Recommended update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report

Announcement ID: SUSE-RU-2023:4128-1
Rating: moderate
References:
Affected Products:
  • openSUSE Leap 15.3
  • openSUSE Leap 15.4
  • openSUSE Leap 15.5
  • Server Applications Module 15-SP4
  • Server Applications Module 15-SP5
  • SUSE Linux Enterprise High Performance Computing 15 SP4
  • SUSE Linux Enterprise High Performance Computing 15 SP5
  • SUSE Linux Enterprise Real Time 15 SP4
  • SUSE Linux Enterprise Real Time 15 SP5
  • SUSE Linux Enterprise Server 15 SP4
  • SUSE Linux Enterprise Server 15 SP5
  • SUSE Linux Enterprise Server for SAP Applications 15 SP4
  • SUSE Linux Enterprise Server for SAP Applications 15 SP5
  • SUSE Manager Proxy 4.2
  • SUSE Manager Proxy 4.3
  • SUSE Manager Retail Branch Server 4.2
  • SUSE Manager Retail Branch Server 4.3
  • SUSE Manager Server 4.2
  • SUSE Manager Server 4.3

An update that has 15 fixes can now be installed.

Description:

This update for sca-patterns-base, sca-patterns-sle11, sca-patterns-sle12, sca-patterns-sle15, sca-server-report fixes the following issues:

sca-patterns-base was updated to version 1.5.2:

  • Fixed scatool email failure with python3 (bsc#1192315)
  • Allow batch mode that does not have progress bar issue#13 (pr#14)
  • Added quiet and debug modes issue#11

sca-patterns-sle11 was updated to version 1.5.2

  • Fixed SUSE.getRpmInfo to find the correct rpm.txt section (bsc#1210908)
  • Changes to python/SUSE.py version 1.0.1

  • Changed name from getScInfo to getSCInfo

  • Fixed getSCInfo error on basic-environment.txt (bsc#1205826)
  • Updated SLES version constants

Changes to version 1.5.1

  • Fixed UnicodeDecodeError when reading files (bsc#1204723)

Changes in version 1.5.5

  • New patterns (2) (bsc#1214837):

  • sle15sp4/kabi-000021148.py: Pattern for TID000021148

  • sle15sp5/vmwgfx-000021151.py: Pattern for TID000021151

  • New security announcement patterns as of Aug 2023 (140).

  • New security announcement patterns as of May 2023 (881).

Changes in version 1.5.3

  • New regular patterns (3)

  • sle15sp2/freeused-000020894.py: Pattern for TID000020894

  • sle15sp3/freeused-000020894.py: Pattern for TID000020894
  • sle15sp4/freeused-000020894.py: Pattern for TID000020894

Changes in version 1.5.3

  • Updated category in btrfsmaster-000018779.py (bsc#1188138)
  • sle15all/bhc-kernelload-00001.py fixed divison by zero (bsc#1204721)
  • sle15all/lvmsnapshot-000019858.py KeyError (bsc#1204724)
  • New regular patterns (7)

  • sle15all/vimerr-000020735.py: Pattern for TID000020735

  • sle15all/nmiconfig-000020754.py: Pattern for TID000020754
  • sle15sp2/kmpdracut-000020799.py: Pattern for TID000020799
  • sle15sp3/kmpdracut-000020799.py: Pattern for TID000020799
  • sle15sp3/sssdad-000020793.py: Pattern for TID000020793
  • sle15sp4/drbdresdir-000020749.py: Pattern for TID000020749
  • sle15sp4/sssdad-000020793.py: Pattern for TID000020793
  • New security announcement patterns (1426)

Additional patterns in version 1.5.2

  • sle15all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
  • sle15all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)

Changes in version 1.5.2

  • Check setup-sca php version mismatch (bsc#1201011)
  • SCA schema pattern check (tid#000020689)
  • kernel crashes at nfs4_get_valid_delegation (tid#000020688)

Changes in version 1.5.1

  • IRQ vectory affinity issue
  • TID000020653 NFS mount attempt with vers=n returns invalid argument or incorrect mount option

Changes in version 1.5.5

  • New security announcement patterns as of Aug 2023 (159) (bsc#1214837):
  • New security announcement patterns as of May 2023 (543).

