openSUSE-SLE-15.5-2022-2956 Recommended update for post-build-checks moderate SUSE Updates openSUSE-SLE 15.5 This update for post-build-checks is a test update for openSUSE Leap 15.5. post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.noarch.rpm post-build-checks-84.87+git20220325.f46ef3c-150500.3.2.1.src.rpm openSUSE-SLE-15.5-2022-4205 Security update for net-snmp moderate SUSE Updates openSUSE-SLE 15.5 This update for net-snmp fixes the following issues: Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203): - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access. - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference. - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously. - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access. - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference. - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference. net-snmp-5.9.3-150300.15.3.1.src.rpm net-snmp-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-32bit-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-devel-5.9.3-150300.15.3.1.x86_64.rpm perl-SNMP-5.9.3-150300.15.3.1.x86_64.rpm python3-net-snmp-5.9.3-150300.15.3.1.x86_64.rpm snmp-mibs-5.9.3-150300.15.3.1.x86_64.rpm net-snmp-5.9.3-150300.15.3.1.s390x.rpm net-snmp-devel-5.9.3-150300.15.3.1.s390x.rpm perl-SNMP-5.9.3-150300.15.3.1.s390x.rpm python3-net-snmp-5.9.3-150300.15.3.1.s390x.rpm snmp-mibs-5.9.3-150300.15.3.1.s390x.rpm net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-devel-5.9.3-150300.15.3.1.ppc64le.rpm perl-SNMP-5.9.3-150300.15.3.1.ppc64le.rpm python3-net-snmp-5.9.3-150300.15.3.1.ppc64le.rpm snmp-mibs-5.9.3-150300.15.3.1.ppc64le.rpm net-snmp-5.9.3-150300.15.3.1.aarch64.rpm net-snmp-devel-5.9.3-150300.15.3.1.aarch64.rpm perl-SNMP-5.9.3-150300.15.3.1.aarch64.rpm python3-net-snmp-5.9.3-150300.15.3.1.aarch64.rpm snmp-mibs-5.9.3-150300.15.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-419 Security update for nodejs18 moderate SUSE Updates openSUSE-SLE 15.5 This update for nodejs18 fixes the following issues: This update ships nodejs18 (jsc#PED-2097) Update to NodejJS 18.13.0 LTS: * build: disable v8 snapshot compression by default * crypto: update root certificates * deps: update ICU to 72.1 * doc: + add doc-only deprecation for headers/trailers setters + add Rafael to the tsc + deprecate use of invalid ports in url.parse + deprecate url.parse() * lib: drop fetch experimental warning * net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options * src: + add uvwasi version + add initial shadow realm support * test_runner: + add t.after() hook + don't use a symbol for runHook() * tls: + add "ca" property to certificate object * util: + add fast path for utf8 encoding + improve textdecoder decode performance + add MIME utilities - Fixes compatibility with ICU 72.1 (bsc#1205236) - Fix migration to openssl-3 (bsc#1205042) Update to NodeJS 18.12.1 LTS: * inspector: DNS rebinding in --inspect via invalid octal IP (bsc#1205119, CVE-2022-43548) Update to NodeJS 18.12.0 LTS: * Running in 'watch' mode using node --watch restarts the process when an imported file is changed. * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * util: add default value option to parsearg Update to NodeJS 18.11.0: * added experimental watch mode -- running in 'watch' mode using node --watch restarts the process when an imported file is changed * fs: add FileHandle.prototype.readLines * http: add writeEarlyHints function to ServerResponse * http2: make early hints generic * lib: refactor transferable AbortSignal * src: add detailed embedder process initialization API * util: add default value option to parsearg Update to NodeJS 18.10.0: * deps: upgrade npm to 8.19.2 * http: throw error on content-length mismatch * stream: add ReadableByteStream.tee() Update to Nodejs 18.9.1: * deps: llhttp updated to 6.0.10 + CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325) + Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215, bsc#1201327) + Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832) * crypto: fix weak randomness in WebCrypto keygen (CVE-2022-35255, bsc#1203831) Update to Nodejs 18.9.0: * lib - add diagnostics channel for process and worker * os - add machine method * report - expose report public native apis * src - expose environment RequestInterrupt api * vm - include vm context in the embedded snapshot Changes in 18.8.0: * bootstrap: implement run-time user-land snapshots via --build-snapshot and --snapshot-blob. See * crypto: + allow zero-length IKM in HKDF and in webcrypto PBKDF2 + allow zero-length secret KeyObject * deps: upgrade npm to 8.18.0 * http: make idle http parser count configurable * net: add local family * src: print source map error source on demand * tls: pass a valid socket on tlsClientError Update to Nodejs 18.7.0: * events: add CustomEvent * http: add drop request event for http server * lib: improved diagnostics_channel subscribe/unsubscribe * util: add tokens to parseArgs - enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303) Update to Nodejs 18.6.0: * Experimental ESM Loader Hooks API. For details see, https://nodejs.org/api/esm.html * dns: export error code constants from dns/promises * esm: add chaining to loaders * http: add diagnostics channel for http client * http: add perf_hooks detail for http request and client * module: add isBuiltIn method * net: add drop event for net server * test_runner: expose describe and it * v8: add v8.startupSnapshot utils For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0 Update to Nodejs 18.5.0: * http: stricter Transfer-Encoding and header separator parsing (bsc#1201325, bsc#1201326, bsc#1201327, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215) * src: fix IPv4 validation in inspector_socket (bsc#1201328, CVE-2022-32212) For details, see https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0 Update to Nodejs 18.4.0. For detailed changes see, https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0 Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0 corepack18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-18.13.0-150400.9.3.1.src.rpm nodejs18-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-devel-18.13.0-150400.9.3.1.x86_64.rpm nodejs18-docs-18.13.0-150400.9.3.1.noarch.rpm npm18-18.13.0-150400.9.3.1.x86_64.rpm corepack18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-18.13.0-150400.9.3.1.s390x.rpm nodejs18-devel-18.13.0-150400.9.3.1.s390x.rpm npm18-18.13.0-150400.9.3.1.s390x.rpm corepack18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-18.13.0-150400.9.3.1.aarch64.rpm nodejs18-devel-18.13.0-150400.9.3.1.aarch64.rpm npm18-18.13.0-150400.9.3.1.aarch64.rpm openSUSE-SLE-15.5-2023-1954 Recommended update for xmlsec1 low SUSE Updates openSUSE-SLE 15.5 This update for xmlsec1 fixes the following issue: - Ship missing xmlsec1 to synchronize its version across different products (bsc#1201617) libxmlsec1-1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-1.2.28-150100.7.13.4.src.rpm xmlsec1-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.x86_64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.x86_64.rpm libxmlsec1-1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.s390x.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.s390x.rpm libxmlsec1-1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.ppc64le.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.ppc64le.rpm libxmlsec1-1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gcrypt1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-gnutls1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-nss1-1.2.28-150100.7.13.4.aarch64.rpm libxmlsec1-openssl1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gcrypt-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-gnutls-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-nss-devel-1.2.28-150100.7.13.4.aarch64.rpm xmlsec1-openssl-devel-1.2.28-150100.7.13.4.aarch64.rpm openSUSE-SLE-15.5-2023-2296 Security update for openvswitch important SUSE Updates openSUSE-SLE 15.5 This update for openvswitch fixes the following issues: - CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054). libopenvswitch-2_14-0-2.14.2-150400.24.9.1.x86_64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.x86_64.rpm openvswitch-2.14.2-150400.24.9.1.src.rpm openvswitch-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-devel-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-doc-2.14.2-150400.24.9.1.noarch.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-pki-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-test-2.14.2-150400.24.9.1.x86_64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.x86_64.rpm ovn-20.06.2-150400.24.9.1.x86_64.rpm ovn-central-20.06.2-150400.24.9.1.x86_64.rpm ovn-devel-20.06.2-150400.24.9.1.x86_64.rpm ovn-doc-20.06.2-150400.24.9.1.noarch.rpm ovn-docker-20.06.2-150400.24.9.1.x86_64.rpm ovn-host-20.06.2-150400.24.9.1.x86_64.rpm ovn-vtep-20.06.2-150400.24.9.1.x86_64.rpm python3-ovs-2.14.2-150400.24.9.1.x86_64.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.s390x.rpm libovn-20_06-0-20.06.2-150400.24.9.1.s390x.rpm openvswitch-2.14.2-150400.24.9.1.s390x.rpm openvswitch-devel-2.14.2-150400.24.9.1.s390x.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.s390x.rpm openvswitch-pki-2.14.2-150400.24.9.1.s390x.rpm openvswitch-test-2.14.2-150400.24.9.1.s390x.rpm openvswitch-vtep-2.14.2-150400.24.9.1.s390x.rpm ovn-20.06.2-150400.24.9.1.s390x.rpm ovn-central-20.06.2-150400.24.9.1.s390x.rpm ovn-devel-20.06.2-150400.24.9.1.s390x.rpm ovn-docker-20.06.2-150400.24.9.1.s390x.rpm ovn-host-20.06.2-150400.24.9.1.s390x.rpm ovn-vtep-20.06.2-150400.24.9.1.s390x.rpm python3-ovs-2.14.2-150400.24.9.1.s390x.