openSUSE-SLE-15.5-2022-2956
Recommended update for post-build-checks
moderate
SUSE Updates openSUSE-SLE 15.5
This update for post-build-checks is a test update for openSUSE Leap 15.5.
post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.noarch.rpm
post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.src.rpm
openSUSE-SLE-15.5-2022-4205
Security update for net-snmp
moderate
SUSE Updates openSUSE-SLE 15.5
This update for net-snmp fixes the following issues:
Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):
- CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.
- CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference.
- CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously.
- CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access.
- CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.
- CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
net-snmp-5.9.3-150300.15.3.1.src.rpm
net-snmp-5.9.3-150300.15.3.1.x86_64.rpm
net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64.rpm
net-snmp-devel-5.9.3-150300.15.3.1.x86_64.rpm
perl-SNMP-5.9.3-150300.15.3.1.x86_64.rpm
python3-net-snmp-5.9.3-150300.15.3.1.x86_64.rpm
snmp-mibs-5.9.3-150300.15.3.1.x86_64.rpm
net-snmp-5.9.3-150300.15.3.1.s390x.rpm
net-snmp-devel-5.9.3-150300.15.3.1.s390x.rpm
perl-SNMP-5.9.3-150300.15.3.1.s390x.rpm
python3-net-snmp-5.9.3-150300.15.3.1.s390x.rpm
snmp-mibs-5.9.3-150300.15.3.1.s390x.rpm
net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm
net-snmp-devel-5.9.3-150300.15.3.1.ppc64le.rpm
perl-SNMP-5.9.3-150300.15.3.1.ppc64le.rpm
python3-net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm
snmp-mibs-5.9.3-150300.15.3.1.ppc64le.rpm
net-snmp-5.9.3-150300.15.3.1.aarch64.rpm
net-snmp-devel-5.9.3-150300.15.3.1.aarch64.rpm
perl-SNMP-5.9.3-150300.15.3.1.aarch64.rpm
python3-net-snmp-5.9.3-150300.15.3.1.aarch64.rpm
snmp-mibs-5.9.3-150300.15.3.1.aarch64.rpm
openSUSE-SLE-15.5-2023-419
Security update for nodejs18
moderate
SUSE Updates openSUSE-SLE 15.5
This update for nodejs18 fixes the following issues:
This update ships nodejs18 (jsc#PED-2097)
Update to NodejJS 18.13.0 LTS:
* build: disable v8 snapshot compression by default
* crypto: update root certificates
* deps: update ICU to 72.1
* doc:
+ add doc-only deprecation for headers/trailers setters
+ add Rafael to the tsc
+ deprecate use of invalid ports in url.parse
+ deprecate url.parse()
* lib: drop fetch experimental warning
* net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options
* src:
+ add uvwasi version
+ add initial shadow realm support
* test_runner:
+ add t.after() hook
+ don't use a symbol for runHook()
* tls:
+ add "ca" property to certificate object
* util:
+ add fast path for utf8 encoding
+ improve textdecoder decode performance
+ add MIME utilities
- Fixes compatibility with ICU 72.1 (bsc#1205236)
- Fix migration to openssl-3 (bsc#1205042)
Update to NodeJS 18.12.1 LTS:
* inspector: DNS rebinding in --inspect via invalid octal IP
(bsc#1205119, CVE-2022-43548)
Update to NodeJS 18.12.0 LTS:
* Running in 'watch' mode using node --watch restarts the process
when an imported file is changed.
