14.14.1.s390x.rpm libldap-2_4-2-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-back-meta-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-back-perl-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-back-sock-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-back-sql-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-client-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-contrib-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-devel-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-devel-static-2.4.46-150200.14.14.1.ppc64le.rpm openldap2-ppolicy-check-password-1.2-150200.14.14.1.ppc64le.rpm libldap-2_4-2-2.4.46-150200.14.14.1.aarch64.rpm openldap2-2.4.46-150200.14.14.1.aarch64.rpm openldap2-back-meta-2.4.46-150200.14.14.1.aarch64.rpm openldap2-back-perl-2.4.46-150200.14.14.1.aarch64.rpm openldap2-back-sock-2.4.46-150200.14.14.1.aarch64.rpm openldap2-back-sql-2.4.46-150200.14.14.1.aarch64.rpm openldap2-client-2.4.46-150200.14.14.1.aarch64.rpm openldap2-contrib-2.4.46-150200.14.14.1.aarch64.rpm openldap2-devel-2.4.46-150200.14.14.1.aarch64.rpm openldap2-devel-static-2.4.46-150200.14.14.1.aarch64.rpm openldap2-ppolicy-check-password-1.2-150200.14.14.1.aarch64.rpm openSUSE-SLE-15.5-2023-2344 Security update for ImageMagick important SUSE Updates openSUSE-SLE 15.5 This update for ImageMagick fixes the following issues: - CVE-2023-34151: Fixed an undefined behavior issue due to floating point truncation (bsc#1211791). - CVE-2023-34153: Fixed a command injection issue when encoding or decoding VIDEO files (bsc#1211792). ImageMagick-7.1.0.9-150400.6.21.1.src.rpm ImageMagick-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-devel-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-doc-7.1.0.9-150400.6.21.1.noarch.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-devel-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1.x86_64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.x86_64.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.x86_64.rpm ImageMagick-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.s390x.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.s390x.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.s390x.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.s390x.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.s390x.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.s390x.rpm ImageMagick-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.ppc64le.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.ppc64le.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.ppc64le.rpm ImageMagick-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-devel-7.1.0.9-150400.6.21.1.aarch64.rpm ImageMagick-extra-7.1.0.9-150400.6.21.1.aarch64.rpm libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1.aarch64.rpm libMagick++-devel-7.1.0.9-150400.6.21.1.aarch64.rpm libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1.aarch64.rpm libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1.aarch64.rpm perl-PerlMagick-7.1.0.9-150400.6.21.1.aarch64.rpm openSUSE-SLE-15.5-2023-2433 Recommended update for picocli moderate SUSE Updates openSUSE-SLE 15.5 This update for picocli fixes the following issues: - Build picocli using ant to avoid cycles (jsc#SLE-23217) picocli-4.6.2-150200.3.8.1.noarch.rpm picocli-4.6.2-150200.3.8.1.src.rpm picocli-javadoc-4.6.2-150200.3.8.1.noarch.rpm openSUSE-SLE-15.5-2023-2432 Recommended update for mockito moderate SUSE Updates openSUSE-SLE 15.5 This update for mockito fixes the following issues: - Build with Java 8 (jsc#SLE-23217) mockito-1.10.19-150200.3.4.1.noarch.rpm mockito-1.10.19-150200.3.4.1.src.rpm mockito-javadoc-1.10.19-150200.3.4.1.noarch.rpm openSUSE-SLE-15.5-2023-2529 Optional update for go1.19-openssl moderate SUSE Updates openSUSE-SLE 15.5 This update for go1.19-openssl fixes the following issues: This update delivers a go1.19 1.19.10.1 package built with its cryptography using the system openssl library. (jsc#SLE-18320 jsc#PED-1962) This allows GO binaries built with go1.19-openssl to be operating in FIPS 140-2/3 mode. go1.19-openssl-1.19.10.1-150000.1.5.1.src.rpm go1.19-openssl-1.19.10.1-150000.1.5.1.x86_64.rpm go1.19-openssl-doc-1.19.10.1-150000.1.5.1.x86_64.rpm go1.19-openssl-race-1.19.10.1-150000.1.5.1.x86_64.rpm go1.19-openssl-1.19.10.1-150000.1.5.1.s390x.rpm go1.19-openssl-doc-1.19.10.1-150000.1.5.1.s390x.rpm go1.19-openssl-race-1.19.10.1-150000.1.5.1.s390x.rpm go1.19-openssl-1.19.10.1-150000.1.5.1.ppc64le.rpm go1.19-openssl-doc-1.19.10.1-150000.1.5.1.ppc64le.rpm go1.19-openssl-race-1.19.10.1-150000.1.5.1.ppc64le.rpm go1.19-openssl-1.19.10.1-150000.1.5.1.aarch64.rpm go1.19-openssl-doc-1.19.10.1-150000.1.5.1.aarch64.rpm go1.19-openssl-race-1.19.10.1-150000.1.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-2452 Recommended update for libnvme, nvme-cli moderate SUSE Updates openSUSE-SLE 15.5 This update for libnvme, nvme-cli, nvme-stas fixes the following issues: - Update to version v1.4 (jsc#PED-553, jsc#PED-3884) - Fix invalid string lenght calculation for UUID (bsc#1209906) - Fix segmentation fault during garbage collection (bsc#1209905) - Always sanitize traddr and trsvcid entries (bsc#1207435) - Allow tracking unique discover controllers (bsc#1186689) - Enabled unit test on s390x again (bsc#1207687, bsc#1207686) - Replaced old nbft implementation with the upstream one - Don't enable TLS if kernel does not support it - Set version-tag so that version are correctly reported - Extend udev rule to pass --host-interface argument to nvme-cli (bsc#1208001) - Build documentation to be up to date - Improvements for supported-log-pages (bsc#1209550) - Fix read command (bsc#1209564) - Fix mounting filesystems via fstab (bsc#1208075) - Update host_traddr when using config.json file (bsc#1210089) - Changed default behavior of connect-all to match with old nbft behavior - Fix auto connect conditions (bsc#1210105) - Fix auto boot for NBFT connections (bsc#1211647) - nvme-stas: Update to version 2.2: - add DHCHAP support for in-band authentication (bsc#1208580) libnvme-1.4+18.g932f9c37e05a-150500.4.3.1.src.rpm libnvme-devel-1.4+18.g932f9c37e05a-150500.4.3.1.x86_64.rpm libnvme-mi1-1.4+18.g932f9c37e05a-150500.4.3.1.x86_64.rpm libnvme1-1.4+18.g932f9c37e05a-150500.4.3.1.x86_64.rpm nvme-cli-2.4+17.gf4cfca93998a-150500.4.3.1.src.rpm nvme-cli-2.4+17.gf4cfca93998a-150500.4.3.1.x86_64.rpm nvme-cli-bash-completion-2.4+17.gf4cfca93998a-150500.4.3.1.noarch.rpm nvme-cli-regress-script-2.4+17.gf4cfca93998a-150500.4.3.1.noarch.rpm nvme-cli-zsh-completion-2.4+17.gf4cfca93998a-150500.4.3.1.noarch.rpm nvme-stas-2.2-150500.3.3.1.src.rpm nvme-stas-2.2-150500.3.3.1.x86_64.rpm python3-libnvme-1.4+18.g932f9c37e05a-150500.4.3.1.x86_64.rpm libnvme-devel-1.4+18.g932f9c37e05a-150500.4.3.1.s390x.rpm libnvme-mi1-1.4+18.g932f9c37e05a-150500.4.3.1.s390x.rpm libnvme1-1.4+18.g932f9c37e05a-150500.4.3.1.s390x.rpm nvme-cli-2.4+17.gf4cfca93998a-150500.4.3.1.s390x.rpm nvme-stas-2.2-150500.3.3.1.s390x.rpm python3-libnvme-1.4+18.g932f9c37e05a-150500.4.3.1.s390x.rpm libnvme-devel-1.4+18.g932f9c37e05a-150500.4.3.1.ppc64le.rpm libnvme-mi1-1.4+18.g932f9c37e05a-150500.4.3.1.ppc64le.rpm libnvme1-1.4+18.g932f9c37e05a-150500.4.3.1.ppc64le.rpm nvme-cli-2.4+17.gf4cfca93998a-150500.4.3.1.ppc64le.rpm nvme-stas-2.2-150500.3.3.1.ppc64le.rpm python3-libnvme-1.4+18.g932f9c37e05a-150500.4.3.1.ppc64le.rpm libnvme-devel-1.4+18.g932f9c37e05a-150500.4.3.1.aarch64.rpm libnvme-mi1-1.4+18.g932f9c37e05a-150500.4.3.1.aarch64.rpm libnvme1-1.4+18.g932f9c37e05a-150500.4.3.1.aarch64.rpm nvme-cli-2.4+17.gf4cfca93998a-150500.4.3.1.aarch64.rpm nvme-stas-2.2-150500.3.3.1.aarch64.rpm python3-libnvme-1.4+18.g932f9c37e05a-150500.4.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2601 Optional update for go1.20-openssl moderate SUSE Updates openSUSE-SLE 15.5 This update for go1.20-openssl fixes the following issues: This update delivers a go1.20 1.20.5.2 package built with its cryptography using the system openssl library. (jsc#SLE-18320 jsc#PED-1962) This allows GO binaries built with go1.20-openssl to be operating in FIPS 140-2/3 mode. go1.20-openssl-1.20.5.2-150000.1.5.1.src.rpm go1.20-openssl-1.20.5.2-150000.1.5.1.x86_64.rpm go1.20-openssl-doc-1.20.5.2-150000.1.5.1.x86_64.rpm go1.20-openssl-race-1.20.5.2-150000.1.5.1.x86_64.rpm go1.20-openssl-1.20.5.2-150000.1.5.1.s390x.rpm go1.20-openssl-doc-1.20.5.2-150000.1.5.1.s390x.rpm go1.20-openssl-race-1.20.5.2-150000.1.5.1.s390x.rpm go1.20-openssl-1.20.5.2-150000.1.5.1.ppc64le.rpm go1.20-openssl-doc-1.20.5.2-150000.1.5.1.ppc64le.rpm go1.20-openssl-race-1.20.5.2-150000.1.5.1.ppc64le.rpm go1.20-openssl-1.20.5.2-150000.1.5.1.aarch64.rpm go1.20-openssl-doc-1.20.5.2-150000.1.5.1.aarch64.rpm go1.20-openssl-race-1.20.5.2-150000.1.