openSUSE Security Announce
Threads by month
- ----- 2025 -----
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
March 2020
- 1 participants
- 55 discussions

[security-announce] openSUSE-SU-2020:0409-1: moderate: Security update for python-mysql-connector-python
by opensuse-security@opensuse.org 29 Mar '20
by opensuse-security@opensuse.org 29 Mar '20
29 Mar '20
openSUSE Security Update: Security update for python-mysql-connector-python
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0409-1
Rating: moderate
References: #1122204
Cross-References: CVE-2019-2435
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-mysql-connector-python fixes the following issues:
python-mysql-connector-python was updated to 8.0.19 (boo#1122204 -
CVE-2019-2435):
- WL#13531: Remove xplugin namespace
- WL#13372: DNS SRV support
- WL#12738: Specify TLS ciphers to be used by a client or session
- BUG#30270760: Fix reserved filed should have a length of 22
- BUG#29417117: Close file in handle load data infile
- WL#13330: Single C/Python (Win) MSI installer
- WL#13335: Connectors should handle expired password sandbox without SET
operations
- WL#13194: Add support for Python 3.8
- BUG#29909157: Table scans of floats causes memory leak with the C
extension
- BUG#25349794: Add read_default_file alias for option_files in connect()
- WL#13155: Support new utf8mb4 bin collation
- WL#12737: Add overlaps and not_overlaps as operator
- WL#12735: Add README.rst and CONTRIBUTING.rst files
- WL#12227: Indexing array fields
- WL#12085: Support cursor prepared statements with C extension
- BUG#29855733: Fix error during connection using charset and collation
combination
- BUG#29833590: Calling execute() should fetch active results
- BUG#21072758: Support for connection attributes classic
- WL#12864: Upgrade of Protobuf version to 3.6.1
- WL#12863: Drop support for Django versions older than 1.11
- WL#12489: Support new session reset functionality
- WL#12488: Support for session-connect-attributes
- WL#12297: Expose metadata about the source and binaries
- WL#12225: Prepared statement support
- BUG#29324966: Add missing username connection argument for driver
compatibility
- BUG#29278489: Fix wrong user and group for Solaris packages
- BUG#29001628: Fix access by column label in Table.select()
- BUG#28479054: Fix Python interpreter crash due to memory corruption
- BUG#27897881: Empty LONG BLOB throws an IndexError
- BUG#29260128: Disable load data local infile by default
- WL#12607: Handling of Default Schema
- WL#12493: Standardize count method
- WL#12492: Be prepared for initial notice on connection
- BUG#28646344: Remove expression parsing on values
- BUG#28280321: Fix segmentation fault when using unicode characters in
tables
- BUG#27794178: Using use_pure=False should raise an error if cext is not
available
- BUG#27434751: Add a TLS/SSL option to verify server name
- WL#12239: Add support for Python 3.7
- WL#12226: Implement connect timeout
- WL#11897: Implement connection pooling for xprotocol
- BUG#28278352: C extension mysqlx Collection.add() leaks memory in
sequential calls
- BUG#28037275: Missing bind parameters causes segfault or unclear error
message
- BUG#27528819: Support special characters in the user and password using
URI
- WL#11951: Consolidate discrepancies between pure and c extension
- WL#11932: Remove Fabric support
- WL#11898: Core API v1 alignment
- BUG#28188883: Use utf8mb4 as the default character set
- BUG#28133321: Fix incorrect columns names representing aggregate
functions
- BUG#27962293: Fix Django 2.0 and MySQL 8.0 compatibility issues
- BUG#27567999: Fix wrong docstring in ModifyStatement.patch()
- BUG#27277937: Fix confusing error message when using an unsupported
collation
- BUG#26834200: Deprecate Row.get_string() method
- BUG#26660624: Fix missing install option in documentation
- WL#11668: Add SHA256_MEMORY authentication mechanism
- WL#11614: Enable C extension by default
- WL#11448: New document _id generation support
- WL#11282: Support new locking modes NOWAIT and SKIP LOCKED
- BUG#27639119: Use a list of dictionaries to store warnings
- BUG#27634885: Update error codes for MySQL 8.0.11
- BUG#27589450: Remove upsert functionality from WriteStatement class
- BUG#27528842: Fix internal queries open for SQL injection
- BUG#27364914: Cursor prepared statements do not convert strings
- BUG#24953913: Fix failing unittests
- BUG#24948205: Results from JSON_TYPE() are returned as bytearray
- BUG#24948186: JSON type results are bytearray instead of corresponding
python type
- WL#11372: Remove configuration API
- WL#11303: Remove CreateTable and CreateView
- WL#11281: Transaction savepoints
- WL#11278: Collection.create_index
- WL#11149: Create Pylint test for mysqlx
- WL#11142: Modify/MergePatch
- WL#11079: Add support for Python 3.6
- WL#11073: Add caching_sha2_password authentication plugin
- WL#10975: Add Single document operations
- WL#10974: Add Row locking methods to find and select operations
- WL#10973: Allow JSON types as operands for IN operator
- WL#10899: Add support for pure Python implementation of Protobuf
- WL#10771: Add SHA256 authentication
- WL#10053: Configuration handling interface
- WL#10772: Cleanup Drop APIs
- WL#10770: Ensure all Session connections are secure by default
- WL#10754: Forbid modify() and remove() with no condition
- WL#10659: Support utf8mb4 as default charset
- WL#10658: Remove concept of NodeSession
- WL#10657: Move version number to 8.0
- WL#10198: Add Protobuf C++ extension implementation
- WL#10004: Document UUID generation
- BUG#26175003: Fix Session.sql() when using unicode SQL statements with
Python 2.7
- BUG#26161838: Dropping an non-existing index should succeed silently
- BUG#26160876: Fix issue when using empty condition in
Collection.remove() and Table.delete()
- BUG#26029811: Improve error thrown when using an invalid parameter in
bind()
- BUG#25991574: Fix Collection.remove() and Table.delete() missing filters
- WL#10452: Add Protobuf C++ extension for Linux variants and Mac OSX
- WL#10081: DevAPI: IPv6 support
- BUG#25614860: Fix defined_as method in the view creation
- BUG#25519251: SelectStatement does not implement order_by() method
- BUG#25436568: Update available operators for XPlugin
- BUG#24954006: Add missing items in CHANGES.txt
- BUG#24578507: Fix import error using Python 2.6
- BUG#23636962: Fix improper error message when creating a Session
- BUG#23568207: Fix default aliases for projection fields
- BUG#23567724: Fix operator names
- DevAPI: Schema.create_table
- DevAPI: Flexible Parameter Lists
- DevAPI: New transports: Unix domain socket
- DevAPI: Core TLS/SSL options for the mysqlx URI scheme
- DevAPI: View DDL with support for partitioning in a cluster / sharding
- BUG#24520850: Fix unexpected behavior when using an empty collection name
- Add support for Protocol Buffers 3
- Add View support (without DDL)
- Implement get_default_schema() method in BaseSchema
- DevAPI: Per ReplicaSet SQL execution
- DevAPI: XSession accepts a list of routers
- DevAPI: Define action on adding empty list of documents
- BUG#23729357: Fix fetching BIT datatype
- BUG#23583381: Add who_am_i and am_i_real methods to DatabaseObject
- BUG#23568257: Add fetch_one method to mysqlx.result
- BUG#23550743: Add close method to XSession and NodeSession
- BUG#23550057: Add support for URI as connection data
- Provide initial implementation of new DevAPI
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-409=1
Package List:
- openSUSE Leap 15.1 (noarch):
python2-mysql-connector-python-8.0.19-lp151.3.3.1
python3-mysql-connector-python-8.0.19-lp151.3.3.1
References:
https://www.suse.com/security/cve/CVE-2019-2435.html
https://bugzilla.suse.com/1122204
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0402-1: moderate: Security update for opera
by opensuse-security@opensuse.org 29 Mar '20
by opensuse-security@opensuse.org 29 Mar '20
29 Mar '20