* fs: add FileHandle.prototype.readLines
* http: add writeEarlyHints function to ServerResponse
* http2: make early hints generic
* util: add default value option to parsearg
Update to NodeJS 18.11.0:
* added experimental watch mode -- running in 'watch' mode using
node --watch restarts the process when an imported file is changed
* fs: add FileHandle.prototype.readLines
* http: add writeEarlyHints function to ServerResponse
* http2: make early hints generic
* lib: refactor transferable AbortSignal
* src: add detailed embedder process initialization API
* util: add default value option to parsearg
Update to NodeJS 18.10.0:
* deps: upgrade npm to 8.19.2
* http: throw error on content-length mismatch
* stream: add ReadableByteStream.tee()
Update to Nodejs 18.9.1:
* deps: llhttp updated to 6.0.10
+ CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325)
+ Incorrect Parsing of Multi-line Transfer-Encoding
(CVE-2022-32215, bsc#1201327)
+ Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832)
* crypto: fix weak randomness in WebCrypto keygen
(CVE-2022-35255, bsc#1203831)
Update to Nodejs 18.9.0:
* lib - add diagnostics channel for process and worker
* os - add machine method
* report - expose report public native apis
* src - expose environment RequestInterrupt api
* vm - include vm context in the embedded snapshot
Changes in 18.8.0:
* bootstrap: implement run-time user-land snapshots via
--build-snapshot and --snapshot-blob. See
* crypto:
+ allow zero-length IKM in HKDF and in webcrypto PBKDF2
+ allow zero-length secret KeyObject
* deps: upgrade npm to 8.18.0
* http: make idle http parser count configurable
* net: add local family
* src: print source map error source on demand
* tls: pass a valid socket on tlsClientError
Update to Nodejs 18.7.0:
* events: add CustomEvent
* http: add drop request event for http server
* lib: improved diagnostics_channel subscribe/unsubscribe
* util: add tokens to parseArgs
- enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303)
Update to Nodejs 18.6.0:
* Experimental ESM Loader Hooks API. For details see,
https://nodejs.org/api/esm.html
* dns: export error code constants from dns/promises
* esm: add chaining to loaders
* http: add diagnostics channel for http client
* http: add perf_hooks detail for http request and client
* module: add isBuiltIn method
* net: add drop event for net server
* test_runner: expose describe and it
* v8: add v8.startupSnapshot utils
For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0
Update to Nodejs 18.5.0:
* http: stricter Transfer-Encoding and header separator parsing
(bsc#1201325, bsc#1201326, bsc#1201327,
CVE-2022-32213, CVE-2022-32214, CVE-2022-32215)
* src: fix IPv4 validation in inspector_socket
(bsc#1201328, CVE-2022-32212)
For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0
Update to Nodejs 18.4.0. For detailed changes see,
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0
Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see
https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0
corepack18-18.13.0-150400.9.3.1.x86_64.rpm
nodejs18-18.13.0-150400.9.3.1.src.rpm
nodejs18-18.13.0-150400.9.3.1.x86_64.rpm
nodejs18-devel-18.13.0-150400.9.3.1.x86_64.rpm
nodejs18-docs-18.13.0-150400.9.3.1.noarch.rpm
npm18-18.13.0-150400.9.3.1.x86_64.rpm
corepack18-18.13.0-150400.9.3.1.s390x.rpm
nodejs18-18.13.0-150400.9.3.1.s390x.rpm
nodejs18-devel-18.13.0-150400.9.3.1.s390x.rpm