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-29171 Security update for openssl-1_1 important SUSE Updates openSUSE-SLE 15.5 This update for openssl-1_1 fixes the following issues: - CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430). - CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534). - Update further expiring certificates that affect tests (bsc#1201627) libopenssl-1_1-devel-1.1.1l-150500.17.6.1.x86_64.rpm libopenssl-1_1-devel-32bit-1.1.1l-150500.17.6.1.x86_64.rpm libopenssl1_1-1.1.1l-150500.17.6.1.x86_64.rpm libopenssl1_1-32bit-1.1.1l-150500.17.6.1.x86_64.rpm libopenssl1_1-hmac-1.1.1l-150500.17.6.1.x86_64.rpm libopenssl1_1-hmac-32bit-1.1.1l-150500.17.6.1.x86_64.rpm openssl-1_1-1.1.1l-150500.17.6.1.src.rpm openssl-1_1-1.1.1l-150500.17.6.1.x86_64.rpm openssl-1_1-doc-1.1.1l-150500.17.6.1.noarch.rpm libopenssl-1_1-devel-1.1.1l-150500.17.6.1.s390x.rpm libopenssl1_1-1.1.1l-150500.17.6.1.s390x.rpm libopenssl1_1-hmac-1.1.1l-150500.17.6.1.s390x.rpm openssl-1_1-1.1.1l-150500.17.6.1.s390x.rpm libopenssl-1_1-devel-1.1.1l-150500.17.6.1.ppc64le.rpm libopenssl1_1-1.1.1l-150500.17.6.1.ppc64le.rpm libopenssl1_1-hmac-1.1.1l-150500.17.6.1.ppc64le.rpm openssl-1_1-1.1.1l-150500.17.6.1.ppc64le.rpm libopenssl-1_1-devel-1.1.1l-150500.17.6.1.aarch64.rpm libopenssl1_1-1.1.1l-150500.17.6.1.aarch64.rpm libopenssl1_1-hmac-1.1.1l-150500.17.6.1.aarch64.rpm openssl-1_1-1.1.1l-150500.17.6.1.aarch64.rpm openSUSE-SLE-15.5-2023-2515 Security update for rekor moderate SUSE Updates openSUSE-SLE 15.5 This update for rekor fixes the following issues: - updated to rekor 1.2.1 (jsc#SLE-23476): - CVE-2023-33199: Fixed that malformed proposed intoto v0.0.2 entries can cause a panic (bsc#1211790). rekor-1.2.1-150400.4.12.1.src.rpm rekor-1.2.1-150400.4.12.1.x86_64.rpm rekor-1.2.1-150400.4.12.1.s390x.rpm rekor-1.2.1-150400.4.12.1.ppc64le.rpm rekor-1.2.1-150400.4.12.1.aarch64.rpm openSUSE-SLE-15.5-2023-2467 Security update for libwebp important SUSE Updates openSUSE-SLE 15.5 This update for libwebp fixes the following issues: - CVE-2023-1999: Fixed a double free (bsc#1210212). libwebp-1.0.3-150200.3.5.1.src.rpm libwebp-devel-1.0.3-150200.3.5.1.x86_64.rpm libwebp-devel-32bit-1.0.3-150200.3.5.1.x86_64.rpm libwebp-tools-1.0.3-150200.3.5.1.x86_64.rpm libwebp7-1.0.3-150200.3.5.1.x86_64.rpm libwebp7-32bit-1.0.3-150200.3.5.1.x86_64.rpm libwebpdecoder3-1.0.3-150200.3.5.1.x86_64.rpm libwebpdecoder3-32bit-1.0.3-150200.3.5.1.x86_64.rpm libwebpdemux2-1.0.3-150200.3.5.1.x86_64.rpm libwebpdemux2-32bit-1.0.3-150200.3.5.1.x86_64.rpm libwebpmux3-1.0.3-150200.3.5.1.x86_64.rpm libwebpmux3-32bit-1.0.3-150200.3.5.1.x86_64.rpm libwebp-devel-1.0.3-150200.3.5.1.s390x.rpm libwebp-tools-1.0.3-150200.3.5.1.s390x.rpm libwebp7-1.0.3-150200.3.5.1.s390x.rpm libwebpdecoder3-1.0.3-150200.3.5.1.s390x.rpm libwebpdemux2-1.0.3-150200.3.5.1.s390x.rpm libwebpmux3-1.0.3-150200.3.5.1.s390x.rpm libwebp-devel-1.0.3-150200.3.5.1.ppc64le.rpm libwebp-tools-1.0.3-150200.3.5.1.ppc64le.rpm libwebp7-1.0.3-150200.3.5.1.ppc64le.rpm libwebpdecoder3-1.0.3-150200.3.5.1.ppc64le.rpm libwebpdemux2-1.0.3-150200.3.5.1.ppc64le.rpm libwebpmux3-1.0.3-150200.3.5.1.ppc64le.rpm libwebp-devel-1.0.3-150200.3.5.1.aarch64.rpm libwebp-tools-1.0.3-150200.3.5.1.aarch64.rpm libwebp7-1.0.3-150200.3.5.1.aarch64.rpm libwebpdecoder3-1.0.3-150200.3.5.1.aarch64.rpm libwebpdemux2-1.0.3-150200.3.5.1.aarch64.rpm libwebpmux3-1.0.3-150200.3.5.1.aarch64.rpm openSUSE-SLE-15.5-2023-2516 Security update for opensc moderate SUSE Updates openSUSE-SLE 15.5 This update for opensc fixes the following issues: - CVE-2023-2977: Fixed out of bounds read in pkcs15 cardos_have_verifyrc_package() (bsc#1211894). opensc-0.22.0-150400.3.3.1.src.rpm opensc-0.22.0-150400.3.3.1.x86_64.rpm opensc-32bit-0.22.0-150400.3.3.1.x86_64.rpm opensc-0.22.0-150400.3.3.1.s390x.rpm opensc-0.22.0-150400.3.3.1.ppc64le.rpm opensc-0.22.0-150400.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2489 Security update for MozillaFirefox important SUSE Updates openSUSE-SLE 15.5 This update for MozillaFirefox fixes the following issues: Extended Support Release 102.12.0 ESR (bsc#1211922): - CVE-2023-34414: Click-jacking certificate exceptions through rendering lag - CVE-2023-34416: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 MozillaFirefox-102.12.0-150200.152.90.1.src.rpm MozillaFirefox-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-branding-upstream-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-devel-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-translations-common-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-translations-other-102.12.0-150200.152.90.1.x86_64.rpm MozillaFirefox-102.12.0-150200.152.90.1.s390x.rpm MozillaFirefox-branding-upstream-102.12.0-150200.152.90.1.s390x.rpm MozillaFirefox-devel-102.12.0-150200.152.90.1.s390x.rpm MozillaFirefox-translations-common-102.12.0-150200.152.90.1.s390x.rpm MozillaFirefox-translations-other-102.12.0-150200.152.90.1.s390x.rpm MozillaFirefox-102.12.0-150200.152.90.1.ppc64le.rpm MozillaFirefox-branding-upstream-102.12.0-150200.152.90.1.ppc64le.rpm MozillaFirefox-devel-102.12.0-150200.152.90.1.ppc64le.rpm MozillaFirefox-translations-common-102.12.0-150200.152.90.1.ppc64le.rpm MozillaFirefox-translations-other-102.12.0-150200.152.90.1.ppc64le.rpm MozillaFirefox-102.12.0-150200.152.90.1.aarch64.rpm MozillaFirefox-branding-upstream-102.12.0-150200.152.90.1.aarch64.rpm MozillaFirefox-devel-102.12.0-150200.152.90.1.aarch64.rpm MozillaFirefox-translations-common-102.12.0-150200.152.90.1.aarch64.rpm MozillaFirefox-translations-other-102.12.0-150200.152.90.1.aarch64.rpm openSUSE-SLE-15.5-2023-2597 Recommended update for sapstartsrv-resource-agents moderate SUSE Updates openSUSE-SLE 15.5 This update for sapstartsrv-resource-agents fixes the following issues: - Version bump to 0.9.2 * Prevent systemd service race between sapping and sappong during system boot. (bsc#1207138) * Fix a problem of monitor/probe operation to detect a running sapstartsrv process. (bsc#1210790) sapstartsrv-resource-agents-0.9.2+git.1684336720.d2ebd49-150000.1.18.1.noarch.rpm sapstartsrv-resource-agents-0.9.2+git.1684336720.d2ebd49-150000.1.18.1.src.rpm openSUSE-SLE-15.5-2023-2517 Security update for python3 moderate SUSE Updates openSUSE-SLE 15.5 This update for python3 fixes the following issues: - CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750). - Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158). libpython3_6m1_0-3.6.15-150300.10.48.1.x86_64.rpm libpython3_6m1_0-32bit-3.6.15-150300.10.48.1.x86_64.rpm python3-3.6.15-150300.10.48.1.src.rpm python3-3.6.15-150300.10.48.1.x86_64.rpm python3-base-3.6.15-150300.10.48.1.x86_64.rpm python3-core-3.6.15-150300.10.48.1.src.rpm python3-curses-3.6.15-150300.10.48.1.x86_64.rpm python3-dbm-3.6.15-150300.10.48.1.x86_64.rpm python3-devel-3.6.15-150300.10.48.1.x86_64.rpm python3-doc-3.6.15-150300.10.48.1.x86_64.rpm python3-doc-devhelp-3.6.15-150300.10.48.1.x86_64.rpm python3-documentation-3.6.15-150300.10.48.1.src.rpm python3-idle-3.6.15-150300.10.48.1.x86_64.rpm python3-testsuite-3.6.15-150300.10.48.1.x86_64.rpm python3-tk-3.6.15-150300.10.48.1.x86_64.rpm python3-tools-3.6.15-150300.10.48.1.x86_64.rpm libpython3_6m1_0-3.6.15-150300.10.48.1.s390x.rpm python3-3.6.15-150300.10.48.1.s390x.rpm python3-base-3.6.15-150300.10.48.1.s390x.rpm python3-curses-3.6.15-150300.10.48.1.s390x.rpm python3-dbm-3.6.15-150300.10.48.1.s390x.rpm python3-devel-3.6.15-150300.10.48.1.s390x.rpm python3-doc-3.6.15-150300.10.48.1.s390x.rpm python3-doc-devhelp-3.6.15-150300.10.48.1.s390x.rpm python3-idle-3.6.15-150300.10.48.1.s390x.rpm python3-testsuite-3.6.15-150300.10.48.1.s390x.rpm python3-tk-3.6.15-150300.10.48.1.s390x.rpm python3-tools-3.6.15-150300.10.48.1.s390x.rpm libpython3_6m1_0-3.6.15-150300.10.48.1.ppc64le.rpm python3-3.6.15-150300.10.48.1.ppc64le.rpm python3-base-3.6.15-150300.10.48.1.ppc64le.rpm python3-curses-3.6.15-150300.10.48.1.ppc64le.rpm python3-dbm-3.6.15-150300.10.48.1.ppc64le.rpm python3-devel-3.6.15-150300.10.48.1.ppc64le.rpm python3-doc-3.6.15-150300.10.48.1.ppc64le.rpm python3-doc-devhelp-3.6.15-150300.10.48.1.ppc64le.rpm python3-idle-3.6.15-150300.10.48.1.ppc64le.rpm python3-testsuite-3.6.15-150300.10.48.1.ppc64le.rpm python3-tk-3.6.15-150300.10.48.1.ppc64le.rpm python3-tools-3.6.15-150300.10.48.1.ppc64le.rpm libpython3_6m1_0-3.6.15-150300.10.48.1.aarch64.rpm python3-3.6.15-150300.10.48.1.aarch64.rpm python3-base-3.6.15-150300.10.48.1.aarch64.rpm python3-curses-3.6.15-150300.10.48.1.aarch64.rpm python3-dbm-3.6.15-150300.10.48.1.aarch64.rpm python3-devel-3.6.15-150300.10.48.1.aarch64.rpm python3-doc-3.6.15-150300.10.48.1.aarch64.rpm python3-doc-devhelp-3.6.15-150300.10.48.1.aarch64.rpm python3-idle-3.6.15-150300.10.48.1.aarch64.rpm python3-testsuite-3.6.15-150300.10.48.1.aarch64.rpm python3-tk-3.6.15-150300.10.48.1.aarch64.rpm python3-tools-3.6.15-150300.10.48.1.aarch64.rpm openSUSE-SLE-15.5-2023-2463 Security update for python310 moderate SUSE Updates openSUSE-SLE 15.5 This update for python310 fixes the following issues: - CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750). libpython3_10-1_0-3.10.11-150400.4.25.1.x86_64.rpm libpython3_10-1_0-32bit-3.10.11-150400.4.25.1.x86_64.rpm python310-3.10.11-150400.4.25.1.src.rpm python310-3.10.11-150400.4.25.1.x86_64.rpm python310-32bit-3.10.11-150400.4.25.1.x86_64.rpm python310-base-3.10.11-150400.4.25.1.x86_64.rpm python310-base-32bit-3.10.11-150400.4.25.1.x86_64.rpm python310-core-3.10.11-150400.4.25.1.src.rpm python310-curses-3.10.11-150400.4.25.1.x86_64.rpm python310-dbm-3.10.11-150400.4.25.1.x86_64.rpm python310-devel-3.10.11-150400.4.25.1.x86_64.rpm python310-doc-3.10.11-150400.4.25.1.x86_64.rpm python310-doc-devhelp-3.10.11-150400.4.25.1.x86_64.rpm python310-documentation-3.10.11-150400.4.25.1.src.rpm python310-idle-3.10.11-150400.4.25.1.x86_64.rpm python310-testsuite-3.10.11-150400.4.25.1.x86_64.rpm python310-tk-3.10.11-150400.4.25.1.x86_64.rpm python310-tools-3.10.11-150400.4.25.1.x86_64.rpm libpython3_10-1_0-3.10.11-150400.4.25.1.s390x.rpm python310-3.10.11-150400.4.25.1.s390x.rpm python310-base-3.10.11-150400.4.25.1.s390x.rpm python310-curses-3.10.11-150400.4.25.1.s390x.rpm python310-dbm-3.10.11-150400.4.25.1.s390x.rpm python310-devel-3.10.11-150400.4.25.1.s390x.rpm python310-doc-3.10.11-150400.4.25.1.s390x.rpm python310-doc-devhelp-3.10.11-150400.4.25.1.s390x.rpm python310-idle-3.10.11-150400.4.25.1.s390x.rpm python310-testsuite-3.10.11-150400.4.25.1.s390x.rpm python310-tk-3.10.11-150400.4.25.1.s390x.rpm python310-tools-3.10.11-150400.4.25.1.s390x.rpm libpython3_10-1_0-3.10.11-150400.4.25.1.ppc64le.rpm python310-3.10.11-150400.4.25.1.ppc64le.rpm python310-base-3.10.11-150400.4.25.1.ppc64le.rpm python310-curses-3.10.11-150400.4.25.1.ppc64le.rpm