Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report
Announcement ID: | SUSE-RU-2023:4128-1 |
---|---|
Rating: | moderate |
References: | |
Affected Products: |
|
An update that has 15 fixes can now be installed.
Description:
This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report fixes the following issues:
sca-patterns-base was updated to version 1.5.2:
- Fixed scatool email failure with python3 (bsc#1192315)
- Allow batch mode that does not have progress bar issue#13 (pr#14)
- Added quiet and debug modes issue#11
sca-patterns-sle11 was updated to version 1.5.2
- Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
-
Changes to python/SUSE.py version 1.0.1
-
Changed name from getScInfo to getSCInfo
- Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
- Updated SLES version constants
Changes to version 1.5.1
- Fixed UnicodeDecodeError when reading files (bsc#1204723)
Changes in version 1.5.5
-
New patterns (2) (bsc#1214837):
-
sle15sp4/kabi-000021148.py: Pattern for TID000021148
-
sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151
-
New security announcement patterns as of Aug 2023 (140).
- New security announcement patterns as of May 2023 (881).
Changes in version 1.5.3
-
New regular patterns (3)
-
sle15sp2/freeused-000020894.py: Pattern for TID000020894
- sle15sp3/freeused-000020894.py: Pattern for TID000020894
- sle15sp4/freeused-000020894.py: Pattern for TID000020894
Changes in version 1.5.3
- Updated category in btrfsmaster-000018779.py (bsc#1188138)
- sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
- sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
-
New regular patterns (7)
-
sle15all/vimerr-000020735.py: Pattern for TID000020735
- sle15all/nmiconfig-000020754.py: Pattern for TID000020754
- sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
- sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
- sle15sp3/sssdad-000020793.py: Pattern for TID000020793
- sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
- sle15sp4/sssdad-000020793.py: Pattern for TID000020793
- New security announcement patterns (1426)
Additional patterns in version 1.5.2
- sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
- sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)
Changes in version 1.5.2
- Check setup-sca php version mismatch (bsc#1201011)
- SCA schema pattern check (tid#000020689)
- kernel crashes at nfs4_get_valid_delegation (tid#000020688)
Changes in version 1.5.1
- IRQ vectory affinity issue
- TID000020653 NFS mount attempt with vers=n returns invalid argument or incorrect mount option
Changes in version 1.5.5
- New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
- New security announcement patterns as of May 2023 (543).
Changes in version 1.5.3
- Updated category in btrfsmaster-000018779.py (bsc#1188138)
- Fixed invalid link in lvm-00003.pl (bsc#1186148)
- Removed invalid pattern dst-00001.pl (bsc#1188137)
- Removed or fixed patterns with no valid solution links (bsc#1204772)
- New regular patterns (1)
- sle12all/nmiconfig-000020754.py: Pattern for TID000020754
- New security announcement patterns (831)
Additional patterns in version 1.5.2
- sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
- sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)
Changes in version 1.5.2
- SCA schema pattern check
Changes in version 1.5.3
- New security announcement patterns as of Aug 2023 (12) (bsc#1214837)
Changes in version 1.5.2
- New security announcement patterns (14)
Changes in version 1.5.2
- Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.3
zypper in -t patch SUSE-2023-4128=1
-
openSUSE Leap 15.4
zypper in -t patch SUSE-2023-4128=1 openSUSE-SLE-15.4-2023-4128=1
-
openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-4128=1
-
Server Applications Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128=1
-
Server Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128=1
-
SUSE Manager Proxy 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128=1
-
SUSE Manager Retail Branch Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-4128=1
-
SUSE Manager Server 4.2
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128=1
Package List:
-
openSUSE Leap 15.3 (noarch)
- sca-patterns-sle11-1.5.3-150300.18.6.1
- sca-patterns-sle15-1.5.5-150300.14.6.1
- sca-patterns-base-1.5.2-150300.10.6.1
- sca-patterns-sle12-1.5.5-150300.3.6.1
- sca-server-report-1.5.2-150300.11.6.1
-
openSUSE Leap 15.4 (noarch)
- sca-patterns-sle12-1.5.5-150400.3.3.1
- sca-patterns-sle15-1.5.5-150400.3.3.1
- sca-server-report-1.5.2-150400.3.3.1
- sca-patterns-base-1.5.2-150400.3.3.1
- sca-patterns-sle11-1.5.3-150400.3.3.1
-
openSUSE Leap 15.5 (noarch)
- sca-patterns-sle12-1.5.5-150400.3.3.1
- sca-patterns-sle15-1.5.5-150400.3.3.1
- sca-server-report-1.5.2-150400.3.3.1
- sca-patterns-base-1.5.2-150400.3.3.1
- sca-patterns-sle11-1.5.3-150400.3.3.1
-
Server Applications Module 15-SP4 (noarch)
- sca-patterns-sle12-1.5.5-150400.3.3.1
- sca-patterns-sle15-1.5.5-150400.3.3.1
- sca-server-report-1.5.2-150400.3.3.1
- sca-patterns-base-1.5.2-150400.3.3.1
- sca-patterns-sle11-1.5.3-150400.3.3.1
-
Server Applications Module 15-SP5 (noarch)
- sca-patterns-sle12-1.5.5-150400.3.3.1
- sca-patterns-sle15-1.5.5-150400.3.3.1
- sca-server-report-1.5.2-150400.3.3.1
- sca-patterns-base-1.5.2-150400.3.3.1
- sca-patterns-sle11-1.5.3-150400.3.3.1
-
SUSE Manager Proxy 4.2 (noarch)
- sca-patterns-sle11-1.5.3-150300.18.6.1
- sca-patterns-sle15-1.5.5-150300.14.6.1
- sca-patterns-base-1.5.2-150300.10.6.1
- sca-patterns-sle12-1.5.5-150300.3.6.1
- sca-server-report-1.5.2-150300.11.6.1
-
SUSE Manager Retail Branch Server 4.2 (noarch)
- sca-patterns-sle11-1.5.3-150300.18.6.1
- sca-patterns-sle15-1.5.5-150300.14.6.1
- sca-patterns-base-1.5.2-150300.10.6.1
- sca-patterns-sle12-1.5.5-150300.3.6.1
- sca-server-report-1.5.2-150300.11.6.1
-
SUSE Manager Server 4.2 (noarch)
- sca-patterns-sle11-1.5.3-150300.18.6.1
- sca-patterns-sle15-1.5.5-150300.14.6.1
- sca-patterns-base-1.5.2-150300.10.6.1
- sca-patterns-sle12-1.5.5-150300.3.6.1
- sca-server-report-1.5.2-150300.11.6.1
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1186148
- https://bugzilla.suse.com/show_bug.cgi?id=1188137
- https://bugzilla.suse.com/show_bug.cgi?id=1188138
- https://bugzilla.suse.com/show_bug.cgi?id=1192315
- https://bugzilla.suse.com/show_bug.cgi?id=1201011
- https://bugzilla.suse.com/show_bug.cgi?id=1201522
- https://bugzilla.suse.com/show_bug.cgi?id=1201523
- https://bugzilla.suse.com/show_bug.cgi?id=1204721
- https://bugzilla.suse.com/show_bug.cgi?id=1204723
- https://bugzilla.suse.com/show_bug.cgi?id=1204724
- https://bugzilla.suse.com/show_bug.cgi?id=1204772
- https://bugzilla.suse.com/show_bug.cgi?id=1204776
- https://bugzilla.suse.com/show_bug.cgi?id=1205826
- https://bugzilla.suse.com/show_bug.cgi?id=1210908
- https://bugzilla.suse.com/show_bug.cgi?id=1214837