openSUSE Security Update: Security update for opera
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0402-1
Rating: moderate
References:
Affected Products:
openSUSE Leap 15.1:NonFree
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update for opera fixes the following issues:
Update to version 67.0.3575.97
- DNA-84063 Open URL in new tab with ‘Go to web address’ in
search/copy popup and right mouse click context menu
- DNA-84780 Search in Search and Copy popup opens tab in wrong position
from popup window
- DNA-84786 Crash at Browser::PasteAndGo(std::__1::basic_string const&,
WindowOpenDisposition)
- DNA-84815 Crash at TabStripModel::GetIndexOfWebContents
(content::WebContents const*)
- DNA-84937 [Mac] Workspace switching is slow with a lot of tabs opened
- DNA-85159 Sidebar-setup not refreshed correctly after signing out from
sync
Update to version 67.0.3575.79
- CHR-7804 Update chromium on desktop-stable-80-3575 to 80.0.3987.132
- DNA-83766 Opera Ad Blocker extension state is not updated when changing
it
- DNA-83966 Enable kFeatureSuggestionScoringImproved on all the streams
- DNA-84159 Settings – list of workspaces in the settings isn’t
updated after reordering
- DNA-84396 Inline autocomplete not working when SD becomes the top-scored
suggestion
- DNA-84711 Wrong autocomplete address for https sites
- DNA-84741 No amazon partner extension displayed
- DNA-84743 Crash at ExtensionsToolbarContainer::UndoPopOut()
- DNA-84776 Bookmarks not fully displayed in Bookmarks Panel
- DNA-84817 Crash at Browser::IsSearchAndCopyPopupEnabled()
- DNA-84836 Broken video playback in some cases
- DNA-84837 Audio decoder broken although available on Windows 7
- DNA-84860 [Mac] Address field not highlighted on hover
- DNA-84889 [desktop-stable-80-3575] There’re no basic settings
- DNA-84910 Fix output type selection of SW H.264 decoder
- DNA-84938 Prepare stable build with Yx 05 edition
- DNA-84969 Address bar dropdown launches HTTP GETs for every autocomplete
Update to version 67.0.3575.53
- CHR-7792 Update chromium on desktop-stable-80-3575 to 80.0.3987.122
- DNA-84024 ‘Save all Tabs in Speed Dial Folder’ doesn’t work
on main context menu
- DNA-84056 Submenus are not scrollable
- DNA-84061 Expanded bookmark menu overlaps the whole toolbar
- DNA-84277 Whole text should be visible
- DNA-84412 Dragging tab to different place activates another tab
- DNA-84492 Disable any notifications for “default browser” from
sweetlabs builds
- DNA-84691 Crash when trying to open sidebar context menu
- Update to version 67.0.3575.31
- DNA-84077 Hide seek and timer controls in video pop-out for YouTube live
streams
- DNA-84639 Promote O67 to stable
- Complete Opera 67.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-67/
Update to version 66.0.3515.103
- DNA-83528 UnpackTest.CanUnpackTarXzFile test fails on OSX 10.15+
- DNA-83568 Add test driver perftests
- DNA-84335 [Linux] Widevine is not working due to changed path of
libwidevinecdm.so
- DNA-84439 Opera extensions update requests are sent to chrome instead of
opera servers
Update to version 66.0.3515.72
- DNA-79691 Unable to play video on Netflix right after Opera installation
- DNA-82102 Wrong cursor and X color of the search fields on
Bookmark/History sidebar panels
- DNA-82722 Google Translator blocks PDF viewer
- DNA-83407 Crash at static void `anonymous namespace”::PureCall()
- DNA-83530 Bad colors in Personal news when dark theme turned on
- DNA-83531 Dragging speed dial root folders in bookmarks sidebar makes
duplicates
- DNA-83542 Fix background tabs loading issues
- DNA-83806 Crash at opera::RichHintDisplayHandlerViews::
OnWidgetDestroying(views::Widget*)
- DNA-83882 Crash at base::Value::Clone()
- DNA-84007 Accessibility elements visible on pages after first navigation
on Mac
Update to version 66.0.3515.44
- CHR-7734 Update chromium on desktop-stable-79-3515 to 79.0.3945.130
- DNA-82635 [Mac] Fix crash when opening power save popup twice
- DNA-83587 Fix Crash at
opera::ThumbnailHelper::ThumbnailRequest::PopNextFrameToPaint()
- DNA-83698 Unregister extensions keybindings when sidebar is hidden
- DNA-83757 Stop making thumbnail after history onboarding will show
Update to version 66.0.3515.36
- CHR-7717 Update chromium on desktop-stable-79-3515 to 79.0.3945.117
- DNA-81359 Translate “Speed Dials” folder in bookmarks panel
- DNA-82627 Unify & streamline tooltip color processing across Opera.
- DNA-82800 Enable kFeatureTurnOnFeaturesDownloadedByInstallerOnUpdates on
all streams
- DNA-83190 Record SwitchToFullSite events on icon clicks.
- DNA-83496 Check if history-panel is enabled before showing
onboarding.
- DNA-83545 Fix a crash in adblocker rule update
- DNA-83583 [Mac] Bookmark popup too bright in dark mode
- DNA-83608 Set “plat” metadata in crash reports from Linux.
Update to version 66.0.3515.27
- DNA-82683 Bookmarks menu is not readable in dark mode after hovering
- DNA-83139 [macOS] screenshot is resized
- DNA-83204 [Mac] Anchor onboarding widget to history icon on sidebar
- DNA-83205 [Mac] Popup looks bad with mode change
- DNA-83351 Enable feature on stable/beta
- DNA-83366 [Mac] Onboarding popup doesn’t follow the browser window
- DNA-83402 Promote O66 to stable
- Complete Opera 66.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-66/
Update to version 65.0.3467.69
- DNA-82647 Tab icons mixed after Tab closing
- DNA-82919 Update wrapper to skip package types when creating repo
- DNA-82967 [Mac] Opera crashes on dragging the SSL icon
on the URL Bar
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:NonFree:
zypper in -t patch openSUSE-2020-402=1
Package List:
- openSUSE Leap 15.1:NonFree (x86_64):
opera-67.0.3575.97-lp151.2.12.1
References:
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0400-1: moderate: Security update for cloud-init
by opensuse-security@opensuse.org 29 Mar '20
by opensuse-security@opensuse.org 29 Mar '20
29 Mar '20
openSUSE Security Update: Security update for cloud-init
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0400-1
Rating: moderate
References: #1162936 #1162937 #1163178
Cross-References: CVE-2020-8631 CVE-2020-8632
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for cloud-init fixes the following security issues:
- CVE-2020-8631: Replaced the theoretically predictable deterministic RNG
with the system RNG (bsc#1162937).
- CVE-2020-8632: Increased the default random password length from 9 to 20
(bsc#1162936).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-400=1
Package List:
- openSUSE Leap 15.1 (x86_64):
cloud-init-19.4-lp151.2.15.1
cloud-init-config-suse-19.4-lp151.2.15.1
cloud-init-doc-19.4-lp151.2.15.1
References:
https://www.suse.com/security/cve/CVE-2020-8631.html
https://www.suse.com/security/cve/CVE-2020-8632.html
https://bugzilla.suse.com/1162936
https://bugzilla.suse.com/1162937
https://bugzilla.suse.com/1163178
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0395-1: important: Recommended update for ruby2.5
by opensuse-security@opensuse.org 28 Mar '20
by opensuse-security@opensuse.org 28 Mar '20
28 Mar '20
openSUSE Security Update: Recommended update for ruby2.5
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0395-1
Rating: important
References: #1140844 #1152990 #1152992 #1152994 #1152995
#1162396 #1164804
Cross-References: CVE-2012-6708 CVE-2015-9251 CVE-2019-15845
CVE-2019-16201 CVE-2019-16254 CVE-2019-16255
CVE-2020-8130
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for ruby2.5 toversion 2.5.7 fixes the following issues:
ruby 2.5 was updated to version 2.5.7
- CVE-2020-8130: Fixed a command injection in intree copy of rake
(bsc#1164804).
- CVE-2019-16255: Fixed a code injection vulnerability of Shell#[] and
Shell#test (bsc#1152990).
- CVE-2019-16254: Fixed am HTTP response splitting in WEBrick
(bsc#1152992).
- CVE-2019-15845: Fixed a null injection vulnerability of File.fnmatch and
File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service of WEBrick
Digest access authentication (bsc#1152995).
- CVE-2012-6708: Fixed an XSS in JQuery
- CVE-2015-9251: Fixed an XSS in JQuery
- Fixed unit tests (bsc#1140844)
- Removed some unneeded test files (bsc#1162396).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-395=1
Package List:
- openSUSE Leap 15.1 (noarch):
ruby2.5-doc-ri-2.5.7-lp151.4.6.1
- openSUSE Leap 15.1 (x86_64):
libruby2_5-2_5-2.5.7-lp151.4.6.1
libruby2_5-2_5-debuginfo-2.5.7-lp151.4.6.1
ruby2.5-2.5.7-lp151.4.6.1
ruby2.5-debuginfo-2.5.7-lp151.4.6.1
ruby2.5-debugsource-2.5.7-lp151.4.6.1
ruby2.5-devel-2.5.7-lp151.4.6.1
ruby2.5-devel-extra-2.5.7-lp151.4.6.1
ruby2.5-doc-2.5.7-lp151.4.6.1
ruby2.5-stdlib-2.5.7-lp151.4.6.1
ruby2.5-stdlib-debuginfo-2.5.7-lp151.4.6.1
References:
https://www.suse.com/security/cve/CVE-2012-6708.html
https://www.suse.com/security/cve/CVE-2015-9251.html
https://www.suse.com/security/cve/CVE-2019-15845.html
https://www.suse.com/security/cve/CVE-2019-16201.html
https://www.suse.com/security/cve/CVE-2019-16254.html
https://www.suse.com/security/cve/CVE-2019-16255.html
https://www.suse.com/security/cve/CVE-2020-8130.html
https://bugzilla.suse.com/1140844
https://bugzilla.suse.com/1152990
https://bugzilla.suse.com/1152992
https://bugzilla.suse.com/1152994
https://bugzilla.suse.com/1152995
https://bugzilla.suse.com/1162396
https://bugzilla.suse.com/1164804
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0398-1: moderate: Security update for cni, cni-plugins, conmon, fuse-overlayfs, podman
by opensuse-security@opensuse.org 28 Mar '20
by opensuse-security@opensuse.org 28 Mar '20
28 Mar '20
openSUSE Security Update: Security update for cni, cni-plugins, conmon, fuse-overlayfs, podman
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0398-1
Rating: moderate
References: #1155217 #1160460 #1164390
Cross-References: CVE-2019-18466
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update for cni, cni-plugins, conmon, fuse-overlayfs, podman fixes the
following issues:
podman was updated to 1.8.0:
- CVE-2019-18466: Fixed a bug where podman cp would improperly copy files
on the host when copying a symlink in the container that included a glob
operator (#3829 bsc#1155217)
- The name of the cni-bridge in the default config changed from "cni0" to
"podman-cni0" with podman-1.6.0. Add a %trigger to rename the bridge in
the system to the new default if it exists. The trigger is only excuted
when updating podman-cni-config from something older than 1.6.0. This is
mainly needed for SLE where we're updating from 1.4.4 to 1.8.0
(bsc#1160460).
Update podman to v1.8.0 (bsc#1160460):
* Features
- The podman system service command has been added, providing a preview
of Podman's new Docker-compatible API. This API is still very new, and
not yet ready for production use, but is available for early testing
- Rootless Podman now uses Rootlesskit for port forwarding, which should
greatly improve performance and capabilities
- The podman untag command has been added to remove tags from images
without deleting them
- The podman inspect command on images now displays previous names they
used
- The podman generate systemd command now supports a --new
option to generate service files that create and run new containers
instead of managing existing containers
- Support for --log-opt tag= to set logging tags has been added to the
journald log driver
- Added support for using Seccomp profiles embedded in images for podman
run and podman create via the new --seccomp-policy CLI flag
- The podman play kube command now honors pull policy
* Bugfixes
- Fixed a bug where the podman cp command would not copy the contents of
directories when paths ending in /. were given
- Fixed a bug where the podman play kube command did not properly locate
Seccomp profiles specified relative to localhost
- Fixed a bug where the podman info command for remote Podman did not
show registry information
- Fixed a bug where the podman exec command did not support having input
piped into it
- Fixed a bug where the podman cp command with rootless Podman
on CGroups v2 systems did not properly determine if the container
could be paused while copying
- Fixed a bug where the podman container prune --force command could
possible remove running containers if they were started while the
command was running
- Fixed a bug where Podman, when run as root, would not properly
configure slirp4netns networking when requested
- Fixed a bug where podman run --userns=keep-id did not work when the
user had a UID over 65535
- Fixed a bug where rootless podman run and podman create with the
--userns=keep-id option could change permissions on /run/user/$UID and
break KDE
- Fixed a bug where rootless Podman could not be run in a systemd
service on systems using CGroups v2
- Fixed a bug where podman inspect would show CPUShares as 0, instead of
the default (1024), when it was not explicitly set
- Fixed a bug where podman-remote push would segfault
- Fixed a bug where image healthchecks were not shown in the
output of podman inspect
- Fixed a bug where named volumes created with containers from pre-1.6.3
releases of Podman would be autoremoved with their containers if the
--rm flag was given, even if they were given names
- Fixed a bug where podman history was not computing image sizes
correctly
- Fixed a bug where Podman would not error on invalid values to the
--sort flag to podman images
- Fixed a bug where providing a name for the image made by podman commit
was mandatory, not optional as it should be
- Fixed a bug where the remote Podman client would append an extra " to
%PATH
- Fixed a bug where the podman build command would sometimes ignore the
-f option and build the wrong Containerfile
- Fixed a bug where the podman ps --filter command would only filter
running containers, instead of all containers, if
--all was not passed
- Fixed a bug where the podman load command on compressed images would
leave an extra copy on disk
- Fixed a bug where the podman restart command would not properly clean
up the network, causing it to function differently from podman stop;
podman start
- Fixed a bug where setting the --memory-swap flag to podman create and
podman run to -1 (to indicate unlimited) was not supported
* Misc
- Initial work on version 2 of the Podman remote API has been merged,
but is still in an alpha state and not ready for use. Read more here
- Many formatting corrections have been made to the manpages
- The changes to address (#5009) may cause anonymous volumes created by
Podman versions 1.6.3 to 1.7.0 to not be removed when their container
is removed
- Updated vendored Buildah to v1.13.1
- Updated vendored containers/storage to v1.15.8
- Updated vendored containers/image to v5.2.0
- Add apparmor-abstractions as required runtime dependency to have
`tunables/global` available.
- fixed the --force flag for the "container prune" command.