python310-dbm-3.10.11-150400.4.25.1.ppc64le.rpm python310-devel-3.10.11-150400.4.25.1.ppc64le.rpm python310-doc-3.10.11-150400.4.25.1.ppc64le.rpm python310-doc-devhelp-3.10.11-150400.4.25.1.ppc64le.rpm python310-idle-3.10.11-150400.4.25.1.ppc64le.rpm python310-testsuite-3.10.11-150400.4.25.1.ppc64le.rpm python310-tk-3.10.11-150400.4.25.1.ppc64le.rpm python310-tools-3.10.11-150400.4.25.1.ppc64le.rpm libpython3_10-1_0-3.10.11-150400.4.25.1.aarch64.rpm python310-3.10.11-150400.4.25.1.aarch64.rpm python310-base-3.10.11-150400.4.25.1.aarch64.rpm python310-curses-3.10.11-150400.4.25.1.aarch64.rpm python310-dbm-3.10.11-150400.4.25.1.aarch64.rpm python310-devel-3.10.11-150400.4.25.1.aarch64.rpm python310-doc-3.10.11-150400.4.25.1.aarch64.rpm python310-doc-devhelp-3.10.11-150400.4.25.1.aarch64.rpm python310-idle-3.10.11-150400.4.25.1.aarch64.rpm python310-testsuite-3.10.11-150400.4.25.1.aarch64.rpm python310-tk-3.10.11-150400.4.25.1.aarch64.rpm python310-tools-3.10.11-150400.4.25.1.aarch64.rpm openSUSE-SLE-15.5-2023-2619 Security update for python-sqlparse moderate SUSE Updates openSUSE-SLE 15.5 This update for python-sqlparse fixes the following issues: - CVE-2023-30608: Fixed a Regular Expression Denial of Service (ReDOS) vulnerability (bsc#1210617). python-sqlparse-0.4.2-150300.3.6.1.src.rpm python3-sqlparse-0.4.2-150300.3.6.1.noarch.rpm openSUSE-SLE-15.5-2023-2481 Recommended update for dracut moderate SUSE Updates openSUSE-SLE 15.5 This update for dracut fixes the following issues: - Update to version 055+suse.364.g4c1d0276: - Honor rd.timeout for nvme ctrl_loss_tmo (bsc#1211080) - Suppress warning if hostname is not set (bsc#1211072) - Set netroot=nbft (bsc#1210909) dracut-055+suse.364.g4c1d0276-150500.3.3.1.src.rpm dracut-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-extra-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-fips-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-ima-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-mkinitrd-deprecated-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-tools-055+suse.364.g4c1d0276-150500.3.3.1.x86_64.rpm dracut-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-extra-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-fips-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-ima-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-mkinitrd-deprecated-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-tools-055+suse.364.g4c1d0276-150500.3.3.1.s390x.rpm dracut-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-extra-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-fips-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-ima-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-mkinitrd-deprecated-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-tools-055+suse.364.g4c1d0276-150500.3.3.1.ppc64le.rpm dracut-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm dracut-extra-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm dracut-fips-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm dracut-ima-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm dracut-mkinitrd-deprecated-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm dracut-tools-055+suse.364.g4c1d0276-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2519 Recommended update for supportutils moderate SUSE Updates openSUSE-SLE 15.5 This update for supportutils fixes the following issues: - Added missed sanitation check on crash.txt (bsc#1203818) - Added check to _sanitize_file - Using variable for replement text in _sanitize_file supportutils-3.1.21-150300.7.35.18.1.noarch.rpm supportutils-3.1.21-150300.7.35.18.1.src.rpm openSUSE-SLE-15.5-2023-2612 Security update for MozillaThunderbird important SUSE Updates openSUSE-SLE 15.5 This update for MozillaThunderbird fixes the following issues: Mozilla Thunderbird 102.12 MFSA 2023-21 (bsc#1211922): - CVE-2023-34414: Click-jacking certificate exceptions through rendering lag - CVE-2023-34416: Memory safety bugs fixed in Thunderbird 102.12 MozillaThunderbird-102.12.0-150200.8.121.1.src.rpm MozillaThunderbird-102.12.0-150200.8.121.1.x86_64.rpm MozillaThunderbird-translations-common-102.12.0-150200.8.121.1.x86_64.rpm MozillaThunderbird-translations-other-102.12.0-150200.8.121.1.x86_64.rpm MozillaThunderbird-102.12.0-150200.8.121.1.s390x.rpm MozillaThunderbird-translations-common-102.12.0-150200.8.121.1.s390x.rpm MozillaThunderbird-translations-other-102.12.0-150200.8.121.1.s390x.rpm MozillaThunderbird-102.12.0-150200.8.121.1.ppc64le.rpm MozillaThunderbird-translations-common-102.12.0-150200.8.121.1.ppc64le.rpm MozillaThunderbird-translations-other-102.12.0-150200.8.121.1.ppc64le.rpm MozillaThunderbird-102.12.0-150200.8.121.1.aarch64.rpm MozillaThunderbird-translations-common-102.12.0-150200.8.121.1.aarch64.rpm MozillaThunderbird-translations-other-102.12.0-150200.8.121.1.aarch64.rpm openSUSE-SLE-15.5-2023-2620 Security update for openssl-3 moderate SUSE Updates openSUSE-SLE 15.5 This update for openssl-3 fixes the following issues: - CVE-2023-1255: Fixed input buffer over-read in AES-XTS implementation on 64 bit ARM (bsc#1210714). - CVE-2023-2650: Fixed possible DoS translating ASN.1 object identifiers (bsc#1211430). libopenssl-3-devel-3.0.8-150500.5.3.1.x86_64.rpm libopenssl-3-devel-32bit-3.0.8-150500.5.3.1.x86_64.rpm libopenssl3-3.0.8-150500.5.3.1.x86_64.rpm libopenssl3-32bit-3.0.8-150500.5.3.1.x86_64.rpm openssl-3-3.0.8-150500.5.3.1.src.rpm openssl-3-3.0.8-150500.5.3.1.x86_64.rpm openssl-3-doc-3.0.8-150500.5.3.1.noarch.rpm libopenssl-3-devel-3.0.8-150500.5.3.1.s390x.rpm libopenssl3-3.0.8-150500.5.3.1.s390x.rpm openssl-3-3.0.8-150500.5.3.1.s390x.rpm libopenssl-3-devel-3.0.8-150500.5.3.1.ppc64le.rpm libopenssl3-3.0.8-150500.5.3.1.ppc64le.rpm openssl-3-3.0.8-150500.5.3.1.ppc64le.rpm libopenssl-3-devel-3.0.8-150500.5.3.1.aarch64.rpm libopenssl3-3.0.8-150500.5.3.1.aarch64.rpm openssl-3-3.0.8-150500.5.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2491 Security update for java-1_8_0-ibm important SUSE Updates openSUSE-SLE 15.5 This update for java-1_8_0-ibm fixes the following issues: - CVE-2023-21930: Fixed possible compromise from unauthenticated attacker with network access via TLS (bsc#1210628). - CVE-2023-21937: Fixed vulnerability inside the networking component (bsc#1210631). - CVE-2023-21938: Fixed vulnerability inside the library component (bsc#1210632). - CVE-2023-21939: Fixed vulnerability inside the swing component (bsc#1210634). - CVE-2023-21968: Fixed vulnerability inside the library component (bsc#1210637). - CVE-2023-2597: Fixed buffer overflow in shared cache implementation (bsc#1211615). - CVE-2023-21967: Fixed vulnerability inside the JSSE component (bsc#1210636). - CVE-2023-21954: Fixed vulnerability inside the hotspot component (bsc#1210635). Additional reference fixed already in 8.0.7.15: - CVE-2023-30441: Fixed components that could have exposed sensitive information using a combination of flaws and configurations (bsc#1210711). java-1_8_0-ibm-1.8.0_sr8.5-150000.3.74.1.nosrc.rpm java-1_8_0-ibm-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-32bit-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-alsa-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-demo-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-devel-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-devel-32bit-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-plugin-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-src-1.8.0_sr8.5-150000.3.74.1.x86_64.rpm java-1_8_0-ibm-1.8.0_sr8.5-150000.3.74.1.s390x.rpm java-1_8_0-ibm-demo-1.8.0_sr8.5-150000.3.74.1.s390x.rpm java-1_8_0-ibm-devel-1.8.0_sr8.5-150000.3.74.1.s390x.rpm java-1_8_0-ibm-src-1.8.0_sr8.5-150000.3.74.1.s390x.rpm java-1_8_0-ibm-1.8.0_sr8.5-150000.3.74.1.ppc64le.rpm java-1_8_0-ibm-demo-1.8.0_sr8.5-150000.3.74.1.ppc64le.rpm java-1_8_0-ibm-devel-1.8.0_sr8.5-150000.3.74.1.ppc64le.rpm java-1_8_0-ibm-src-1.8.0_sr8.5-150000.3.74.1.ppc64le.rpm openSUSE-SLE-15.5-2023-2495 Recommended update for libzypp important SUSE Updates openSUSE-SLE 15.5 This update for libzypp fixes the following issues: - Fix "Curl error 92" when synchronizing SUSE Manager repositories. [bsc#1212187] - Do not unconditionally release a medium if provideFile failed. [bsc#1211661] libzypp-17.31.13-150400.3.30.1.src.rpm True libzypp-17.31.13-150400.3.30.1.x86_64.rpm True libzypp-devel-17.31.13-150400.3.30.1.x86_64.rpm True libzypp-devel-doc-17.31.13-150400.3.30.1.x86_64.rpm True libzypp-17.31.13-150400.3.30.1.s390x.rpm True libzypp-devel-17.31.13-150400.3.30.1.s390x.rpm True libzypp-devel-doc-17.31.13-150400.3.30.1.s390x.rpm True libzypp-17.31.13-150400.3.30.1.ppc64le.rpm True libzypp-devel-17.31.13-150400.3.30.1.ppc64le.rpm True libzypp-devel-doc-17.31.13-150400.3.30.1.ppc64le.rpm True libzypp-17.31.13-150400.3.30.1.aarch64.rpm True libzypp-devel-17.31.13-150400.3.30.1.aarch64.rpm True libzypp-devel-doc-17.31.13-150400.3.30.1.aarch64.rpm True openSUSE-SLE-15.5-2023-2525 Security update for go1.19 moderate SUSE Updates openSUSE-SLE 15.5 This update for go1.19 fixes the following issues: Update to go1.19.10 (bsc#1200441): - CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073). - CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074). - CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075). - CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076). go1.19-1.19.10-150000.1.34.1.src.rpm go1.19-1.19.10-150000.1.34.1.x86_64.rpm go1.19-doc-1.19.10-150000.1.34.1.x86_64.rpm go1.19-race-1.19.10-150000.1.34.1.x86_64.rpm go1.19-1.19.10-150000.1.34.1.s390x.rpm go1.19-doc-1.19.10-150000.1.34.1.s390x.rpm go1.19-race-1.19.10-150000.1.34.1.s390x.rpm go1.19-1.19.10-150000.1.34.1.ppc64le.rpm go1.19-doc-1.19.10-150000.1.34.1.ppc64le.rpm