Changes in version 1.5.3

  • Updated category in btrfsmaster-000018779.py (bsc#1188138)
  • Fixed invalid link in lvm-00003.pl (bsc#1186148)
  • Removed invalid pattern dst-00001.pl (bsc#1188137)
  • Removed or fixed patterns with no valid solution links (bsc#1204772)
  • New regular patterns (1)
  • sle12all/nmiconfig-000020754.py: Pattern for TID000020754
  • New security announcement patterns (831)

Additional patterns in version 1.5.2

  • sle12all/azurenetaccel-000020694.py: Azure Accelerated Networking fails (bsc#1201522)
  • sle12all/traceprintk-000020680.py: trace_printk() Messages in System Logs (bsc#1201523)

Changes in version 1.5.2

  • SCA schema pattern check

Changes in version 1.5.3

  • New security announcement patterns as of Aug 2023 (12) (bsc#1214837)

Changes in version 1.5.2

  • New security announcement patterns (14)

Changes in version 1.5.2

  • Fixed sca-patterns-sle11 invalid solution links (bsc#1204776)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.3
    zypper in -t patch SUSE-2023-4128=1
  • openSUSE Leap 15.4
    zypper in -t patch SUSE-2023-4128=1 openSUSE-SLE-15.4-2023-4128=1
  • openSUSE Leap 15.5
    zypper in -t patch openSUSE-SLE-15.5-2023-4128=1
  • Server Applications Module 15-SP4
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4128=1
  • Server Applications Module 15-SP5
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4128=1
  • SUSE Manager Proxy 4.2
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4128=1
  • SUSE Manager Retail Branch Server 4.2
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.2-2023-4128=1
  • SUSE Manager Server 4.2
    zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4128=1

Package List:

  • openSUSE Leap 15.3 (noarch)
    • sca-patterns-sle11-1.5.3-150300.18.6.1
    • sca-patterns-sle15-1.5.5-150300.14.6.1
    • sca-patterns-base-1.5.2-150300.10.6.1
    • sca-patterns-sle12-1.5.5-150300.3.6.1
    • sca-server-report-1.5.2-150300.11.6.1
  • openSUSE Leap 15.4 (noarch)
    • sca-patterns-sle12-1.5.5-150400.3.3.1
    • sca-patterns-sle15-1.5.5-150400.3.3.1
    • sca-server-report-1.5.2-150400.3.3.1
    • sca-patterns-base-1.5.2-150400.3.3.1
    • sca-patterns-sle11-1.5.3-150400.3.3.1
  • openSUSE Leap 15.5 (noarch)
    • sca-patterns-sle12-1.5.5-150400.3.3.1
    • sca-patterns-sle15-1.5.5-150400.3.3.1
    • sca-server-report-1.5.2-150400.3.3.1
    • sca-patterns-base-1.5.2-150400.3.3.1
    • sca-patterns-sle11-1.5.3-150400.3.3.1
  • Server Applications Module 15-SP4 (noarch)
    • sca-patterns-sle12-1.5.5-150400.3.3.1
    • sca-patterns-sle15-1.5.5-150400.3.3.1
    • sca-server-report-1.5.2-150400.3.3.1
    • sca-patterns-base-1.5.2-150400.3.3.1
    • sca-patterns-sle11-1.5.3-150400.3.3.1
  • Server Applications Module 15-SP5 (noarch)
    • sca-patterns-sle12-1.5.5-150400.3.3.1
    • sca-patterns-sle15-1.5.5-150400.3.3.1
    • sca-server-report-1.5.2-150400.3.3.1
    • sca-patterns-base-1.5.2-150400.3.3.1
    • sca-patterns-sle11-1.5.3-150400.3.3.1
  • SUSE Manager Proxy 4.2 (noarch)
    • sca-patterns-sle11-1.5.3-150300.18.6.1
    • sca-patterns-sle15-1.5.5-150300.14.6.1
    • sca-patterns-base-1.5.2-150300.10.6.1
    • sca-patterns-sle12-1.5.5-150300.3.6.1
    • sca-server-report-1.5.2-150300.11.6.1
  • SUSE Manager Retail Branch Server 4.2 (noarch)
    • sca-patterns-sle11-1.5.3-150300.18.6.1
    • sca-patterns-sle15-1.5.5-150300.14.6.1
    • sca-patterns-base-1.5.2-150300.10.6.1
    • sca-patterns-sle12-1.5.5-150300.3.6.1
    • sca-server-report-1.5.2-150300.11.6.1
  • SUSE Manager Server 4.2 (noarch)
    • sca-patterns-sle11-1.5.3-150300.18.6.1
    • sca-patterns-sle15-1.5.5-150300.14.6.1
    • sca-patterns-base-1.5.2-150300.10.6.1
    • sca-patterns-sle12-1.5.5-150300.3.6.1
    • sca-server-report-1.5.2-150300.11.6.1

References: