Recommended update for wicked
Announcement ID: | SUSE-RU-2016:3192-1 |
---|---|
Rating: | moderate |
References: | |
Affected Products: |
|
An update that has 19 fixes can now be installed.
Description:
This update provides Wicked 0.6.39, which brings the following fixes and enhancements:
- dhcp: Support to define and request custom options, documented in wicked-config(5) and ifcfg-dhcp(5) manual pages. (bsc#988954)
- dhcp6: Fix refresh on newprefix workaround. (bsc#972471)
- dhcp4: Do not fail in capture on link type change. (bsc#975466)
- dhcp4: Ignore invalid options, do not discard complete message.
- dhcp4: Log and add sender (server or relay) ethernet hw-address to the lease.
- ifdown: Show reasons to skip an action. (bsc#997027)
- ifconfig: Fix to consider address scope in dbus model. (bsc#988794)
- bonding: Set the primary slave in the master at enslave of the primary when it were not yet ready while setting up bond. (bsc#998413)
- addrconf: Rewrite to run lease updates in background jobs and use netconfig 0.84 batch support if available. (bsc#989741)
- auto6: Do not apply rdnss/dnssl if autoconf=0. (bsc#984088)
- dhcp4: Initial support to request custom options. (bsc#916948, bsc#988954)
- ovs: Use generic ovs type until we can query ovs. (bsc#982231)
- dhcp4: Send hostname in discover. (bsc#985894)
- address: Apply SUSE ifcfg IP_OPTIONS. (bsc#984088)
- ifreload: Make output more informative. (bsc#982952)
- rules: Do not fail when kernel support is missed. (bsc#981887)
- nanny: Re-apply policies on device renames. (bsc#973355)
- auto6: Apply rdnss/dnssl and wait for autoconf. (bsc#902897, bsc#916613)
- spec: Removed ppp service template macro calls. (fate#317976)
- ppp: Initial implementation of PPPoE support (fate#317976, bsc#865573, bsc#913861)
- route: Initial routing policy rules support. (fate#312217)
- tunnel: Add device binding support. (fate#317977)
- dhcp6: Refresh ipv6 link on each prefix event to fix workaround for missed NEWLINK event on changes caused by RA. (bsc#972471)
- macvlan: Fix enum values for BRIDGE and PASSTHRU modes. (bsc#974231)
For a comprehensive list of changes please refer to the package's change log.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP1
zypper in -t patch SUSE-SLE-BSK-12-SP1-2016-1850=1
-
SUSE Linux Enterprise Desktop 12 SP1
zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1850=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1850=1
-
SUSE Linux Enterprise Server 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1850=1
Package List:
-
SUSE Linux Enterprise Software Bootstrap Kit 12 12-SP1 (ppc64le s390x x86_64)
- wicked-debugsource-0.6.39-28.3.1
- libwicked-0-6-debuginfo-0.6.39-28.3.1
- wicked-debuginfo-0.6.39-28.3.1
- libwicked-0-6-0.6.39-28.3.1
-
SUSE Linux Enterprise Desktop 12 SP1 (x86_64)
- wicked-service-0.6.39-28.3.1
- libwicked-0-6-debuginfo-0.6.39-28.3.1
- wicked-debuginfo-0.6.39-28.3.1
- wicked-0.6.39-28.3.1
- libwicked-0-6-0.6.39-28.3.1
- wicked-debugsource-0.6.39-28.3.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (ppc64le x86_64)
- wicked-service-0.6.39-28.3.1
- libwicked-0-6-debuginfo-0.6.39-28.3.1
- wicked-debuginfo-0.6.39-28.3.1
- wicked-0.6.39-28.3.1
- libwicked-0-6-0.6.39-28.3.1
- wicked-debugsource-0.6.39-28.3.1
-
SUSE Linux Enterprise Server 12 SP1 (ppc64le s390x x86_64)
- wicked-service-0.6.39-28.3.1
- libwicked-0-6-debuginfo-0.6.39-28.3.1
- wicked-debuginfo-0.6.39-28.3.1
- wicked-0.6.39-28.3.1
- libwicked-0-6-0.6.39-28.3.1
- wicked-debugsource-0.6.39-28.3.1
References:
- https://bugzilla.suse.com/show_bug.cgi?id=865573
- https://bugzilla.suse.com/show_bug.cgi?id=902897
- https://bugzilla.suse.com/show_bug.cgi?id=913861
- https://bugzilla.suse.com/show_bug.cgi?id=916613
- https://bugzilla.suse.com/show_bug.cgi?id=916948
- https://bugzilla.suse.com/show_bug.cgi?id=972471
- https://bugzilla.suse.com/show_bug.cgi?id=973355
- https://bugzilla.suse.com/show_bug.cgi?id=974231
- https://bugzilla.suse.com/show_bug.cgi?id=975466
- https://bugzilla.suse.com/show_bug.cgi?id=981887
- https://bugzilla.suse.com/show_bug.cgi?id=982231
- https://bugzilla.suse.com/show_bug.cgi?id=982952
- https://bugzilla.suse.com/show_bug.cgi?id=984088
- https://bugzilla.suse.com/show_bug.cgi?id=985894
- https://bugzilla.suse.com/show_bug.cgi?id=988794
- https://bugzilla.suse.com/show_bug.cgi?id=988954
- https://bugzilla.suse.com/show_bug.cgi?id=989741
- https://bugzilla.suse.com/show_bug.cgi?id=997027
- https://bugzilla.suse.com/show_bug.cgi?id=998413