go1.19-race-1.19.10-150000.1.34.1.ppc64le.rpm go1.19-1.19.10-150000.1.34.1.aarch64.rpm go1.19-doc-1.19.10-150000.1.34.1.aarch64.rpm go1.19-race-1.19.10-150000.1.34.1.aarch64.rpm openSUSE-SLE-15.5-2023-2526 Security update for go1.20 moderate SUSE Updates openSUSE-SLE 15.5 This update for go1.20 fixes the following issues: Update to go1.20.5 (bsc#1206346): - CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073). - CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074). - CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075). - CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076). go1.20-1.20.5-150000.1.14.1.src.rpm go1.20-1.20.5-150000.1.14.1.x86_64.rpm go1.20-doc-1.20.5-150000.1.14.1.x86_64.rpm go1.20-race-1.20.5-150000.1.14.1.x86_64.rpm go1.20-1.20.5-150000.1.14.1.s390x.rpm go1.20-doc-1.20.5-150000.1.14.1.s390x.rpm go1.20-race-1.20.5-150000.1.14.1.s390x.rpm go1.20-1.20.5-150000.1.14.1.ppc64le.rpm go1.20-doc-1.20.5-150000.1.14.1.ppc64le.rpm go1.20-race-1.20.5-150000.1.14.1.ppc64le.rpm go1.20-1.20.5-150000.1.14.1.aarch64.rpm go1.20-doc-1.20.5-150000.1.14.1.aarch64.rpm go1.20-race-1.20.5-150000.1.14.1.aarch64.rpm openSUSE-SLE-15.5-2023-2547 Recommended update for qemu moderate SUSE Updates openSUSE-SLE 15.5 This update for qemu fixes the following issues: - vCPU stalls in Qemu with NFS storage (bsc#1211000) qemu-testsuite-6.2.0-150400.37.17.2.src.rpm qemu-testsuite-6.2.0-150400.37.17.2.x86_64.rpm qemu-testsuite-6.2.0-150400.37.17.2.s390x.rpm qemu-testsuite-6.2.0-150400.37.17.2.ppc64le.rpm qemu-testsuite-6.2.0-150400.37.17.2.aarch64.rpm openSUSE-SLE-15.5-2023-2549 Recommended update for qemu moderate SUSE Updates openSUSE-SLE 15.5 This update for qemu fixes the following issues: - vCPU stalls in Qemu with NFS storage (bsc#1211000) - The SMBIOS tables are not being filled out correctly (bsc#bsc#1211697) qemu-7.1.0-150500.49.3.1.src.rpm qemu-7.1.0-150500.49.3.1.x86_64.rpm qemu-SLOF-7.1.0-150500.49.3.1.noarch.rpm qemu-accel-qtest-7.1.0-150500.49.3.1.x86_64.rpm qemu-accel-tcg-x86-7.1.0-150500.49.3.1.x86_64.rpm qemu-arm-7.1.0-150500.49.3.1.x86_64.rpm qemu-audio-alsa-7.1.0-150500.49.3.1.x86_64.rpm qemu-audio-dbus-7.1.0-150500.49.3.1.x86_64.rpm qemu-audio-jack-7.1.0-150500.49.3.1.x86_64.rpm qemu-audio-pa-7.1.0-150500.49.3.1.x86_64.rpm qemu-audio-spice-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-curl-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-dmg-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-gluster-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-iscsi-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-nfs-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-rbd-7.1.0-150500.49.3.1.x86_64.rpm qemu-block-ssh-7.1.0-150500.49.3.1.x86_64.rpm qemu-chardev-baum-7.1.0-150500.49.3.1.x86_64.rpm qemu-chardev-spice-7.1.0-150500.49.3.1.x86_64.rpm qemu-extra-7.1.0-150500.49.3.1.x86_64.rpm qemu-guest-agent-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-display-qxl-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-display-virtio-gpu-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-display-virtio-vga-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-usb-host-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-usb-redirect-7.1.0-150500.49.3.1.x86_64.rpm qemu-hw-usb-smartcard-7.1.0-150500.49.3.1.x86_64.rpm qemu-ipxe-1.0.0+-150500.49.3.1.noarch.rpm qemu-ivshmem-tools-7.1.0-150500.49.3.1.x86_64.rpm qemu-ksm-7.1.0-150500.49.3.1.x86_64.rpm qemu-kvm-7.1.0-150500.49.3.1.x86_64.rpm qemu-lang-7.1.0-150500.49.3.1.x86_64.rpm qemu-microvm-7.1.0-150500.49.3.1.noarch.rpm qemu-ppc-7.1.0-150500.49.3.1.x86_64.rpm qemu-s390x-7.1.0-150500.49.3.1.x86_64.rpm qemu-seabios-1.16.0_0_gd239552-150500.49.3.1.noarch.rpm qemu-sgabios-8-150500.49.3.1.noarch.rpm qemu-skiboot-7.1.0-150500.49.3.1.noarch.rpm qemu-tools-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-curses-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-dbus-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-gtk-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-opengl-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-spice-app-7.1.0-150500.49.3.1.x86_64.rpm qemu-ui-spice-core-7.1.0-150500.49.3.1.x86_64.rpm qemu-vgabios-1.16.0_0_gd239552-150500.49.3.1.noarch.rpm qemu-vhost-user-gpu-7.1.0-150500.49.3.1.x86_64.rpm qemu-x86-7.1.0-150500.49.3.1.x86_64.rpm qemu-7.1.0-150500.49.3.1.s390x.rpm qemu-accel-qtest-7.1.0-150500.49.3.1.s390x.rpm qemu-accel-tcg-x86-7.1.0-150500.49.3.1.s390x.rpm qemu-arm-7.1.0-150500.49.3.1.s390x.rpm qemu-audio-alsa-7.1.0-150500.49.3.1.s390x.rpm qemu-audio-dbus-7.1.0-150500.49.3.1.s390x.rpm qemu-audio-jack-7.1.0-150500.49.3.1.s390x.rpm qemu-audio-pa-7.1.0-150500.49.3.1.s390x.rpm qemu-audio-spice-7.1.0-150500.49.3.1.s390x.rpm qemu-block-curl-7.1.0-150500.49.3.1.s390x.rpm qemu-block-dmg-7.1.0-150500.49.3.1.s390x.rpm qemu-block-gluster-7.1.0-150500.49.3.1.s390x.rpm qemu-block-iscsi-7.1.0-150500.49.3.1.s390x.rpm qemu-block-nfs-7.1.0-150500.49.3.1.s390x.rpm qemu-block-rbd-7.1.0-150500.49.3.1.s390x.rpm qemu-block-ssh-7.1.0-150500.49.3.1.s390x.rpm qemu-chardev-baum-7.1.0-150500.49.3.1.s390x.rpm qemu-chardev-spice-7.1.0-150500.49.3.1.s390x.rpm qemu-extra-7.1.0-150500.49.3.1.s390x.rpm qemu-guest-agent-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-display-qxl-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-display-virtio-gpu-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-display-virtio-vga-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-usb-host-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-usb-redirect-7.1.0-150500.49.3.1.s390x.rpm qemu-hw-usb-smartcard-7.1.0-150500.49.3.1.s390x.rpm qemu-ivshmem-tools-7.1.0-150500.49.3.1.s390x.rpm qemu-ksm-7.1.0-150500.49.3.1.s390x.rpm qemu-kvm-7.1.0-150500.49.3.1.s390x.rpm qemu-lang-7.1.0-150500.49.3.1.s390x.rpm qemu-ppc-7.1.0-150500.49.3.1.s390x.rpm qemu-s390x-7.1.0-150500.49.3.1.s390x.rpm qemu-tools-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-curses-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-dbus-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-gtk-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-opengl-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-spice-app-7.1.0-150500.49.3.1.s390x.rpm qemu-ui-spice-core-7.1.0-150500.49.3.1.s390x.rpm qemu-vhost-user-gpu-7.1.0-150500.49.3.1.s390x.rpm qemu-x86-7.1.0-150500.49.3.1.s390x.rpm qemu-7.1.0-150500.49.3.1.ppc64le.rpm qemu-accel-qtest-7.1.0-150500.49.3.1.ppc64le.rpm qemu-accel-tcg-x86-7.1.0-150500.49.3.1.ppc64le.rpm qemu-arm-7.1.0-150500.49.3.1.ppc64le.rpm qemu-audio-alsa-7.1.0-150500.49.3.1.ppc64le.rpm qemu-audio-dbus-7.1.0-150500.49.3.1.ppc64le.rpm qemu-audio-jack-7.1.0-150500.49.3.1.ppc64le.rpm qemu-audio-pa-7.1.0-150500.49.3.1.ppc64le.rpm qemu-audio-spice-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-curl-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-dmg-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-gluster-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-iscsi-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-nfs-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-rbd-7.1.0-150500.49.3.1.ppc64le.rpm qemu-block-ssh-7.1.0-150500.49.3.1.ppc64le.rpm qemu-chardev-baum-7.1.0-150500.49.3.1.ppc64le.rpm qemu-chardev-spice-7.1.0-150500.49.3.1.ppc64le.rpm qemu-extra-7.1.0-150500.49.3.1.ppc64le.rpm qemu-guest-agent-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-display-qxl-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-display-virtio-gpu-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-display-virtio-vga-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-usb-host-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-usb-redirect-7.1.0-150500.49.3.1.ppc64le.rpm qemu-hw-usb-smartcard-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ivshmem-tools-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ksm-7.1.0-150500.49.3.1.ppc64le.rpm qemu-lang-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ppc-7.1.0-150500.49.3.1.ppc64le.rpm qemu-s390x-7.1.0-150500.49.3.1.ppc64le.rpm qemu-tools-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-curses-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-dbus-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-gtk-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-opengl-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-spice-app-7.1.0-150500.49.3.1.ppc64le.rpm qemu-ui-spice-core-7.1.0-150500.49.3.1.ppc64le.rpm qemu-vhost-user-gpu-7.1.0-150500.49.3.1.ppc64le.rpm qemu-x86-7.1.0-150500.49.3.1.ppc64le.rpm qemu-7.1.0-150500.49.3.1.aarch64.rpm qemu-accel-qtest-7.1.0-150500.49.3.1.aarch64.rpm qemu-accel-tcg-x86-7.1.0-150500.49.3.1.aarch64.rpm qemu-arm-7.1.0-150500.49.3.1.aarch64.rpm qemu-audio-alsa-7.1.0-150500.49.3.1.aarch64.rpm qemu-audio-dbus-7.1.0-150500.49.3.1.aarch64.rpm qemu-audio-jack-7.1.0-150500.49.3.1.aarch64.rpm qemu-audio-pa-7.1.0-150500.49.3.1.aarch64.rpm qemu-audio-spice-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-curl-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-dmg-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-gluster-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-iscsi-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-nfs-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-rbd-7.1.0-150500.49.3.1.aarch64.rpm qemu-block-ssh-7.1.0-150500.49.3.1.aarch64.rpm qemu-chardev-baum-7.1.0-150500.49.3.1.aarch64.rpm qemu-chardev-spice-7.1.0-150500.49.3.1.aarch64.rpm qemu-extra-7.1.0-150500.49.3.1.aarch64.rpm qemu-guest-agent-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-display-qxl-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-display-virtio-gpu-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-display-virtio-vga-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-usb-host-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-usb-redirect-7.1.0-150500.49.3.1.aarch64.rpm qemu-hw-usb-smartcard-7.1.0-150500.49.3.1.aarch64.rpm qemu-ivshmem-tools-7.1.0-150500.49.3.1.aarch64.rpm qemu-ksm-7.1.0-150500.49.3.1.aarch64.rpm qemu-lang-7.1.0-150500.49.3.1.aarch64.rpm qemu-ppc-7.1.0-150500.49.3.1.aarch64.rpm qemu-s390x-7.1.0-150500.49.3.1.aarch64.rpm qemu-tools-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-curses-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-dbus-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-gtk-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-opengl-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-spice-app-7.1.0-150500.49.3.1.aarch64.rpm qemu-ui-spice-core-7.1.0-150500.49.3.1.aarch64.rpm qemu-vhost-user-gpu-7.1.0-150500.49.3.1.aarch64.rpm qemu-x86-7.1.0-150500.49.