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.ppc64le.rpm libovn-20_06-0-20.06.2-150400.24.9.1.ppc64le.rpm openvswitch-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-devel-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-pki-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-test-2.14.2-150400.24.9.1.ppc64le.rpm openvswitch-vtep-2.14.2-150400.24.9.1.ppc64le.rpm ovn-20.06.2-150400.24.9.1.ppc64le.rpm ovn-central-20.06.2-150400.24.9.1.ppc64le.rpm ovn-devel-20.06.2-150400.24.9.1.ppc64le.rpm ovn-docker-20.06.2-150400.24.9.1.ppc64le.rpm ovn-host-20.06.2-150400.24.9.1.ppc64le.rpm ovn-vtep-20.06.2-150400.24.9.1.ppc64le.rpm python3-ovs-2.14.2-150400.24.9.1.ppc64le.rpm libopenvswitch-2_14-0-2.14.2-150400.24.9.1.aarch64.rpm libovn-20_06-0-20.06.2-150400.24.9.1.aarch64.rpm openvswitch-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-devel-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-ipsec-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-pki-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-test-2.14.2-150400.24.9.1.aarch64.rpm openvswitch-vtep-2.14.2-150400.24.9.1.aarch64.rpm ovn-20.06.2-150400.24.9.1.aarch64.rpm ovn-central-20.06.2-150400.24.9.1.aarch64.rpm ovn-devel-20.06.2-150400.24.9.1.aarch64.rpm ovn-docker-20.06.2-150400.24.9.1.aarch64.rpm ovn-host-20.06.2-150400.24.9.1.aarch64.rpm ovn-vtep-20.06.2-150400.24.9.1.aarch64.rpm python3-ovs-2.14.2-150400.24.9.1.aarch64.rpm openSUSE-SLE-15.5-2023-2313 Security update for c-ares important SUSE Updates openSUSE-SLE 15.5 This update for c-ares fixes the following issues: Update to version 1.19.1: - CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604) - CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605) - CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606) - CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607) - Fix uninitialized memory warning in test - ares_getaddrinfo() should allow a port of 0 - Fix memory leak in ares_send() on error - Fix comment style in ares_data.h - Fix typo in ares_init_options.3 - Sync ax_pthread.m4 with upstream - Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support c-ares-1.19.1-150000.3.23.1.src.rpm c-ares-devel-1.19.1-150000.3.23.1.x86_64.rpm c-ares-utils-1.19.1-150000.3.23.1.x86_64.rpm libcares2-1.19.1-150000.3.23.1.x86_64.rpm libcares2-32bit-1.19.1-150000.3.23.1.x86_64.rpm c-ares-devel-1.19.1-150000.3.23.1.s390x.rpm c-ares-utils-1.19.1-150000.3.23.1.s390x.rpm libcares2-1.19.1-150000.3.23.1.s390x.rpm c-ares-devel-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-utils-1.19.1-150000.3.23.1.ppc64le.rpm libcares2-1.19.1-150000.3.23.1.ppc64le.rpm c-ares-devel-1.19.1-150000.3.23.1.aarch64.rpm c-ares-utils-1.19.1-150000.3.23.1.aarch64.rpm libcares2-1.19.1-150000.3.23.1.aarch64.rpm openSUSE-SLE-15.5-2023-2312 Security update for go1.18-openssl important SUSE Updates openSUSE-SLE 15.5 This update for go1.18-openssl fixes the following issues: - Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962) * Main go1.x package included libstd.so in previous versions * Split libstd.so into subpackage that can be installed standalone * Continues the slimming down of main go1.x package by 40 Mb * Experimental and not recommended for general use, Go currently has no ABI * Upstream Go has not committed to support buildmode=shared long-term * Do not use in packaging, build static single binaries (the default) * Upstream Go go1.x binary releases do not include libstd.so * go1.x Suggests go1.x-libstd so not installed by default Recommends * go1.x-libstd does not Require: go1.x so can install standalone * Provides go-libstd unversioned package name * Fix build step -buildmode=shared std to omit -linkshared - Packaging improvements: * go1.x Suggests go1.x-doc so not installed by default Recommends * Use Group: Development/Languages/Go instead of Other - Improvements to go1.x packaging spec: * On Tumbleweed bootstrap with current default gcc13 and gccgo118 * On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap using go1.x package (%bcond_without gccgo). This is no longer needed on current SLE-12:Update and removing will consolidate the build configurations used. * Change source URLs to go.dev as per Go upstream * On x86_64 export GOAMD64=v1 as per the current baseline. At this time forgo GOAMD64=v3 option for x86_64_v3 support. * On x86_64 %define go_amd64=v1 as current instruction baseline - Update to version 1.18.10.1 cut from the go1.18-openssl-fips branch at the revision tagged go1.18.10-1-openssl-fips. * Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips * Merge go1.18.10 into dev.boringcrypto.go1.18 - go1.18.10 (released 2023-01-10) includes fixes to cgo, the compiler, the linker, and the crypto/x509, net/http, and syscall packages. Refs bsc#1193742 go1.18 release tracking * go#57705 misc/cgo: backport needed for dlltool fix * go#57426 crypto/x509: Verify on macOS does not return typed errors * go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its "old" argument. * go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices * go#57213 os: TestLstat failure on Linux Aarch64 * go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length * go#57057 cmd/go: remove test dependency on gopkg.in service * go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders * go#57044 cgo: malformed DWARF TagVariable entry * go#57028 cmd/cgo: Wrong types in compiler errors with clang 14 * go#56833 cmd/link/internal/ppc64: too-far trampoline is reused * go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target * go#56323 net/http: bad handling of HEAD requests with a body go1.18-openssl-1.18.10.1-150000.1.9.1.src.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.x86_64.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.s390x.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.ppc64le.rpm go1.18-openssl-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-doc-1.18.10.1-150000.1.9.1.aarch64.rpm go1.18-openssl-race-1.18.10.1-150000.1.9.1.aarch64.rpm