(https://github.com/containers/libpod/issues/4844)
Update podman to v1.7.0
* Features
- Added support for setting a static MAC address for containers
- Added support for creating macvlan networks with podman network
create, allowing Podman containers to be attached directly to networks
the host is connected to
- The podman image prune and podman container prune commands now support
the --filter flag to filter what will be pruned, and now prompts for
confirmation when run without --force (#4410 and #4411)
- Podman now creates CGroup namespaces by default on systems using
CGroups v2 (#4363)
- Added the podman system reset command to remove all Podman files and
perform a factory reset of the Podman installation
- Added the --history flag to podman images to display previous names
used by images (#4566)
- Added the --ignore flag to podman rm and podman stop to not error when
requested containers no longer exist
- Added the --cidfile flag to podman rm and podman stop to read the IDs
of containers to be removed or stopped from a file
- The podman play kube command now honors Seccomp annotations (#3111)
- The podman play kube command now honors RunAsUser, RunAsGroup, and
selinuxOptions
- The output format of the podman version command has been changed to
better match docker version when using the
--format flag
- Rootless Podman will no longer initialize containers/storage twice,
removing a potential deadlock preventing Podman commands from running
while an image was being pulled (#4591)
- Added tmpcopyup and notmpcopyup options to the --tmpfs and
--mount type=tmpfs flags to podman create and podman run to control
whether the content of directories are copied into tmpfs filesystems
mounted over them
- Added support for disabling detaching from containers by setting empty
detach keys via --detach-keys=""
- The podman build command now supports the --pull and
--pull-never flags to control when images are pulled during a build
- The podman ps -p command now shows the name of the pod as well as its
ID (#4703)
- The podman inspect command on containers will now display the command
used to create the container
- The podman info command now displays information on registry mirrors
(#4553)
* Bugfixes
- Fixed a bug where Podman would use an incorrect runtime directory as
root, causing state to be deleted after root logged out and making
Podman in systemd services not function properly
- Fixed a bug where the --change flag to podman import and podman commit
was not being parsed properly in many cases
- Fixed a bug where detach keys specified in libpod.conf were not used
by the podman attach and podman exec commands, which always used the
global default ctrl-p,ctrl-q key combination (#4556)
- Fixed a bug where rootless Podman was not able to run podman pod stats
even on CGroups v2 enabled systems (#4634)
- Fixed a bug where rootless Podman would fail on kernels without the
renameat2 syscall (#4570)
- Fixed a bug where containers with chained network namespace
dependencies (IE, container A using --net container=B and container B
using --net container=C) would not properly mount /etc/hosts and
/etc/resolv.conf into the container (#4626)
- Fixed a bug where podman run with the --rm flag and without
-d could, when run in the background, throw a 'container does not
exist' error when attempting to remove the container after it exited
- Fixed a bug where named volume locks were not properly reacquired
after a reboot, potentially leading to deadlocks when trying to start
containers using the volume (#4605 and #4621)
- Fixed a bug where Podman could not completely remove containers if
sent SIGKILL during removal, leaving the container name unusable
without the podman rm --storage command to complete removal (#3906)
- Fixed a bug where checkpointing containers started with --rm was
allowed when --export was not specified (the container, and
checkpoint, would be removed after checkpointing was complete by --rm)
(#3774)
- Fixed a bug where the podman pod prune command would fail if
containers were present in the pods and the --force flag was not
passed (#4346)
- Fixed a bug where containers could not set a static IP or static MAC
address if they joined a non-default CNI network (#4500)
- Fixed a bug where podman system renumber would always throw an error
if a container was mounted when it was run
- Fixed a bug where podman container restore would fail with containers
using a user namespace
- Fixed a bug where rootless Podman would attempt to use the journald
events backend even on systems without systemd installed
- Fixed a bug where podman history would sometimes not properly identify
the IDs of layers in an image (#3359)
- Fixed a bug where containers could not be restarted when Conmon v2.0.3
or later was used
- Fixed a bug where Podman did not check image OS and Architecture
against the host when starting a container
- Fixed a bug where containers in pods did not function properly with
the Kata OCI runtime (#4353)
- Fixed a bug where `podman info --format '{{ json . }}' would not
produce JSON output (#4391)
- Fixed a bug where Podman would not verify if files passed to
--authfile existed (#4328)
- Fixed a bug where podman images --digest would not always print
digests when they were available
- Fixed a bug where rootless podman run could hang due to a race with
reading and writing events
- Fixed a bug where rootless Podman would print warning-level logs
despite not be instructed to do so (#4456)
- Fixed a bug where podman pull would attempt to fetch from remote
registries when pulling an unqualified image using the docker-daemon
transport (#4434)
- Fixed a bug where podman cp would not work if STDIN was a pipe
- Fixed a bug where podman exec could stop accepting input if anything
was typed between the command being run and the exec session starting
(#4397)
- Fixed a bug where podman logs --tail 0 would print all lines
of a container's logs, instead of no lines (#4396)
- Fixed a bug where the timeout for slirp4netns was incorrectly set,
resulting in an extremely long timeout (#4344)
- Fixed a bug where the podman stats command would print CPU
utilizations figures incorrectly (#4409)
- Fixed a bug where the podman inspect --size command would not print
the size of the container's read/write layer if the size was 0 (#4744)
- Fixed a bug where the podman kill command was not properly validating
signals before use (#4746)
- Fixed a bug where the --quiet and --format flags to podman ps could
not be used at the same time
- Fixed a bug where the podman stop command was not stopping exec
sessions when a container was created without a PID namespace
(--pid=host)
- Fixed a bug where the podman pod rm --force command was not removing
anonymous volumes for containers that were removed
- Fixed a bug where the podman checkpoint command would not export all
changes to the root filesystem of the container if performed more than
once on the same container (#4606)
- Fixed a bug where containers started with --rm would not be
automatically removed on being stopped if an exec session was running
inside the container (#4666)
* Misc
- The fixes to runtime directory path as root can cause strange behavior
if an upgrade is performed while containers are running
- Updated vendored Buildah to v1.12.0
- Updated vendored containers/storage library to v1.15.4
- Updated vendored containers/image library to v5.1.0
- Kata Containers runtimes (kata-runtime, kata-qemu, and kata-fc) are
now present in the default libpod.conf, but will not be available
unless Kata containers is installed on the system
- Podman previously did not allow the creation of containers with a
memory limit lower than 4MB. This restriction has been removed, as the
crun runtime can create containers with significantly less memory
Update podman to v1.6.4
- Remove winsz FIFO on container restart to allow use with Conmon 2.03 and
higher
- Ensure volumes reacquire locks on system restart, preventing deadlocks
when starting containers
- Suppress spurious log messages when running rootless Podman
- Update vendored containers/storage to v1.13.6
- Fix a deadlock related to writing events
- Do not use the journald event logger when it is not available
Update podman to v1.6.2
* Features
- Added a --runtime flag to podman system migrate to allow the OCI
runtime for all containers to be reset, to ease transition to the crun
runtime on CGroups V2 systems until runc gains full support
- The podman rm command can now remove containers in broken states which
previously could not be removed
- The podman info command, when run without root, now shows information
on UID and GID mappings in the rootless user namespace
- Added podman build --squash-all flag, which squashes all layers
(including those of the base image) into one layer
- The --systemd flag to podman run and podman create now accepts a
string argument and allows a new value, always, which forces systemd
support without checking if the the container entrypoint is systemd
* Bugfixes
- Fixed a bug where the podman top command did not work on systems using
CGroups V2 (#4192)
- Fixed a bug where rootless Podman could double-close a file, leading
to a panic
- Fixed a bug where rootless Podman could fail to retrieve some
containers while refreshing the state
- Fixed a bug where podman start --attach --sig-proxy=false would still
proxy signals into the container
- Fixed a bug where Podman would unconditionally use a non-default path
for authentication credentials (auth.json), breaking podman login
integration with skopeo and other tools using the containers/image
library
- Fixed a bug where podman ps --format=json and podman images
--format=json would display null when no results were returned,
instead of valid JSON
- Fixed a bug where podman build --squash was incorrectly squashing all
layers into one, instead of only new layers
- Fixed a bug where rootless Podman would allow volumes with
options to be mounted (mounting volumes requires root), creating an
inconsistent state where volumes reported as mounted but were not
(#4248)
- Fixed a bug where volumes which failed to unmount could not be removed
(#4247)
- Fixed a bug where Podman incorrectly handled some errors relating to
unmounted or missing containers in containers/storage
- Fixed a bug where podman stats was broken on systems running CGroups
V2 when run rootless (#4268)
- Fixed a bug where the podman start command would print the short
container ID, instead of the full ID
- Fixed a bug where containers created with an OCI runtime that is no
longer available (uninstalled or removed from the config file) would
not appear in podman ps and could not be removed via podman rm
- Fixed a bug where containers restored via podman container restore
--import would retain the CGroup path of the original container, even
if their container ID changed; thus, multiple containers created from
the same checkpoint would all share the same CGroup
* Misc
- The default PID limit for containers is now set to 4096. It can be
adjusted back to the old default (unlimited) by passing
--pids-limit 0 to podman create and podman run
- The podman start --attach command now automatically attaches STDIN if
the container was created with -i
- The podman network create command now validates network names using
the same regular expression as container and pod names
- The --systemd flag to podman run and podman create will now
only enable systemd mode when the binary being run inside the
container is /sbin/init, /usr/sbin/init, or ends in systemd
(previously detected any path ending in init or systemd)
- Updated vendored Buildah to 1.11.3
- Updated vendored containers/storage to 1.13.5
- Updated vendored containers/image to 4.0.1
Update podman to v1.6.1
* Features
- The podman network create, podman network rm, podman network inspect,
and podman network ls commands have been added to manage CNI networks
used by Podman
- The podman volume create command can now create and mount volumes with
options, allowing volumes backed by NFS, tmpfs, and many other
filesystems
- Podman can now run containers without CGroups for better integration
with systemd by using the --cgroups=disabled flag with podman create
and podman run. This is presently only supported with the crun OCI
runtime
- The podman volume rm and podman volume inspect commands can now refer
to volumes by an unambiguous partial name, in addition to full name
(e.g. podman volume rm myvol to remove a volume named myvolume) (#3891)
- The podman run and podman create commands now support the
--pull flag to allow forced re-pulling of images (#3734)
- Mounting volumes into a container using --volume, --mount, and
--tmpfs now allows the suid, dev, and exec mount options (the inverse
of nosuid, nodev, noexec) (#3819)
- Mounting volumes into a container using --mount now allows the
relabel=Z and relabel=z options to relabel mounts.
- The podman push command now supports the --digestfile option to save a
file containing the pushed digest
- Pods can now have their hostname set via podman pod create
--hostname or providing Pod YAML with a hostname set to podman play
kube (#3732)
- The podman image sign command now supports the --cert-dir flag
- The podman run and podman create commands now support the
--security-opt label=filetype:$LABEL flag to set the SELinux label for
container files
- The remote Podman client now supports healthchecks
* Bugfixes
- Fixed a bug where remote podman pull would panic if a Varlink
connection was not available (#4013)
- Fixed a bug where podman exec would not properly set terminal size
when creating a new exec session (#3903)
- Fixed a bug where podman exec would not clean up socket symlinks on
the host (#3962)
- Fixed a bug where Podman could not run systemd in containers that
created a CGroup namespace
- Fixed a bug where podman prune -a would attempt to prune images used
by Buildah and CRI-O, causing errors (#3983)
- Fixed a bug where improper permissions on the ~/.config directory
could cause rootless Podman to use an incorrect directory for storing
some files
- Fixed a bug where the bash completions for podman import threw errors
- Fixed a bug where Podman volumes created with podman volume create
would not copy the contents of their mountpoint the first time they
were mounted into a container (#3945)
- Fixed a bug where rootless Podman could not run podman exec when the
container was not run inside a CGroup owned by the user (#3937)
- Fixed a bug where podman play kube would panic when given Pod YAML
without a securityContext (#3956)
- Fixed a bug where Podman would place files incorrectly when
storage.conf configuration items were set to the empty string (#3952)
- Fixed a bug where podman build did not correctly inherit Podman's
CGroup configuration, causing crashed on CGroups V2 systems (#3938)
- Fixed a bug where remote podman run --rm would exit before the
container was completely removed, allowing race conditions when
removing container resources (#3870)
- Fixed a bug where rootless Podman would not properly handle changes to
/etc/subuid and /etc/subgid after a container was launched
- Fixed a bug where rootless Podman could not include some devices in a
container using the --device flag (#3905)
- Fixed a bug where the commit Varlink API would segfault if provided
incorrect arguments (#3897)
- Fixed a bug where temporary files were not properly cleaned up after a
build using remote Podman (#3869)
- Fixed a bug where podman remote cp crashed instead of reporting it was
not yet supported (#3861)
- Fixed a bug where podman exec would run as the wrong user when execing
into a container was started from an image with Dockerfile USER (or a
user specified via podman run --user) (#3838)
- Fixed a bug where images pulled using the oci: transport would be
improperly named
- Fixed a bug where podman varlink would hang when managed by systemd
due to SD_NOTIFY support conflicting with Varlink (#3572)
- Fixed a bug where mounts to the same destination would sometimes not
trigger a conflict, causing a race as to which was actually mounted
- Fixed a bug where podman exec --preserve-fds caused Podman to hang
(#4020)
- Fixed a bug where removing an unmounted container that was unmounted
might sometimes not properly clean up the container (#4033)
- Fixed a bug where the Varlink server would freeze when run in a
systemd unit file (#4005)
- Fixed a bug where Podman would not properly set the $HOME environment
variable when the OCI runtime did not set it
- Fixed a bug where rootless Podman would incorrectly print warning
messages when an OCI runtime was not found (#4012)
- Fixed a bug where named volumes would conflict with, instead of
overriding, tmpfs filesystems added by the --read-only-tmpfs flag to
podman create and podman run
- Fixed a bug where podman cp would incorrectly make the target
directory when copying to a symlink which pointed to a nonexistent
directory (#3894)
- Fixed a bug where remote Podman would incorrectly read STDIN when the
-i flag was not set (#4095)
- Fixed a bug where podman play kube would create an empty pod when
given an unsupported YAML type (#4093)
- Fixed a bug where podman import --change improperly parsed CMD (#4000)
- Fixed a bug where rootless Podman on systems using CGroups V2 would
not function with the cgroupfs CGroups manager
- Fixed a bug where rootless Podman could not correctly identify the
DBus session address, causing containers to fail to start (#4162)
- Fixed a bug where rootless Podman with slirp4netns networking would
fail to start containers due to mount leaks
* Misc
- Significant changes were made to Podman volumes in this release. If
you have pre-existing volumes, it is strongly recommended to run
podman system renumber after upgrading.
- Version 0.8.1 or greater of the CNI Plugins is now required for Podman
- Version 2.0.1 or greater of Conmon is strongly recommended
- Updated vendored Buildah to v1.11.2
- Updated vendored containers/storage library to v1.13.4
- Improved error messages when trying to create a pod with no name via
podman play kube
- Improved error messages when trying to run podman pause or podman
stats on a rootless container on a system without CGroups V2 enabled
- TMPDIR has been set to /var/tmp by default to better handle large
temporary files
- podman wait has been optimized to detect stopped containers more
rapidly
- Podman containers now include a ContainerManager annotation indicating
they were created by libpod
- The podman info command now includes information about slirp4netns and
fuse-overlayfs if they are available
- Podman no longer sets a default size of 65kb for tmpfs filesystems
- The default Podman CNI network has been renamed in an attempt to
prevent conflicts with CRI-O when both are run on the same system.
This should only take effect on system restart
- The output of podman volume inspect has been more closely matched to
docker volume inspect
- Add katacontainers as a recommended package, and include it as an
additional OCI runtime in the configuration.