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2534 Security update for the Linux Kernel important SUSE Updates openSUSE-SLE 15.5 The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600). - CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405). - CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760). - CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758). - CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762). - CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803). - CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756). - CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783). - CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940). - CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715). - CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186). - CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366). - CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287). - CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105). - CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037). - CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629). The following non-security bugs were fixed: - ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878). - google/gve:fix repeated words in comments (bsc#1211519). - gve: Adding a new AdminQ command to verify driver (bsc#1211519). - gve: Cache link_speed value from device (bsc#1211519). - gve: Fix GFP flags when allocing pages (bsc#1211519). - gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519). - gve: Fix spelling mistake "droping" -> "dropping" (bsc#1211519). - gve: Handle alternate miss completions (bsc#1211519). - gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519). - gve: Remove the code of clearing PBA bit (bsc#1211519). - gve: Secure enough bytes in the first TX desc for all TCP pkts (bsc#1211519). - gve: enhance no queue page list detection (bsc#1211519). - hv: vmbus: Optimize vmbus_on_event (bsc#1211622). - ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592). - kernel-binary: install expoline.o (boo#1210791 bsc#1211089) - scsi: storvsc: Parameterize number hardware queues (bsc#1211622). - usrmerge: Compatibility with earlier rpm (boo#1211796) kernel-vanilla-4.12.14-150100.197.148.1.nosrc.rpm True kernel-vanilla-4.12.14-150100.197.148.1.x86_64.rpm True kernel-vanilla-base-4.12.14-150100.197.148.1.x86_64.rpm True kernel-vanilla-devel-4.12.14-150100.197.148.1.x86_64.rpm True kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1.x86_64.rpm True kernel-vanilla-4.12.14-150100.197.148.1.s390x.rpm True kernel-vanilla-base-4.12.14-150100.197.148.1.s390x.rpm True kernel-vanilla-devel-4.12.14-150100.197.148.1.s390x.rpm True kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1.s390x.rpm True kernel-vanilla-4.12.14-150100.197.148.1.ppc64le.rpm True kernel-vanilla-base-4.12.14-150100.197.148.1.ppc64le.rpm True kernel-vanilla-devel-4.12.14-150100.197.148.1.ppc64le.rpm True kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1.ppc64le.rpm True kernel-vanilla-4.12.14-150100.197.148.1.aarch64.rpm True kernel-vanilla-base-4.12.14-150100.197.148.1.aarch64.rpm True kernel-vanilla-devel-4.12.14-150100.197.148.1.aarch64.rpm True kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1.aarch64.rpm True openSUSE-SLE-15.5-2023-2543 Security update for kubernetes1.23 important SUSE Updates openSUSE-SLE 15.5 This update for kubernetes1.23 fixes the following issues: - CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630). - CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631). kubernetes1.23-1.23.17-150500.3.3.1.src.rpm kubernetes1.23-apiserver-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-client-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-client-bash-completion-1.23.17-150500.3.3.1.noarch.rpm kubernetes1.23-client-common-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-client-fish-completion-1.23.17-150500.3.3.1.noarch.rpm kubernetes1.23-controller-manager-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-kubeadm-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-kubelet-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-kubelet-common-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-proxy-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-scheduler-1.23.17-150500.3.3.1.x86_64.rpm kubernetes1.23-apiserver-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-client-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-client-common-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-controller-manager-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-kubeadm-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-kubelet-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-kubelet-common-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-proxy-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-scheduler-1.23.17-150500.3.3.1.s390x.rpm kubernetes1.23-apiserver-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-client-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-client-common-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-controller-manager-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-kubeadm-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-kubelet-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-kubelet-common-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-proxy-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-scheduler-1.23.17-150500.3.3.1.ppc64le.rpm kubernetes1.23-apiserver-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-client-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-client-common-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-controller-manager-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-kubeadm-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-kubelet-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-kubelet-common-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-proxy-1.23.17-150500.3.3.1.aarch64.rpm kubernetes1.23-scheduler-1.23.17-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2544 Security update for kubernetes1.24 important SUSE Updates openSUSE-SLE 15.5 This update for kubernetes1.24 fixes the following issues: - CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630). - CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631). kubernetes1.24-1.24.13-150500.3.3.1.src.rpm kubernetes1.24-apiserver-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-client-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-client-bash-completion-1.24.13-150500.3.3.1.noarch.rpm kubernetes1.24-client-common-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-client-fish-completion-1.24.13-150500.3.3.1.noarch.rpm kubernetes1.24-controller-manager-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-kubeadm-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-kubelet-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-kubelet-common-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-proxy-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-scheduler-1.24.13-150500.3.3.1.x86_64.rpm kubernetes1.24-apiserver-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-client-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-client-common-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-controller-manager-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-kubeadm-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-kubelet-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-kubelet-common-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-proxy-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-scheduler-1.24.13-150500.3.3.1.s390x.rpm kubernetes1.24-apiserver-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-client-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-client-common-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-controller-manager-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-kubeadm-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-kubelet-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-kubelet-common-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-proxy-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-scheduler-1.24.13-150500.3.3.1.ppc64le.rpm kubernetes1.24-apiserver-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-client-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-client-common-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-controller-manager-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-kubeadm-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-kubelet-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-kubelet-common-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-proxy-1.24.13-150500.3.3.1.aarch64.rpm kubernetes1.24-scheduler-1.24.13-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2603 Security update for rustup moderate SUSE Updates openSUSE-SLE 15.5 This update for rustup fixes the following issues: - CVE-2022-31394: Fixed possible HTTP2 attacks by specifying the HTTP/2 SETTINGS_MAX_HEADER_LIST_SIZE (bsc#1208552). - CVE-2023-26964: Fixed high memory and CPU usage when stream stacking occurs when H2 processes HTTP2 RST_STREAM frames (bsc#1210345). rustup-1.26.0~0-150400.3.7.1.src.rpm rustup-1.26.0~0-150400.3.7.1.x86_64.rpm rustup-1.26.0~0-150400.3.7.1.aarch64.rpm openSUSE-SLE-15.5-2023-2559 Recommended update for rust, rust1.70 moderate SUSE Updates openSUSE-SLE 15.5 This update for rust, rust1.70 fixes the following issues: Changes in rust: - Update to version 1.70.0 - for details see the rust1.70 package Changes in rust1.70: Version 1.70.0 (2023-06-01) ========================== Language -------- - Relax ordering rules for `asm!