npm18-18.13.0-150400.9.3.1.s390x.rpm
corepack18-18.13.0-150400.9.3.1.aarch64.rpm
nodejs18-18.13.0-150400.9.3.1.aarch64.rpm
nodejs18-devel-18.13.0-150400.9.3.1.aarch64.rpm
npm18-18.13.0-150400.9.3.1.aarch64.rpm
openSUSE-SLE-15.5-2023-1954
Recommended update for xmlsec1
low
SUSE Updates openSUSE-SLE 15.5
This update for xmlsec1 fixes the following issue:
- Ship missing xmlsec1 to synchronize its version across different products (bsc#1201617)
libxmlsec1-1-1.2.28-150100.7.13.4.x86_64.rpm
libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.x86_64.rpm
libxmlsec1-gnutls1-1.2.28-150100.7.13.4.x86_64.rpm
libxmlsec1-nss1-1.2.28-150100.7.13.4.x86_64.rpm
libxmlsec1-openssl1-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-1.2.28-150100.7.13.4.src.rpm
xmlsec1-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-devel-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-nss-devel-1.2.28-150100.7.13.4.x86_64.rpm
xmlsec1-openssl-devel-1.2.28-150100.7.13.4.x86_64.rpm
libxmlsec1-1-1.2.28-150100.7.13.4.s390x.rpm
libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.s390x.rpm
libxmlsec1-gnutls1-1.2.28-150100.7.13.4.s390x.rpm
libxmlsec1-nss1-1.2.28-150100.7.13.4.s390x.rpm
libxmlsec1-openssl1-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-devel-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-nss-devel-1.2.28-150100.7.13.4.s390x.rpm
xmlsec1-openssl-devel-1.2.28-150100.7.13.4.s390x.rpm
libxmlsec1-1-1.2.28-150100.7.13.4.ppc64le.rpm
libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.ppc64le.rpm
libxmlsec1-gnutls1-1.2.28-150100.7.13.4.ppc64le.rpm
libxmlsec1-nss1-1.2.28-150100.7.13.4.ppc64le.rpm
libxmlsec1-openssl1-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-devel-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-nss-devel-1.2.28-150100.7.13.4.ppc64le.rpm
xmlsec1-openssl-devel-1.2.28-150100.7.13.4.ppc64le.rpm
libxmlsec1-1-1.2.28-150100.7.13.4.aarch64.rpm
libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.aarch64.rpm
libxmlsec1-gnutls1-1.2.28-150100.7.13.4.aarch64.rpm
libxmlsec1-nss1-1.2.28-150100.7.13.4.aarch64.rpm
libxmlsec1-openssl1-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-devel-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-nss-devel-1.2.28-150100.7.13.4.aarch64.rpm
xmlsec1-openssl-devel-1.2.28-150100.7.13.4.aarch64.rpm
openSUSE-SLE-15.5-2023-2296
Security update for openvswitch
important
SUSE Updates openSUSE-SLE 15.5
This update for openvswitch fixes the following issues:
- CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).
libopenvswitch-2_14-0-2.14.2-150400.24.9.1.x86_64.rpm
libovn-20_06-0-20.06.2-150400.24.9.1.x86_64.rpm
openvswitch-2.14.2-150400.24.9.1.src.rpm
openvswitch-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-devel-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-doc-2.14.2-150400.24.9.1.noarch.rpm
openvswitch-ipsec-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-pki-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-test-2.14.2-150400.24.9.1.x86_64.rpm
openvswitch-vtep-2.14.2-150400.24.9.1.x86_64.rpm
ovn-20.06.2-150400.24.9.1.x86_64.rpm
ovn-central-20.06.2-150400.24.9.1.x86_64.rpm
ovn-devel-20.06.2-150400.24.9.1.x86_64.rpm
ovn-doc-20.06.2-150400.24.9.1.noarch.rpm
ovn-docker-20.06.2-150400.24.9.1.x86_64.rpm
ovn-host-20.06.2-150400.24.9.1.x86_64.rpm
ovn-vtep-20.06.2-150400.24.9.1.x86_64.rpm
python3-ovs-2.14.2-150400.24.9.1.x86_64.rpm