Update podman to v1.5.1
* Features
- The hostname of pods is now set to the pod's name
* Bugfixes
- Fixed a bug where podman run and podman create did not honor the
--authfile
option (#3730)
- Fixed a bug where containers restored with podman container restore
--import would incorrectly duplicate the Conmon PID file of the
original container
- Fixed a bug where podman build ignored the default OCI runtime
configured in libpod.conf
- Fixed a bug where podman run --rm (or force-removing any running
container with podman rm --force) were not retrieving the correct exit
code (#3795)
- Fixed a bug where Podman would exit with an error if any configured
hooks directory was not present
- Fixed a bug where podman inspect and podman commit would not use the
correct CMD for containers run with podman play kube
- Fixed a bug created pods when using rootless Podman and CGroups V2
(#3801)
- Fixed a bug where the podman events command with the --since or --until
options could take a very long time to complete
* Misc
- Rootless Podman will now inherit OCI runtime configuration from the
root configuration (#3781)
- Podman now properly sets a user agent while contacting registries
(#3788)
- Add zsh completion for podman commands
Update podman to v1.5.0
* Features
- Podman containers can now join the user namespaces of other containers
with --userns=container:$ID, or a user namespace at an arbitary path
with --userns=ns:$PATH
- Rootless Podman can experimentally squash all UIDs and GIDs in an
image to a single UID and GID (which does not require use of the
newuidmap and newgidmap executables) by passing
--storage-opt ignore_chown_errors
- The podman generate kube command now produces YAML for any bind mounts
the container has created (#2303)
- The podman container restore command now features a new flag,
--ignore-static-ip, that can be used with --import to import a single
container with a static IP multiple times on the same host
- Added the ability for podman events to output JSON by specifying
--format=json
- If the OCI runtime or conmon binary cannot be found at the paths
specified in libpod.conf, Podman will now also search for them in the
calling user's path
- Added the ability to use podman import with URLs (#3609)
- The podman ps command now supports filtering names using regular
expressions (#3394)
- Rootless Podman containers with --privileged set will now mount in all
host devices that the user can access
- The podman create and podman run commands now support the
--env-host flag to forward all environment variables from the host
into the container
- Rootless Podman now supports healthchecks (#3523)
- The format of the HostConfig portion of the output of podman inspect
on containers has been improved and synced with Docker
- Podman containers now support CGroup namespaces, and can create them
by passing --cgroupns=private to podman run or podman create
- The podman create and podman run commands now support the
--ulimit=host flag, which uses any ulimits currently set on the host
for the container
- The podman rm and podman rmi commands now use different exit codes to
indicate 'no such container' and 'container is running' errors
- Support for CGroups V2 through the crun OCI runtime has been greatly
improved, allowing resource limits to be set for rootless containers
when the CGroups V2 hierarchy is in use
* Bugfixes
- Fixed a bug where a race condition could cause podman restart to fail
to start containers with ports
- Fixed a bug where containers restored from a checkpoint would not
properly report the time they were started at
- Fixed a bug where podman search would return at most 25 results, even
when the maximum number of results was set higher
- Fixed a bug where podman play kube would not honor capabilities set in
imported YAML (#3689)
- Fixed a bug where podman run --env, when passed a single key (to use
the value from the host), would set the environment variable in the
container even if it was not set on the host (#3648)
- Fixed a bug where podman commit --changes would not properly set
environment variables
- Fixed a bug where Podman could segfault while working with images with
no history
- Fixed a bug where podman volume rm could remove arbitrary volumes if
given an ambiguous name (#3635)
- Fixed a bug where podman exec invocations leaked memory by not
cleaning up files in tmpfs
- Fixed a bug where the --dns and --net=container flags to podman run
and podman create were not mutually exclusive (#3553)
- Fixed a bug where rootless Podman would be unable to run containers
when less than 5 UIDs were available
- Fixed a bug where containers in pods could not be removed without
removing the entire pod (#3556)
- Fixed a bug where Podman would not properly clean up all CGroup
controllers for created cgroups when using the cgroupfs CGroup driver
- Fixed a bug where Podman containers did not properly clean up files in
tmpfs, resulting in a memory leak as containers stopped
- Fixed a bug where healthchecks from images would not use default
settings for interval, retries, timeout, and start period when they
were not provided by the image (#3525)
- Fixed a bug where healthchecks using the HEALTHCHECK CMD format where
not properly supported (#3507)
- Fixed a bug where volume mounts using relative source paths would not
be properly resolved (#3504)
- Fixed a bug where podman run did not use authorization credentials
when a custom path was specified (#3524)
- Fixed a bug where containers checkpointed with podman container
checkpoint did not properly set their finished time
- Fixed a bug where running podman inspect on any container not created
with podman run or podman create (for example, pod infra containers)
would result in a segfault (#3500)
- Fixed a bug where healthcheck flags for podman create and podman run
were incorrectly named (#3455)
- Fixed a bug where Podman commands would fail to find targets if a
partial ID was specified that was ambiguous between a container and
pod (#3487)
- Fixed a bug where restored containers would not have the correct
SELinux label
- Fixed a bug where Varlink endpoints were not working properly if more
was not correctly specified
- Fixed a bug where the Varlink PullImage endpoint would crash if an
error occurred (#3715)
- Fixed a bug where the --mount flag to podman create and podman run did
not allow boolean arguments for its ro and rw options (#2980)
- Fixed a bug where pods did not properly share the UTS namespace,
resulting in incorrect behavior from some utilities which rely on
hostname (#3547)
- Fixed a bug where Podman would unconditionally append ENTRYPOINT to
CMD during podman commit (and when reporting CMD in podman inspect)
(#3708)
- Fixed a bug where podman events with the journald events backend would
incorrectly print 6 previous events when only new events were
requested (#3616)
- Fixed a bug where podman port would exit prematurely when a port
number was specified (#3747)
- Fixed a bug where passing . as an argument to the --dns-search flag to
podman create and podman run was not properly clearing DNS search
domains in the container
* Misc
- Updated vendored Buildah to v1.10.1
- Updated vendored containers/image to v3.0.2
- Updated vendored containers/storage to v1.13.1
- Podman now requires conmon v2.0.0 or higher
- The podman info command now displays the events logger being in use
- The podman inspect command on containers now includes the ID of the
pod a container has joined and the PID of the container's conmon
process
- The -v short flag for podman --version has been re-added
- Error messages from podman pull should be significantly clearer
- The podman exec command is now available in the remote client
- The podman-v1.5.0.tar.gz file attached is podman packaged for MacOS.
It can be installed using Homebrew.
- Update libpod.conf to support latest path discovery feature for `runc`
and `conmon` binaries.
conmon was included in version 2.0.10. (bsc#1160460, bsc#1164390,
jsc#ECO-1048, jsc#SLE-11485, jsc#SLE-11331):
fuse-overlayfs was updated to v0.7.6 (bsc#1160460)
- do not look in lower layers for the ino if there is no origin xattr set
- attempt to use the file path if the operation on the fd fails with ENXIO
- do not expose internal xattrs through listxattr and getxattr
- fix fallocate for deleted files.
- ignore O_DIRECT. It causes issues with libfuse not using an aligned
buffer, causing write(2) to fail with EINVAL.
- on copyup, do not copy the opaque xattr.
- fix a wrong lookup for whiteout files, that could happen on a double
unlink.
- fix possible segmentation fault in direct_fsync()
- use the data store to create missing whiteouts
- after a rename, force a directory reload
- introduce inodes cache
- correctly read inode for unix sockets
- avoid hash map lookup when possible
- use st_dev for the ino key
- check whether writeback is supported
- set_attrs: don't require write to S_IFREG
- ioctl: do not reuse fi->fh for directories
- fix skip whiteout deletion optimization
- store the new mode after chmod
- support fuse writeback cache and enable it by default
- add option to disable fsync
- add option to disable xattrs
- add option to skip ino number check in lower layers
- fix fd validity check
- fix memory leak
- fix read after free
- fix type for flistxattr return
- fix warnings reported by lgtm.com
- enable parallel dirops
cni was updated to 0.7.1:
- Set correct CNI version for 99-loopback.conf
Update to version 0.7.1 (bsc#1160460):
* Library changes:
+ invoke : ensure custom envs of CNIArgs are prepended to process envs
+ add GetNetworkListCachedResult to CNI interface
+ delegate : allow delegation funcs override CNI_COMMAND env
automatically in heritance
* Documentation & Convention changes:
+ Update cnitool documentation for spec v0.4.0
+ Add cni-route-override to CNI plugin list
Update to version 0.7.0:
* Spec changes:
+ Use more RFC2119 style language in specification (must, should...)
+ add notes about ADD/DEL ordering
+ Make the container ID required and unique.
+ remove the version parameter from ADD and DEL commands.
+ Network interface name matters
+ be explicit about optional and required structure members
+ add CHECK method
+ Add a well-known error for "try again"
+ SPEC.md: clarify meaning of 'routes'
* Library changes:
+ pkg/types: Makes IPAM concrete type
+ libcni: return error if Type is empty
+ skel: VERSION shouldn't block on stdin
+ non-pointer instances of types.Route now correctly marshal to JSON
+ libcni: add ValidateNetwork and ValidateNetworkList functions
+ pkg/skel: return error if JSON config has no network name
+ skel: add support for plugin version string
+ libcni: make exec handling an interface for better downstream testing
+ libcni: api now takes a Context to allow operations to be timed out or
cancelled
+ types/version: add helper to parse PrevResult
+ skel: only print about message, not errors
+ skel,invoke,libcni: implementation of CHECK method
+ cnitool: Honor interface name supplied via CNI_IFNAME environment
variable.
+ cnitool: validate correct number of args
+ Don't copy gw from IP4.Gateway to Route.GW When converting from 0.2.0
+ add PrintTo method to Result interface
+ Return a better error when the plugin returns none
- Install sleep binary into CNI plugin directory
cni-plugins was updated to 0.8.4:
Update to version 0.8.4 (bsc#1160460):
* add support for mips64le
* Add missing cniVersion in README example
* bump go-iptables module to v0.4.5
* iptables: add idempotent functions
* portmap doesn't fail if chain doesn't exist
* fix portmap port forward flakiness
* Add Bruce Ma and Piotr Skarmuk as owners
Update to version 0.8.3:
* Enhancements:
* static: prioritize the input sources for IPs (#400).