` operands - Properly allow macro expanded `format_args` invocations to uses captures - Lint ambiguous glob re-exports - Perform const and unsafe checking for expressions in `let _ = expr` position. Compiler -------- - Extend -Cdebuginfo with new options and named aliases This provides a smaller version of debuginfo for cases that only need line number information (`-Cdebuginfo=line-tables-only`), which may eventually become the default for `-Cdebuginfo=1`. - Make `unused_allocation` lint against `Box::new` too - Detect uninhabited types early in const eval - Switch to LLD as default linker for {arm,thumb}v4t-none-eabi - Add tier 3 target `loongarch64-unknown-linux-gnu` - Add tier 3 target for `i586-pc-nto-qnx700` (QNX Neutrino RTOS, version 7.0) - Insert alignment checks for pointer dereferences as debug assertions This catches undefined behavior at runtime, and may cause existing code to fail. Refer to Rust's platform support page for more information on Rust's tiered platform support. Libraries --------- - Document NonZeroXxx layout guarantees - Windows: make `Command` prefer non-verbatim paths - Implement Default for some alloc/core iterators - Fix handling of trailing bare CR in str::lines - allow negative numeric literals in `concat!` - Add documentation about the memory layout of `Cell` - Use `partial_cmp` to implement tuple `lt`/`le`/`ge`/`gt` - Stabilize `atomic_as_ptr` - Stabilize `nonnull_slice_from_raw_parts` - Partial stabilization of `once_cell` - Stabilize `nonzero_min_max` - Flatten/inline format_args!() and (string and int) literal arguments into format_args!() - Stabilize movbe target feature - don't splice from files into pipes in io::copy - Add a builtin unstable `FnPtr` trait that is implemented for all function pointers This extends `Debug`, `Pointer`, `Hash`, `PartialEq`, `Eq`, `PartialOrd`, and `Ord` implementations for function pointers with all ABIs. Stabilized APIs --------------- - `NonZero*::MIN/MAX` - `BinaryHeap::retain` - `Default for std::collections::binary_heap::IntoIter` - `Default for std::collections::btree_map::{IntoIter, Iter, IterMut}` - `Default for std::collections::btree_map::{IntoKeys, Keys}` - `Default for std::collections::btree_map::{IntoValues, Values}` - `Default for std::collections::btree_map::Range` - `Default for std::collections::btree_set::{IntoIter, Iter}` - `Default for std::collections::btree_set::Range` - `Default for std::collections::linked_list::{IntoIter, Iter, IterMut}` - `Default for std::vec::IntoIter` - `Default for std::iter::Chain` - `Default for std::iter::Cloned` - `Default for std::iter::Copied` - `Default for std::iter::Enumerate` - `Default for std::iter::Flatten` - `Default for std::iter::Fuse` - `Default for std::iter::Rev` - `Default for std::slice::Iter` - `Default for std::slice::IterMut` - `Rc::into_inner` - `Arc::into_inner` - `std::cell::OnceCell` - `Option::is_some_and` - `NonNull::slice_from_raw_parts` - `Result::is_ok_and` - `Result::is_err_and` - `std::sync::atomic::Atomic*::as_ptr` - `std::io::IsTerminal` - `std::os::linux::net::SocketAddrExt` - `std::os::unix::net::UnixDatagram::bind_addr` - `std::os::unix::net::UnixDatagram::connect_addr` - `std::os::unix::net::UnixDatagram::send_to_addr` - `std::os::unix::net::UnixListener::bind_addr` - `std::path::Path::as_mut_os_str` - `std::sync::OnceLock` Cargo ----- - Add `CARGO_PKG_README` - Make `sparse` the default protocol for crates.io - Accurately show status when downgrading dependencies - Use registry.default for login/logout - Stabilize `cargo logout` Misc ---- - Stabilize rustdoc `--test-run-directory` Compatibility Notes ------------------- - Prevent stable `libtest` from supporting `-Zunstable-options` - Perform const and unsafe checking for expressions in `let _ = expr` position. - WebAssembly targets enable `sign-ext` and `mutable-globals` features in codegen This may cause incompatibility with older execution environments. - Insert alignment checks for pointer dereferences as debug assertions This catches undefined behavior at runtime, and may cause existing code to fail. cargo-1.70.0-150400.24.18.1.x86_64.rpm cargo1.70-1.70.0-150400.9.3.1.x86_64.rpm rust-1.70.0-150400.24.18.1.src.rpm rust-1.70.0-150400.24.18.1.x86_64.rpm rust1.70-1.70.0-150400.9.3.1.nosrc.rpm rust1.70-1.70.0-150400.9.3.1.x86_64.rpm cargo-1.70.0-150400.24.18.1.s390x.rpm cargo1.70-1.70.0-150400.9.3.1.s390x.rpm rust-1.70.0-150400.24.18.1.s390x.rpm rust1.70-1.70.0-150400.9.3.1.s390x.rpm cargo-1.70.0-150400.24.18.1.ppc64le.rpm cargo1.70-1.70.0-150400.9.3.1.ppc64le.rpm rust-1.70.0-150400.24.18.1.ppc64le.rpm rust1.70-1.70.0-150400.9.3.1.ppc64le.rpm cargo-1.70.0-150400.24.18.1.aarch64.rpm cargo1.70-1.70.0-150400.9.3.1.aarch64.rpm rust-1.70.0-150400.24.18.1.aarch64.rpm rust1.70-1.70.0-150400.9.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2558 Recommended update for virt-manager moderate SUSE Updates openSUSE-SLE 15.5 This update for virt-manager fixes the following issues: - virt-install --graphics vnc fails with not support for video model 'virtio' (bsc#1201748) - Language file fixes (bsc#1209800, bsc#1197945, bsc#1197947, bsc#1198041) - libvirt fails to start the guest once the new shared disk is added (bsc#1207070) - Replace downstream patch with upstream version (bsc#1203252) virt-install-4.1.0-150500.3.3.1.noarch.rpm virt-manager-4.1.0-150500.3.3.1.noarch.rpm virt-manager-4.1.0-150500.3.3.1.src.rpm virt-manager-common-4.1.0-150500.3.3.1.noarch.rpm openSUSE-SLE-15.5-2023-2511 Recommended update for powerpc-utils moderate SUSE Updates openSUSE-SLE 15.5 This update for powerpc-utils fixes the following issues: - Fix negative utilization value reported by lparstat -E (bsc#1212031) - Fix lparstat error with mixed SMT state (bsc#1211883 ltc#02144) powerpc-utils-1.3.11-150500.3.3.1.ppc64le.rpm powerpc-utils-1.3.11-150500.3.3.1.src.rpm openSUSE-SLE-15.5-2023-2561 Security update for python-reportlab critical SUSE Updates openSUSE-SLE 15.5 This update for python-reportlab fixes the following issues: - CVE-2023-33733: Fixed arbitrary code execution via supplying a crafted PDF file (bsc#1212065). python-reportlab-3.4.0-150000.3.9.1.src.rpm python3-reportlab-3.4.0-150000.3.9.1.x86_64.rpm python3-reportlab-3.4.0-150000.3.9.1.s390x.rpm python3-reportlab-3.4.0-150000.3.9.1.ppc64le.rpm python3-reportlab-3.4.0-150000.3.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2615 Recommended update for mdadm important SUSE Updates openSUSE-SLE 15.5 This update for mdadm fixes the following issues: - Grow: fix possible memory leak (bsc#1208618) - Use source code mdadm-4.2.tar.xz from kernel.org version for checksum mdadm-4.2-150500.6.3.1.src.rpm mdadm-4.2-150500.6.3.1.x86_64.rpm mdadm-4.2-150500.6.3.1.s390x.rpm mdadm-4.2-150500.6.3.1.ppc64le.rpm mdadm-4.2-150500.6.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2604 Security update for open-vm-tools moderate SUSE Updates openSUSE-SLE 15.5 This update for open-vm-tools fixes the following issues: - CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143). Bug fixes: - Fixed build problem with grpc 1.54 (bsc#1210695). libvmtools-devel-12.2.0-150300.29.1.x86_64.rpm libvmtools0-12.2.0-150300.29.1.x86_64.rpm open-vm-tools-12.2.0-150300.29.1.src.rpm open-vm-tools-12.2.0-150300.29.1.x86_64.rpm open-vm-tools-desktop-12.2.0-150300.29.1.x86_64.rpm open-vm-tools-salt-minion-12.2.0-150300.29.1.x86_64.rpm open-vm-tools-sdmp-12.2.0-150300.29.1.x86_64.rpm libvmtools-devel-12.2.0-150300.29.1.aarch64.rpm libvmtools0-12.2.0-150300.29.1.aarch64.rpm open-vm-tools-12.2.0-150300.29.1.aarch64.rpm open-vm-tools-desktop-12.2.0-150300.29.1.aarch64.rpm open-vm-tools-sdmp-12.2.0-150300.29.1.aarch64.rpm openSUSE-SLE-15.5-2023-2614 Security update for libX11 important SUSE Updates openSUSE-SLE 15.5 This update for libX11 fixes the following issues: - CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102). libX11-1.6.5-150000.3.30.1.src.rpm libX11-6-1.6.5-150000.3.30.1.x86_64.rpm libX11-6-32bit-1.6.5-150000.3.30.1.x86_64.rpm libX11-data-1.6.5-150000.3.30.1.noarch.rpm libX11-devel-1.6.5-150000.3.30.1.x86_64.rpm libX11-devel-32bit-1.6.5-150000.3.30.1.x86_64.rpm libX11-xcb1-1.6.5-150000.3.30.1.x86_64.rpm libX11-xcb1-32bit-1.6.5-150000.3.30.1.x86_64.rpm libX11-6-1.6.5-150000.3.30.1.s390x.rpm libX11-devel-1.6.5-150000.3.30.1.s390x.rpm libX11-xcb1-1.6.5-150000.3.30.1.s390x.rpm libX11-6-1.6.5-150000.3.30.1.ppc64le.rpm libX11-devel-1.6.5-150000.3.30.1.ppc64le.rpm libX11-xcb1-1.6.5-150000.3.30.1.ppc64le.rpm libX11-6-1.6.5-150000.3.30.1.aarch64.rpm libX11-devel-1.6.5-150000.3.30.1.aarch64.rpm libX11-xcb1-1.6.5-150000.3.30.1.aarch64.rpm openSUSE-SLE-15.5-2023-2616 Security update for cups important SUSE Updates openSUSE-SLE 15.5 This update for cups fixes the following issues: - CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient() (bsc#1212230). cups-2.2.7-150000.3.46.1.src.rpm cups-2.2.7-150000.3.46.1.x86_64.rpm