libopenvswitch-2_14-0-2.14.2-150400.24.9.1.s390x.rpm
libovn-20_06-0-20.06.2-150400.24.9.1.s390x.rpm
openvswitch-2.14.2-150400.24.9.1.s390x.rpm
openvswitch-devel-2.14.2-150400.24.9.1.s390x.rpm
openvswitch-ipsec-2.14.2-150400.24.9.1.s390x.rpm
openvswitch-pki-2.14.2-150400.24.9.1.s390x.rpm
openvswitch-test-2.14.2-150400.24.9.1.s390x.rpm
openvswitch-vtep-2.14.2-150400.24.9.1.s390x.rpm
ovn-20.06.2-150400.24.9.1.s390x.rpm
ovn-central-20.06.2-150400.24.9.1.s390x.rpm
ovn-devel-20.06.2-150400.24.9.1.s390x.rpm
ovn-docker-20.06.2-150400.24.9.1.s390x.rpm
ovn-host-20.06.2-150400.24.9.1.s390x.rpm
ovn-vtep-20.06.2-150400.24.9.1.s390x.rpm
python3-ovs-2.14.2-150400.24.9.1.s390x.rpm
libopenvswitch-2_14-0-2.14.2-150400.24.9.1.ppc64le.rpm
libovn-20_06-0-20.06.2-150400.24.9.1.ppc64le.rpm
openvswitch-2.14.2-150400.24.9.1.ppc64le.rpm
openvswitch-devel-2.14.2-150400.24.9.1.ppc64le.rpm
openvswitch-ipsec-2.14.2-150400.24.9.1.ppc64le.rpm
openvswitch-pki-2.14.2-150400.24.9.1.ppc64le.rpm
openvswitch-test-2.14.2-150400.24.9.1.ppc64le.rpm
openvswitch-vtep-2.14.2-150400.24.9.1.ppc64le.rpm
ovn-20.06.2-150400.24.9.1.ppc64le.rpm
ovn-central-20.06.2-150400.24.9.1.ppc64le.rpm
ovn-devel-20.06.2-150400.24.9.1.ppc64le.rpm
ovn-docker-20.06.2-150400.24.9.1.ppc64le.rpm
ovn-host-20.06.2-150400.24.9.1.ppc64le.rpm
ovn-vtep-20.06.2-150400.24.9.1.ppc64le.rpm
python3-ovs-2.14.2-150400.24.9.1.ppc64le.rpm
libopenvswitch-2_14-0-2.14.2-150400.24.9.1.aarch64.rpm
libovn-20_06-0-20.06.2-150400.24.9.1.aarch64.rpm
openvswitch-2.14.2-150400.24.9.1.aarch64.rpm
openvswitch-devel-2.14.2-150400.24.9.1.aarch64.rpm
openvswitch-ipsec-2.14.2-150400.24.9.1.aarch64.rpm
openvswitch-pki-2.14.2-150400.24.9.1.aarch64.rpm
openvswitch-test-2.14.2-150400.24.9.1.aarch64.rpm
openvswitch-vtep-2.14.2-150400.24.9.1.aarch64.rpm
ovn-20.06.2-150400.24.9.1.aarch64.rpm
ovn-central-20.06.2-150400.24.9.1.aarch64.rpm
ovn-devel-20.06.2-150400.24.9.1.aarch64.rpm
ovn-docker-20.06.2-150400.24.9.1.aarch64.rpm
ovn-host-20.06.2-150400.24.9.1.aarch64.rpm
ovn-vtep-20.06.2-150400.24.9.1.aarch64.rpm
python3-ovs-2.14.2-150400.24.9.1.aarch64.rpm
openSUSE-SLE-15.5-2023-2313
Security update for c-ares
important
SUSE Updates openSUSE-SLE 15.5
This update for c-ares fixes the following issues:
Update to version 1.19.1:
- CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604)
- CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605)
- CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606)
- CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607)
- Fix uninitialized memory warning in test
- ares_getaddrinfo() should allow a port of 0
- Fix memory leak in ares_send() on error
- Fix comment style in ares_data.h
- Fix typo in ares_init_options.3
- Sync ax_pthread.m4 with upstream
- Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support
c-ares-1.19.1-150000.3.23.1.src.rpm
c-ares-devel-1.19.1-150000.3.23.1.x86_64.rpm
c-ares-utils-1.19.1-150000.3.23.1.x86_64.rpm
libcares2-1.19.1-150000.3.23.1.x86_64.rpm
libcares2-32bit-1.19.1-150000.3.23.1.x86_64.rpm
c-ares-devel-1.19.1-150000.3.23.1.s390x.rpm
c-ares-utils-1.19.1-150000.3.23.1.s390x.rpm
libcares2-1.19.1-150000.3.23.1.s390x.rpm
c-ares-devel-1.19.1-150000.3.23.1.ppc64le.rpm
c-ares-utils-1.19.1-150000.3.23.1.ppc64le.rpm
libcares2-1.19.1-150000.3.23.1.ppc64le.rpm
c-ares-devel-1.19.1-150000.3.23.1.aarch64.rpm
c-ares-utils-1.19.1-150000.3.23.1.aarch64.rpm
libcares2-1.19.1-150000.3.23.1.aarch64.rpm