cups-client-2.2.7-150000.3.46.1.x86_64.rpm cups-config-2.2.7-150000.3.46.1.x86_64.rpm cups-ddk-2.2.7-150000.3.46.1.x86_64.rpm cups-devel-2.2.7-150000.3.46.1.x86_64.rpm cups-devel-32bit-2.2.7-150000.3.46.1.x86_64.rpm libcups2-2.2.7-150000.3.46.1.x86_64.rpm libcups2-32bit-2.2.7-150000.3.46.1.x86_64.rpm libcupscgi1-2.2.7-150000.3.46.1.x86_64.rpm libcupscgi1-32bit-2.2.7-150000.3.46.1.x86_64.rpm libcupsimage2-2.2.7-150000.3.46.1.x86_64.rpm libcupsimage2-32bit-2.2.7-150000.3.46.1.x86_64.rpm libcupsmime1-2.2.7-150000.3.46.1.x86_64.rpm libcupsmime1-32bit-2.2.7-150000.3.46.1.x86_64.rpm libcupsppdc1-2.2.7-150000.3.46.1.x86_64.rpm libcupsppdc1-32bit-2.2.7-150000.3.46.1.x86_64.rpm cups-2.2.7-150000.3.46.1.s390x.rpm cups-client-2.2.7-150000.3.46.1.s390x.rpm cups-config-2.2.7-150000.3.46.1.s390x.rpm cups-ddk-2.2.7-150000.3.46.1.s390x.rpm cups-devel-2.2.7-150000.3.46.1.s390x.rpm libcups2-2.2.7-150000.3.46.1.s390x.rpm libcupscgi1-2.2.7-150000.3.46.1.s390x.rpm libcupsimage2-2.2.7-150000.3.46.1.s390x.rpm libcupsmime1-2.2.7-150000.3.46.1.s390x.rpm libcupsppdc1-2.2.7-150000.3.46.1.s390x.rpm cups-2.2.7-150000.3.46.1.ppc64le.rpm cups-client-2.2.7-150000.3.46.1.ppc64le.rpm cups-config-2.2.7-150000.3.46.1.ppc64le.rpm cups-ddk-2.2.7-150000.3.46.1.ppc64le.rpm cups-devel-2.2.7-150000.3.46.1.ppc64le.rpm libcups2-2.2.7-150000.3.46.1.ppc64le.rpm libcupscgi1-2.2.7-150000.3.46.1.ppc64le.rpm libcupsimage2-2.2.7-150000.3.46.1.ppc64le.rpm libcupsmime1-2.2.7-150000.3.46.1.ppc64le.rpm libcupsppdc1-2.2.7-150000.3.46.1.ppc64le.rpm cups-2.2.7-150000.3.46.1.aarch64.rpm cups-client-2.2.7-150000.3.46.1.aarch64.rpm cups-config-2.2.7-150000.3.46.1.aarch64.rpm cups-ddk-2.2.7-150000.3.46.1.aarch64.rpm cups-devel-2.2.7-150000.3.46.1.aarch64.rpm libcups2-2.2.7-150000.3.46.1.aarch64.rpm libcupscgi1-2.2.7-150000.3.46.1.aarch64.rpm libcupsimage2-2.2.7-150000.3.46.1.aarch64.rpm libcupsmime1-2.2.7-150000.3.46.1.aarch64.rpm libcupsppdc1-2.2.7-150000.3.46.1.aarch64.rpm openSUSE-SLE-15.5-2023-2554 Recommended update for nvme-stas critical SUSE Updates openSUSE-SLE 15.5 This update for nvme-stas fixes the following issues: - Update to version 2.2.2: * Fix python crash caused by wrong transport identifier handling. (bsc#1211557) * staslib: Fix setting controller DHCHAP key (bsc#1211557) nvme-stas-2.2.2-150500.3.6.1.src.rpm nvme-stas-2.2.2-150500.3.6.1.x86_64.rpm nvme-stas-2.2.2-150500.3.6.1.s390x.rpm nvme-stas-2.2.2-150500.3.6.1.ppc64le.rpm nvme-stas-2.2.2-150500.3.6.1.aarch64.rpm openSUSE-SLE-15.5-2023-2546 Security update for bluez important SUSE Updates openSUSE-SLE 15.5 This update for bluez fixes the following issues: - CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398). bluez-5.65-150500.3.3.1.src.rpm bluez-5.65-150500.3.3.1.x86_64.rpm bluez-auto-enable-devices-5.65-150500.3.3.1.noarch.rpm bluez-cups-5.65-150500.3.3.1.x86_64.rpm bluez-deprecated-5.65-150500.3.3.1.x86_64.rpm bluez-devel-32bit-5.65-150500.3.3.1.x86_64.rpm bluez-devel-5.65-150500.3.3.1.x86_64.rpm bluez-obexd-5.65-150500.3.3.1.x86_64.rpm bluez-test-5.65-150500.3.3.1.x86_64.rpm bluez-zsh-completion-5.65-150500.3.3.1.noarch.rpm libbluetooth3-32bit-5.65-150500.3.3.1.x86_64.rpm libbluetooth3-5.65-150500.3.3.1.x86_64.rpm bluez-5.65-150500.3.3.1.s390x.rpm bluez-cups-5.65-150500.3.3.1.s390x.rpm bluez-deprecated-5.65-150500.3.3.1.s390x.rpm bluez-devel-5.65-150500.3.3.1.s390x.rpm bluez-obexd-5.65-150500.3.3.1.s390x.rpm bluez-test-5.65-150500.3.3.1.s390x.rpm libbluetooth3-5.65-150500.3.3.1.s390x.rpm bluez-5.65-150500.3.3.1.ppc64le.rpm bluez-cups-5.65-150500.3.3.1.ppc64le.rpm bluez-deprecated-5.65-150500.3.3.1.ppc64le.rpm bluez-devel-5.65-150500.3.3.1.ppc64le.rpm bluez-obexd-5.65-150500.3.3.1.ppc64le.rpm bluez-test-5.65-150500.3.3.1.ppc64le.rpm libbluetooth3-5.65-150500.3.3.1.ppc64le.rpm bluez-5.65-150500.3.3.1.aarch64.rpm bluez-cups-5.65-150500.3.3.1.aarch64.rpm bluez-deprecated-5.65-150500.3.3.1.aarch64.rpm bluez-devel-5.65-150500.3.3.1.aarch64.rpm bluez-obexd-5.65-150500.3.3.1.aarch64.rpm bluez-test-5.65-150500.3.3.1.aarch64.rpm libbluetooth3-5.65-150500.3.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-2608 Security update for ntp moderate SUSE Updates openSUSE-SLE 15.5 This update for ntp fixes the following issues: - CVE-2023-26555: Fixed assertion failure on malformed RT-11 dates (bsc#1210390). ntp-4.2.8p17-150000.4.25.1.src.rpm ntp-4.2.8p17-150000.4.25.1.x86_64.rpm ntp-doc-4.2.8p17-150000.4.25.1.x86_64.rpm ntp-4.2.8p17-150000.4.25.1.s390x.rpm ntp-doc-4.2.8p17-150000.4.25.1.s390x.rpm ntp-4.2.8p17-150000.4.25.1.ppc64le.rpm ntp-doc-4.2.8p17-150000.4.25.1.ppc64le.rpm ntp-4.2.8p17-150000.4.25.1.aarch64.rpm ntp-doc-4.2.8p17-150000.4.25.1.aarch64.rpm openSUSE-SLE-15.5-2023-2550 Recommended update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings moderate SUSE Updates openSUSE-SLE 15.5 This update for autoyast2, libsolv, libyui, libzypp, yast2-pkg-bindings ships the update stack to the INSTALLER self-update channel. yast2-pkg-bindings: - Added a new option for rebuilding the RPM database (--rebuilddb) (bsc#1209565) autoyast2: - Selected products are not installed after resetting the package manager internally (bsc#1202234) libyui: - Prevent buffer overflow when drawing very wide labels in ncurses (bsc#1211354) - Fixed loading icons from an absolute path (bsc#1210591) - Fix for main window stacking order to avoid unintentional transparency (bsc#1199020, bsc#1191112) - Force messages from .ui file through our translation mechanism (bsc#1198097) libsolv-0.7.24-150400.3.8.1.src.rpm True libsolv-demo-0.7.24-150400.3.8.1.x86_64.rpm True libsolv-devel-0.7.24-150400.3.8.1.x86_64.rpm True libsolv-tools-0.7.24-150400.3.8.1.x86_64.rpm True libzck-devel-1.1.16-150400.3.4.1.x86_64.rpm True libzck1-1.1.16-150400.3.4.1.x86_64.rpm True libzypp-17.31.13-150400.3.32.1.src.rpm True libzypp-17.31.13-150400.3.32.1.x86_64.rpm True libzypp-devel-17.31.13-150400.3.32.1.x86_64.rpm True libzypp-devel-doc-17.31.13-150400.3.32.1.x86_64.rpm True perl-solv-0.7.24-150400.3.8.1.x86_64.rpm True python-solv-0.7.24-150400.3.8.1.x86_64.rpm True python3-solv-0.7.24-150400.3.8.1.x86_64.rpm True ruby-solv-0.7.24-150400.3.8.1.x86_64.rpm True zchunk-1.1.16-150400.3.4.1.src.rpm True zchunk-1.1.16-150400.3.4.1.x86_64.rpm True libsolv-demo-0.7.24-150400.3.8.1.s390x.rpm True libsolv-devel-0.7.24-150400.3.8.1.s390x.rpm True libsolv-tools-0.7.24-150400.3.8.1.s390x.rpm True libzck-devel-1.1.16-150400.3.4.1.s390x.rpm True libzck1-1.1.16-150400.3.4.1.s390x.rpm True libzypp-17.31.13-150400.3.32.1.s390x.rpm True libzypp-devel-17.31.13-150400.3.32.1.s390x.rpm True libzypp-devel-doc-17.31.13-150400.3.32.1.s390x.rpm True perl-solv-0.7.24-150400.3.8.1.s390x.rpm True python-solv-0.7.24-150400.3.8.1.s390x.rpm True python3-solv-0.7.24-150400.3.8.1.s390x.rpm True ruby-solv-0.7.24-150400.3.8.1.s390x.rpm True zchunk-1.1.16-150400.3.4.1.s390x.rpm True libsolv-demo-0.7.24-150400.3.8.1.ppc64le.rpm True libsolv-devel-0.7.24-150400.3.8.1.ppc64le.rpm True libsolv-tools-0.7.24-150400.3.8.1.ppc64le.rpm True libzck-devel-1.1.16-150400.3.4.1.ppc64le.rpm True libzck1-1.1.16-150400.3.4.1.ppc64le.rpm True libzypp-17.31.13-150400.3.32.1.ppc64le.rpm True libzypp-devel-17.31.13-150400.3.32.1.ppc64le.rpm True libzypp-devel-doc-17.31.13-150400.3.32.1.ppc64le.rpm True perl-solv-0.7.24-150400.3.8.1.ppc64le.rpm True python-solv-0.7.24-150400.3.8.1.ppc64le.rpm True python3-solv-0.7.24-150400.3.8.1.ppc64le.rpm True ruby-solv-0.7.24-150400.3.8.1.ppc64le.rpm True zchunk-1.1.16-150400.3.4.1.ppc64le.rpm True libsolv-demo-0.7.24-150400.3.8.1.aarch64.rpm True libsolv-devel-0.7.24-150400.3.8.1.aarch64.rpm True libsolv-tools-0.7.24-150400.3.8.1.aarch64.rpm True libzck-devel-1.1.16-150400.3.4.1.aarch64.rpm True libzck1-1.1.16-150400.3.4.1.aarch64.rpm True libzypp-17.31.13-150400.3.32.1.aarch64.rpm True libzypp-devel-17.31.13-150400.3.32.1.aarch64.rpm True libzypp-devel-doc-17.31.13-150400.3.32.1.aarch64.rpm True perl-solv-0.7.24-150400.3.8.1.aarch64.rpm True python-solv-0.7.24-150400.3.8.1.aarch64.rpm True python3-solv-0.7.24-150400.3.8.1.aarch64.rpm True ruby-solv-0.7.24-150400.3.8.1.aarch64.rpm True zchunk-1.1.16-150400.3.4.1.aarch64.rpm True openSUSE-SLE-15.5-2023-2626 Recommended update for picocli moderate SUSE Updates openSUSE-SLE 15.5 This update for picocli fixes the following issues: - Update to version 4.7.4 picocli-4.7.4-150200.3.11.1.noarch.rpm picocli-4.7.4-150200.3.11.1.src.rpm picocli-javadoc-4.7.4-150200.3.11.1.noarch.rpm openSUSE-SLE-15.5-2023-2610 Security update for php8 moderate SUSE Updates openSUSE-SLE 15.5 This update for php8 fixes the following issues: - CVE-2023-3247: Fixed missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (bsc#1212349). apache2-mod_php8-8.0.29-150400.4.34.1.src.rpm apache2-mod_php8-8.0.29-150400.4.34.1.x86_64.rpm php8-8.0.29-150400.4.34.1.src.rpm php8-8.0.29-150400.4.34.1.x86_64.rpm php8-bcmath-8.0.29-150400.4.34.1.x86_64.rpm php8-bz2-8.0.29-150400.4.34.1.x86_64.rpm php8-calendar-8.0.29-150400.4.34.1.x86_64.rpm php8-cli-8.0.29-150400.4.34.1.x86_64.rpm php8-ctype-8.0.29-150400.4.34.1.x86_64.rpm php8-curl-8.0.29-150400.4.34.1.x86_64.rpm php8-dba-8.0.29-150400.4.34.1.x86_64.rpm php8-devel-8.0.29-150400.4.34.1.x86_64.rpm php8-dom-8.0.29-150400.4.34.1.x86_64.rpm php8-embed-8.0.29-150400.4.34.1.src.rpm php8-embed-8.0.29-150400.4.34.1.x86_64.rpm php8-enchant-8.0.29-150400.4.34.1.x86_64.rpm php8-exif-8.0.29-150400.4.34.1.x86_64.rpm php8-fastcgi-8.0.29-150400.4.34.1.src.rpm php8-fastcgi-8.0.29-150400.4.34.1.x86_64.rpm php8-fileinfo-8.0.29-150400.4.34.1.x86_64.rpm php8-fpm-8.0.29-150400.4.34.1.src.rpm php8-fpm-8.0.29-150400.4.34.1.x86_64.rpm php8-ftp-8.0.29-150400.4.34.1.x86_64.rpm php8-gd-8.0.29-150400.4.34.1.x86_64.rpm php8-gettext-8.0.29-150400.4.34.1.x86_64.rpm php8-gmp-8.0.29-150400.4.34.1.x86_64.rpm php8-iconv-8.0.29-150400.4.34.1.x86_64.rpm php8-intl-8.0.29-150400.4.34.1.x86_64.rpm php8-ldap-8.0.29-150400.4.34.1.x86_64.rpm php8-mbstring-8.0.29-150400.4.34.1.x86_64.rpm php8-mysql-8.0.29-150400.4.34.1.x86_64.rpm php8-odbc-8.0.29-150400.4.34.1.x86_64.rpm php8-opcache-8.0.29-150400.4.34.1.x86_64.rpm php8-openssl-8.0.29-150400.4.34.1.x86_64.rpm php8-pcntl-8.0.29-150400.4.34.1.x86_64.rpm php8-pdo-8.0.29-150400.4.34.1.x86_64.rpm php8-pgsql-8.0.29-150400.4.34.1.x86_64.rpm php8-phar-8.0.29-150400.4.34.1.x86_64.rpm php8-posix-8.0.29-150400.4.34.1.x86_64.rpm php8-readline-8.0.29-150400.4.34.1.x86_64.rpm php8-shmop-8.0.29-150400.4.34.1.x86_64.rpm php8-snmp-8.0.29-150400.4.34.1.x86_64.rpm php8-soap-8.0.29-150400.4.34.1.x86_64.rpm php8-sockets-8.0.29-150400.4.34.1.x86_64.rpm php8-sodium-8.0.29-150400.4.34.1.x86_64.rpm php8-sqlite-8.0.29-150400.4.34.1.x86_64.rpm php8-sysvmsg-8.0.29-150400.4.34.1.x86_64.rpm php8-sysvsem-8.0.29-150400.4.34.1.x86_64.rpm php8-sysvshm-8.0.29-150400.4.34.1.x86_64.rpm php8-test-8.0.29-150400.4.34.1.src.rpm php8-test-8.0.29-150400.4.34.1.x86_64.rpm php8-tidy-8.0.29-150400.4.34.1.x86_64.rpm php8-tokenizer-8.0.29-150400.4.34.1.x86_64.rpm php8-xmlreader-8.0.29-150400.4.34.1.x86_64.rpm php8-xmlwriter-8.0.29-150400.4.34.1.x86_64.rpm php8-xsl-8.0.29-150400.4.34.1.x86_64.rpm php8-zip-8.0.29-150400.4.34.1.x86_64.rpm php8-zlib-8.0.29-150400.4.34.1.x86_64.rpm apache2-mod_php8-8.0.29-150400.4.34.1.s390x.rpm php8-8.0.29-150400.4.34.1.s390x.rpm php8-bcmath-8.0.29-150400.4.34.1.s390x.rpm php8-bz2-8.0.29-150400.4.34.1.s390x.rpm php8-calendar-8.0.29-150400.4.34.1.s390x.rpm php8-cli-8.0.29-150400.4.34.1.s390x.rpm php8-ctype-8.0.29-150400.4.34.1.s390x.rpm php8-curl-8.0.29-150400.4.34.1.s390x.rpm php8-dba-8.0.29-150400.4.34.1.s390x.rpm php8-devel-8.0.29-150400.4.34.1.s390x.rpm php8-dom-8.0.29-150400.4.34.1.s390x.rpm php8-embed-8.0.29-150400.4.34.1.s390x.rpm php8-enchant-8.0.29-150400.4.34.1.s390x.rpm php8-exif-8.0.29-150400.4.34.1.s390x.rpm php8-fastcgi-8.0.29-150400.4.34.1.s390x.rpm php8-fileinfo-8.0.29-150400.4.34.1.s390x.rpm php8-fpm-8.0.29-150400.4.34.1.s390x.rpm php8-ftp-8.0.29-150400.4.34.1.s390x.rpm php8-gd-8.0.29-150400.4.34.1.s390x.rpm php8-gettext-8.0.29-150400.4.34.1.s390x.rpm php8-gmp-8.0.29-150400.4.34.1.s390x.rpm php8-iconv-8.0.29-150400.4.34.1.s390x.rpm php8-intl-8.0.29-150400.4.34.1.s390x.rpm php8-ldap-8.0.29-150400.4.34.1.s390x.rpm php8-mbstring-8.0.29-150400.4.34.1.s390x.rpm php8-mysql-8.0.29-150400.4.34.1.s390x.rpm php8-odbc-8.0.29-150400.4.34.1.s390x.rpm php8-opcache-8.0.29-150400.4.34.1.s390x.rpm php8-openssl-8.0.29-150400.4.34.1.s390x.rpm php8-pcntl-8.0.29-150400.4.34.1.s390x.rpm php8-pdo-8.0.29-150400.4.34.1.s390x.rpm php8-pgsql-8.0.29-150400.4.34.1.s390x.rpm php8-phar-8.0.29-150400.4.34.1.s390x.rpm php8-posix-8.0.29-150400.4.34.1.s390x.rpm php8-readline-8.0.29-150400.4.34.1.s390x.rpm php8-shmop-8.0.29-150400.4.34.1.s390x.rpm php8-snmp-8.0.29-150400.4.34.1.s390x.rpm php8-soap-8.0.29-150400.4.34.1.s390x.rpm php8-sockets-8.0.29-150400.4.34.1.s390x.rpm php8-sodium-8.0.29-150400.4.34.1.s390x.rpm php8-sqlite-8.0.29-150400.4.34.1.s390x.rpm php8-sysvmsg-8.0.29-150400.4.34.1.s390x.rpm php8-sysvsem-8.0.29-150400.4.34.1.s390x.rpm php8-sysvshm-8.0.29-150400.4.34.1.s390x.rpm php8-test-8.0.29-150400.4.34.1.s390x.rpm php8-tidy-8.0.29-150400.4.34.1.s390x.rpm php8-tokenizer-8.0.29-150400.4.34.1.s390x.rpm php8-xmlreader-8.0.29-150400.4.34.1.s390x.rpm php8-xmlwriter-8.0.29-150400.4.34.1.s390x.rpm php8-xsl-8.0.29-150400.4.34.1.s390x.rpm php8-zip-8.0.29-150400.4.34.1.s390x.rpm php8-zlib-8.0.29-150400.4.34.1.s390x.rpm apache2-mod_php8-8.0.29-150400.4.34.1.ppc64le.rpm php8-8.0.29-150400.4.34.1.ppc64le.rpm php8-bcmath-8.0.29-150400.4.34.1.ppc64le.rpm php8-bz2-8.0.29-150400.4.34.1.ppc64le.rpm php8-calendar-8.0.29-150400.4.34.1.ppc64le.rpm php8-cli-8.0.29-150400.4.34.1.ppc64le.rpm php8-ctype-8.0.29-150400.4.34.1.ppc64le.rpm php8-curl-8.0.29-150400.4.34.1.ppc64le.rpm php8-dba-8.0.29-150400.4.34.1.ppc64le.rpm php8-devel-8.0.29-150400.4.34.1.ppc64le.rpm php8-dom-8.0.29-150400.4.34.1.ppc64le.rpm php8-embed-8.0.29-150400.4.34.1.ppc64le.rpm php8-enchant-8.0.29-150400.4.34.1.ppc64le.rpm php8-exif-8.0.29-150400.4.34.1.ppc64le.rpm php8-fastcgi-8.0.29-150400.4.34.1.ppc64le.rpm php8-fileinfo-8.0.29-150400.4.34.1.ppc64le.rpm php8-fpm-8.0.29-150400.4.34.1.ppc64le.rpm php8-ftp-8.0.29-150400.4.34.1.ppc64le.rpm php8-gd-8.0.29-150400.4.34.1.ppc64le.rpm php8-gettext-8.0.29-150400.4.34.1.ppc64le.rpm php8-gmp-8.0.29-150400.4.34.1.ppc64le.rpm php8-iconv-8.0.29-150400.4.34.1.ppc64le.rpm php8-intl-8.0.29-150400.4.34.1.ppc64le.rpm php8-ldap-8.0.29-150400.4.34.1.ppc64le.rpm php8-mbstring-8.0.29-150400.4.34.1.ppc64le.rpm php8-mysql-8.0.29-150400.4.34.1.ppc64le.rpm php8-odbc-8.0.29-150400.4.34.1.ppc64le.rpm php8-opcache-8.0.29-150400.4.34.1.ppc64le.rpm php8-openssl-8.0.29-150400.4.34.1.ppc64le.rpm php8-pcntl-8.0.29-150400.4.34.1.ppc64le.rpm php8-pdo-8.0.29-150400.4.34.1.ppc64le.rpm php8-pgsql-8.0.29-150400.4.34.1.ppc64le.rpm php8-phar-8.0.29-150400.4.34.1.ppc64le.rpm php8-posix-8.0.29-150400.4.34.1.ppc64le.rpm php8-readline-8.0.29-150400.4.34.1.ppc64le.rpm php8-shmop-8.0.29-150400.4.34.1.ppc64le.rpm php8-snmp-8.0.29-150400.4.34.1.ppc64le.rpm php8-soap-8.0.29-150400.4.34.1.ppc64le.rpm php8-sockets-8.0.29-150400.4.34.1.ppc64le.rpm php8-sodium-8.0.29-150400.4.34.1.ppc64le.rpm php8-sqlite-8.0.29-150400.4.34.1.ppc64le.rpm php8-sysvmsg-8.0.29-150400.4.34.1.ppc64le.rpm php8-sysvsem-8.0.29-150400.4.34.1.ppc64le.rpm php8-sysvshm-8.0.29-150400.4.34.1.ppc64le.rpm php8-test-8.0.29-150400.4.34.1.ppc64le.rpm php8-tidy-8.0.29-150400.4.34.1.ppc64le.rpm php8-tokenizer-8.0.29-150400.4.34.1.ppc64le.rpm php8-xmlreader-8.0.29-150400.4.34.1.ppc64le.rpm php8-xmlwriter-8.0.29-150400.4.34.1.ppc64le.rpm php8-xsl-8.0.29-150400.4.34.1.ppc64le.rpm php8-zip-8.0.29-150400.4.34.1.ppc64le.rpm php8-zlib-8.0.29-150400.4.34.1.ppc64le.rpm apache2-mod_php8-8.0.29-150400.4.34.1.aarch64.rpm php8-8.0.29-150400.4.34.1.aarch64.rpm php8-bcmath-8.0.29-150400.4.34.1.aarch64.rpm php8-bz2-8.0.29-150400.4.34.1.aarch64.rpm php8-calendar-8.0.29-150400.4.34.1.aarch64.rpm php8-cli-8.0.29-150400.4.34.1.aarch64.rpm php8-ctype-8.0.29-150400.4.34.1.aarch64.rpm php8-curl-8.0.29-150400.4.34.1.aarch64.rpm php8-dba-8.0.29-150400.4.34.1.aarch64.rpm php8-devel-8.0.29-150400.4.34.1.aarch64.rpm php8-dom-8.0.29-150400.4.34.1.aarch64.rpm php8-embed-8.0.29-150400.4.34.1.aarch64.rpm php8-enchant-8.0.29-150400.4.34.1.aarch64.rpm php8-exif-8.0.29-150400.4.34.1.aarch64.rpm php8-fastcgi-8.0.29-150400.4.34.1.aarch64.rpm php8-fileinfo-8.0.29-150400.4.34.1.aarch64.rpm php8-fpm-8.0.29-150400.4.34.1.aarch64.rpm php8-ftp-8.0.29-150400.4.34.1.aarch64.rpm php8-gd-8.0.29-150400.4.34.1.aarch64.rpm php8-gettext-8.0.29-150400.4.34.1.aarch64.rpm php8-gmp-8.0.29-150400.4.34.1.aarch64.rpm php8-iconv-8.0.29-150400.4.34.1.aarch64.rpm php8-intl-8.0.29-150400.4.34.1.aarch64.rpm php8-ldap-8.0.29-150400.4.34.1.aarch64.rpm php8-mbstring-8.0.29-150400.4.34.1.aarch64.rpm php8-mysql-8.0.29-150400.4.34.1.aarch64.rpm php8-odbc-8.0.29-150400.4.34.1.aarch64.rpm php8-opcache-8.0.29-150400.4.34.1.aarch64.rpm php8-openssl-8.0.29-150400.4.34.1.aarch64.rpm php8-pcntl-8.0.29-150400.4.34.1.aarch64.rpm php8-pdo-8.0.29-150400.4.34.1.aarch64.rpm php8-pgsql-8.0.29-150400.4.34.1.aarch64.rpm php8-phar-8.0.29-150400.4.34.1.aarch64.rpm php8-posix-8.0.29-150400.4.34.1.aarch64.rpm php8-readline-8.0.29-150400.4.34.1.aarch64.rpm php8-shmop-8.0.29-150400.4.34.1.aarch64.rpm php8-snmp-8.0.29-150400.4.34.1.aarch64.rpm php8-soap-8.0.29-150400.4.34.1.aarch64.rpm php8-sockets-8.0.29-150400.4.34.1.aarch64.rpm php8-sodium-8.0.29-150400.4.34.1.aarch64.rpm php8-sqlite-8.0.29-150400.4.34.1.aarch64.rpm php8-sysvmsg-8.0.29-150400.4.34.1.aarch64.rpm php8-sysvsem-8.0.29-150400.4.34.1.aarch64.rpm php8-sysvshm-8.0.29-150400.4.34.1.aarch64.rpm php8-test-8.0.29-150400.4.34.1.aarch64.rpm php8-tidy-8.0.29-150400.4.34.1.aarch64.rpm php8-tokenizer-8.0.29-150400.4.34.1.aarch64.rpm php8-xmlreader-8.0.29-150400.4.34.1.aarch64.rpm php8-xmlwriter-8.0.29-150400.4.34.1.aarch64.rpm php8-xsl-8.0.29-150400.4.34.1.aarch64.rpm php8-zip-8.0.29-150400.4.34.1.aarch64.rpm php8-zlib-8.0.29-150400.4.34.1.aarch64.rpm openSUSE-SLE-15.5-2023-2560 Recommended update for rust-cbindgen moderate SUSE Updates openSUSE-SLE 15.5 This update for rust-cbindgen fixes the following issues: Update to version 0.24.3+git0: * tests: Add a test for struct constants going through typedefs. * bindings: Peel through typedefs for struct constant generation. * bitflags: Be explicit in binary operators and such. * constant: Add support for unary negation. * bitflags: Make more operations constexpr. Update to version 0.24.2+git0: * bitflags: Be explicit in binary operators and such. * constant: Add support for unary negation. * bitflags: Make more operations constexpr. * constant: Support suffixes for integers that otherwise would be narrowed. * Fix specialization of `SomeType<N>` when `N` is a const parameter. * Minor refactor of ConstExpr::load(). rust-cbindgen-0.24.3+git0-150000.1.15.1.src.rpm rust-cbindgen-0.24.3+git0-150000.1.15.1.x86_64.rpm rust-cbindgen-0.24.3+git0-150000.1.15.1.s390x.rpm rust-cbindgen-0.24.3+git0-150000.1.15.1.ppc64le.rpm rust-cbindgen-0.24.3+git0-150000.1.15.1.aarch64.rpm openSUSE-SLE-15.5-2023-2617 Security update for google-cloud-sap-agent important SUSE Updates openSUSE-SLE 15.5 This update of google-cloud-sap-agent fixes the following issues: - rebuild the package with the go 1.20 security release (bsc#1206346). google-cloud-sap-agent-1.5.1-150100.3.9.1.src.rpm google-cloud-sap-agent-1.5.1-150100.3.9.1.x86_64.rpm google-cloud-sap-agent-1.5.1-150100.3.9.1.s390x.rpm google-cloud-sap-agent-1.5.1-150100.3.9.1.ppc64le.rpm google-cloud-sap-agent-1.5.1-150100.3.9.1.aarch64.rpm