openSUSE-SLE-15.5-2023-2312
Security update for go1.18-openssl
important
SUSE Updates openSUSE-SLE 15.5
This update for go1.18-openssl fixes the following issues:
- Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962)
* Main go1.x package included libstd.so in previous versions
* Split libstd.so into subpackage that can be installed standalone
* Continues the slimming down of main go1.x package by 40 Mb
* Experimental and not recommended for general use, Go currently has no ABI
* Upstream Go has not committed to support buildmode=shared long-term
* Do not use in packaging, build static single binaries (the default)
* Upstream Go go1.x binary releases do not include libstd.so
* go1.x Suggests go1.x-libstd so not installed by default Recommends
* go1.x-libstd does not Require: go1.x so can install standalone
* Provides go-libstd unversioned package name
* Fix build step -buildmode=shared std to omit -linkshared
- Packaging improvements:
* go1.x Suggests go1.x-doc so not installed by default Recommends
* Use Group: Development/Languages/Go instead of Other
- Improvements to go1.x packaging spec:
* On Tumbleweed bootstrap with current default gcc13 and gccgo118
* On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap
using go1.x package (%bcond_without gccgo). This is no longer
needed on current SLE-12:Update and removing will consolidate
the build configurations used.
* Change source URLs to go.dev as per Go upstream
* On x86_64 export GOAMD64=v1 as per the current baseline.
At this time forgo GOAMD64=v3 option for x86_64_v3 support.
* On x86_64 %define go_amd64=v1 as current instruction baseline
- Update to version 1.18.10.1 cut from the go1.18-openssl-fips
branch at the revision tagged go1.18.10-1-openssl-fips.
* Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips
* Merge go1.18.10 into dev.boringcrypto.go1.18
- go1.18.10 (released 2023-01-10) includes fixes to cgo, the
compiler, the linker, and the crypto/x509, net/http, and syscall
packages.
Refs bsc#1193742 go1.18 release tracking
* go#57705 misc/cgo: backport needed for dlltool fix
* go#57426 crypto/x509: Verify on macOS does not return typed errors
* go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its "old" argument.
* go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices
* go#57213 os: TestLstat failure on Linux Aarch64
* go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length
* go#57057 cmd/go: remove test dependency on gopkg.in service
* go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders
* go#57044 cgo: malformed DWARF TagVariable entry
* go#57028 cmd/cgo: Wrong types in compiler errors with clang 14
* go#56833 cmd/link/internal/ppc64: too-far trampoline is reused
* go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target
* go#56323 net/http: bad handling of HEAD requests with a body
go1.18-openssl-1.18.10.1-150000.1.9.1.src.rpm
go1.18-openssl-1.18.10.1-150000.1.9.1.x86_64.rpm
go1.18-openssl-doc-1.18.10.1-150000.1.9.1.x86_64.rpm
go1.18-openssl-race-1.18.10.1-150000.1.9.1.x86_64.rpm
go1.18-openssl-1.18.10.1-150000.1.9.1.s390x.rpm
go1.18-openssl-doc-1.18.10.1-150000.1.9.1.s390x.rpm
go1.18-openssl-1.18.10.1-150000.1.9.1.ppc64le.rpm
go1.18-openssl-doc-1.18.10.1-150000.1.9.1.ppc64le.rpm
go1.18-openssl-1.18.10.1-150000.1.9.1.aarch64.rpm
go1.18-openssl-doc-1.18.10.1-150000.1.9.1.aarch64.rpm
go1.18-openssl-race-1.18.10.1-150000.1.9.1.aarch64.rpm