* tuning: send gratuitous ARP in case of MAC address update (#403).
* bandwidth: use uint64 for Bandwidth value (#389).
* ptp: only override DNS conf if DNS settings provided (#388).
* loopback: When prevResults are not supplied to loopback plugin, create
results to return (#383).
* loopback support CNI CHECK and result cache (#374).
* Better input validation:
* vlan: add MTU validation to loadNetConf (#405).
* macvlan: add MTU validation to loadNetConf (#404).
* bridge: check vlan id when loading net conf (#394).
* Bugfixes:
* bugfix: defer after err check, or it may panic (#391).
* portmap: Fix dual-stack support (#379).
* firewall: don't return error in DEL if prevResult is not found (#390).
* bump up libcni back to v0.7.1 (#377).
* Docs:
* contributing doc: revise test script name to run (#396).
* contributing doc: describe cnitool installation (#397).
Update plugins to v0.8.2
+ New features:
* Support "args" in static and tuning
* Add Loopback DSR support, allow l2tunnel networks to be used with the
l2bridge plugin
* host-local: return error if same ADD request is seen twice
* bandwidth: fix collisions
* Support ips capability in static and mac capability in tuning
* pkg/veth: Make host-side veth name configurable
+ Bug fixes:
* Fix: failed to set bridge addr: could not add IP address to "cni0":
file exists
* host-device: revert name setting to make retries idempotent (#357).
* Vendor update go-iptables. Vendor update go-iptables to
obtain commit f1d0510cabcb710d5c5dd284096f81444b9d8d10
* Update go.mod & go.sub
* Remove link Down/Up in MAC address change to prevent route flush
(#364).
* pkg/ip unit test: be agnostic of Linux version, on Linux 4.4 the
syscall error message is "invalid argument" not "file exists"
* bump containernetworking/cni to v0.7.1
Updated plugins to v0.8.1:
+ Bugs:
* bridge: fix ipMasq setup to use correct source address
* fix compilation error on 386
* bandwidth: get bandwidth interface in host ns through container
interface
+ Improvements:
* host-device: add pciBusID property
Updated plugins to v0.8.0:
+ New plugins:
* bandwidth - limit incoming and outgoing bandwidth
* firewall - add containers to firewall rules
* sbr - convert container routes to source-based routes
* static - assign a fixed IP address
* win-bridge, win-overlay: Windows plugins
+ Plugin features / changelog:
* CHECK Support
* macvlan:
- Allow to configure empty ipam for macvlan
- Make master config optional
* bridge:
- Add vlan tag to the bridge cni plugin
- Allow the user to assign VLAN tag
- L2 bridge Implementation.
* dhcp:
- Include Subnet Mask option parameter in DHCPREQUEST
- Add systemd unit file to activate socket with systemd
- Add container ifName to the dhcp clientID, making the clientID value
* flannel:
- Pass through runtimeConfig to delegate
* host-local:
- host-local: add ifname to file tracking IP address used
* host-device:
- Support the IPAM in the host-device
- Handle empty netns in DEL for loopback and host-device
* tuning:
- adds 'ip link' command related feature into tuning
+ Bug fixes & minor changes
* Correctly DEL on ipam failure for all plugins
* Fix bug on ip revert if cmdAdd fails on macvlan and host-device
* host-device: Ensure device is down before rename
* Fix -hostprefix option
* some DHCP servers expect to request for explicit router options
* bridge: release IP in case of error
* change source of ipmasq rule from ipn to ip
from version v0.7.5:
+ This release takes a minor change to the portmap plugin:
* Portmap: append, rather than prepend, entry rules
+ This fixes a potential issue where firewall rules may be bypassed by
port mapping
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-398=1
Package List:
- openSUSE Leap 15.1 (x86_64):
cni-0.7.1-lp151.2.3.1
cni-plugins-0.8.4-lp151.2.3.1
conmon-2.0.10-lp151.2.1
conmon-debuginfo-2.0.10-lp151.2.1
fuse-overlayfs-0.7.6-lp151.5.1
fuse-overlayfs-debuginfo-0.7.6-lp151.5.1
fuse-overlayfs-debugsource-0.7.6-lp151.5.1
podman-1.8.0-lp151.3.9.1
- openSUSE Leap 15.1 (noarch):
podman-cni-config-1.8.0-lp151.3.9.1
References:
https://www.suse.com/security/cve/CVE-2019-18466.html
https://bugzilla.suse.com/1155217
https://bugzilla.suse.com/1160460
https://bugzilla.suse.com/1164390
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0388-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 27 Mar '20
by opensuse-security@opensuse.org 27 Mar '20
27 Mar '20
openSUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0388-1
Rating: important
References: #1044231 #1051510 #1056686 #1065729 #1111666
#1111974 #1112178 #1113956 #1114279 #1119680
#1141895 #1156510 #1158187 #1159285 #1161561
#1162929 #1162931 #1164078 #1164507 #1164632
#1165111 #1165741 #1165873 #1165929 #1165950
#1165980 #1165984 #1165985 #1166003 #1166101
#1166102 #1166103 #1166104 #1166632 #1166658
#1166730 #1166731 #1166732 #1166733 #1166734
#1166735
Cross-References: CVE-2019-19768 CVE-2020-8647 CVE-2020-8649
CVE-2020-9383
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves four vulnerabilities and has 37 fixes
is now available.
Description:
The openSUSE Leap 15.1 kernel was updated to receive various security and
bugfixes.
The following security bugs were fixed:
- CVE-2020-8647: There was a use-after-free vulnerability in the
vc_do_resize function in drivers/tty/vt/vt.c (bnc#1162929 1164078).
- CVE-2020-8649: There was a use-after-free vulnerability in the
vgacon_invert_region function in drivers/video/console/vgacon.c
(bnc#1162929 1162931).
- CVE-2020-9383: An issue was discovered in the set_fdc in
drivers/block/floppy.c that lead to a wait_til_ready out-of-bounds read
because the FDC index is not checked for errors before assigning it, aka
CID-2e90ca68b0d2 (bnc#1165111).
- CVE-2019-19768: There was a use-after-free (read) in the __blk_add_trace
function in kernel/trace/blktrace.c (which is used to fill out a
blk_io_trace structure and place it in a per-cpu sub-buffer)
(bnc#1159285).
The following non-security bugs were fixed:
- ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1
(bsc#1111666).
- ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666).
- ALSA: hda/realtek - Add more codec supported Headset Button
(bsc#1111666).
- ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666).
- ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666).
- ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294
(bsc#1111666).
- ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1
(bsc#1111666).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master
(bsc#1111666).
- ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666).
- ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000
(bsc#1111666).
- ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65
headset (bsc#1111666).
- ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666).
- ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666).
- ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666).
- ALSA: usb-audio: add quirks for Line6 Helix devices fw>=2.82
(bsc#1111666).
- ALSA: usb-audio: fix Corsair Virtuoso mixer label collision
(bsc#1111666).
- ALSA: usb-audio: unlock on error in probe (bsc#1111666).
- ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status
(bsc#1051510).
- ASoC: dapm: Correct DAPM handling of active widgets during shutdown
(bsc#1051510).
- ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path
(bsc#1051510).
- ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output
(bsc#1051510).
- ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510).
- ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510).
- Add CONFIG_RAID6_PQ_BENCHMARK=y in following config files for the above
change,
- EDAC, ghes: Make platform-based whitelisting x86-only (bsc#1158187).
- EDAC/mc: Fix use-after-free and memleaks during device removal
(bsc#1114279).
- Enable the following two patches in series.conf, and refresh the KABI
patch due to previous md commit (bsc#1119680),
- HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510).
- Input: edt-ft5x06 - work around first register access error
(bsc#1051510).
- Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510).
- Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list
(bsc#1051510).
- Input: synaptics - switch T470s to RMI4 by default (bsc#1051510).
- KVM: VMX: check descriptor table exits on instruction emulation
(bsc#1166104).
- NFC: pn544: Fix a typo in a debug message (bsc#1051510).
- NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use
le16_add_cpu() (bsc#1051510).
- PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561).
- PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL
(bsc#1161561).
- PCI/AER: Clear only ERR_FATAL status bits during fatal recovery
(bsc#1161561).
- PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery
(bsc#1161561).
- PCI/AER: Do not clear AER bits if error handling is Firmware-First
(bsc#1161561).
- PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561).
- PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561).
- PCI/AER: Take reference on error devices (bsc#1161561).
- PCI/ERR: Run error recovery callbacks for all affected devices
(bsc#1161561).
- PCI/ERR: Use slot reset if available (bsc#1161561).
- Update "drm/i915: Wean off drm_pci_alloc/drm_pci_free" (bsc#1114279)
This patch fixes ../drivers/gpu/drm/i915/i915_gem.c: In function
'i915_gem_object_get_pages_phys':
../drivers/gpu/drm/i915/i915_gem.c:232:2: warning: return makes pointer
from integer without a cast [enabled by default] introduced by commit
cde29f21f04985905600b14e6936f4f023329a99.
- Update config files. CONFIG_IPX was set on ARM. Disable as on other
archs.
- [1/2,media] uvcvideo: Refactor teardown of uvc on USB disconnect
(https://patchwork.kernel.org/patch/9683663/) (bsc#1164507)
- amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956)
- atm: zatm: Fix empty body Clang warnings (bsc#1051510).
- b43legacy: Fix -Wcast-function-type (bsc#1051510).
- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).
- blktrace: fix dereference after null check (bsc#1159285).
- blktrace: fix trace mutex deadlock (bsc#1159285).
- bonding/alb: properly access headers in bond_alb_xmit()
(networking-stable-20_02_09).
- config: enable BLK_DEV_SR_VENDOR on armv7hl (bsc#1164632)
- cpufreq: powernv: Fix unsafe notifiers (bsc#1065729).
- cpufreq: powernv: Fix use-after-free (bsc#1065729).
- crypto: pcrypt - Fix user-after-free on module unload (git-fixes).
- dmaengine: coh901318: Fix a double lock bug in dma_tc_handle()
(bsc#1051510).
- driver core: Print device when resources present in really_probe()
(bsc#1051510).
- driver core: platform: Prevent resouce overflow from causing infinite
loops (bsc#1051510).
- driver core: platform: fix u32 greater or equal to zero comparison
(bsc#1051510).
- drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET
(bsc#1166003).
- drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET
(bsc#1166003).
- drm/amd/dm/mst: Ignore payload update failures (bsc#1112178)
- drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510).
- drm/i915/gvt: Fix orphan vgpu dmabuf_objs' lifetime (git-fixes).
- drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits
(git-fixes).
- drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279)
- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)
- drm/i915: Program MBUS with rmw during initialization (git-fixes).
- drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510).
- drm/nouveau/disp/nv50-: prevent oops when no channel method map provided
(bsc#1051510).
- drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from
fw (bsc#1051510).
- drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets
(git-fixes).
- drm/sun4i: Fix DE2 VI layer format support (git-fixes).
- drm/sun4i: de2/de3: Remove unsupported VI layer formats (git-fixes).
- drm: remove the newline for CRC source name (bsc#1051510).
- fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003).
- firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes).
- firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes).
- firmware: imx: scu: Ensure sequential TX (git-fixes).
- fs/xfs: fix f_ffree value for statfs when project quota is set
(bsc#1165985).
- hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Warn unknown speed message only when carrier is present
(bsc#1065729).
- iommu/amd: Check feature support bit before accessing MSI capability
registers (bsc#1166101).
- iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102).
- iommu/amd: Remap the IOMMU device table with the memory encryption mask
for kdump (bsc#1141895).
- iommu/dma: Fix MSI reservation allocation (bsc#1166730).
- iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page
(bsc#1166732).
- iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103).
- iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733).
- iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734).
- iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint
(bsc#1166731).
- iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn
+ add_taint (bsc#1166735).
- iwlegacy: Fix -Wcast-function-type (bsc#1051510).
- iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices
(bsc#1166632).
- iwlwifi: mvm: Fix thermal zone registration (bsc#1051510).
- kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled
(bsc#1141895).
- kexec: Allocate decrypted control pages for kdump if SME is enabled
(bsc#1141895).
- lib/raid6: add missing include for raid6test (bsc#1166003).
- lib/raid6: add option to skip algo benchmarking (bsc#1166003).
- lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003).
- libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields
(bsc#1165929).
- libnvdimm/pfn_dev: Do not clear device memmap area during generic
namespace probe (bsc#1165929 bsc#1165950).
- libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929).
- md raid0/linear: Mark array as 'broken' and fail BIOs if a member is
gone (bsc#1166003).
- md-batch-flush-requests-kabi.patch
- md-batch-flush-requests.patch
- md-bitmap: create and destroy wb_info_pool with the change of backlog
(bsc#1166003).
- md-bitmap: create and destroy wb_info_pool with the change of bitmap
(bsc#1166003).
- md-bitmap: small cleanups (bsc#1166003).
- md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during
reshaping stage (bsc#1166003).
- md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003).
- md-cluster/raid10: do not call remove_and_add_spares during reshaping
stage (bsc#1166003).
- md-cluster/raid10: resize all the bitmaps before start reshape
(bsc#1166003).
- md-cluster/raid10: support add disk under grow mode (bsc#1166003).
- md-cluster: introduce resync_info_get interface for sanity check
(bsc#1166003).
- md-cluster: remove suspend_info (bsc#1166003).
- md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted
(bsc#1166003).
- md-linear: use struct_size() in kzalloc() (bsc#1166003).
- md/bitmap: avoid race window between md_bitmap_resize and
bitmap_file_clear_bit (bsc#1166003).
- md/bitmap: use mddev_suspend/resume instead of ->quiesce() (bsc#1166003).
- md/raid0: Fix an error message in raid0_make_request() (bsc#1166003).
- md/raid10: Fix raid10 replace hang when new added disk faulty
(bsc#1166003).
- md/raid10: end bio when the device faulty (bsc#1166003).
- md/raid10: prevent access of uninitialized resync_pages offset
(bsc#1166003).
- md/raid10: read balance chooses idlest disk for SSD (bsc#1166003).
- md/raid1: Fix a warning message in remove_wb() (bsc#1166003).
- md/raid1: avoid soft lockup under high load (bsc#1166003).
- md/raid1: end bio when the device faulty (bsc#1166003).
- md/raid1: fail run raid1 array when active disk less than one
(bsc#1166003).
- md/raid1: fix potential data inconsistency issue with write behind
device (bsc#1166003).
- md/raid1: get rid of extra blank line and space (bsc#1166003).
- md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003).
- md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003).
- md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003).
- md: add __acquires/__releases annotations to (un)lock_two_stripes
(bsc#1166003).
- md: add __acquires/__releases annotations to handle_active_stripes
(bsc#1166003).
- md: add a missing endianness conversion in check_sb_changes
(bsc#1166003).
- md: add bitmap_abort label in md_run (bsc#1166003).
- md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003).
- md: allow last device to be forcibly removed from RAID1/RAID10
(bsc#1166003).
- md: avoid invalid memory access for array sb->dev_roles (bsc#1166003).
- md: change kabi fix patch name, from
patches.kabi/md-batch-flush-requests-kabi.patch to
patches.kabi/md-backport-kabi.patch
- md: convert to kvmalloc (bsc#1166003).
- md: do not call spare_active in md_reap_sync_thread if all member
devices can't work (bsc#1166003).
- md: do not set In_sync if array is frozen (bsc#1166003).
- md: fix a typo s/creat/create (bsc#1166003).
- md: fix for divide error in status_resync (bsc#1166003).
- md: fix spelling typo and add necessary space (bsc#1166003).
- md: introduce mddev_create/destroy_wb_pool for the change of member
device (bsc#1166003).
- md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003).
- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show
(bsc#1166003).
- md: no longer compare spare disk superblock events in super_load
(bsc#1166003).
- md: raid10: Use struct_size() in kmalloc() (bsc#1166003).
- md: raid1: check rdev before reference in raid1_sync_request func
(bsc#1166003).
- md: remove set but not used variable 'bi_rdev' (bsc#1166003).
- md: rename wb stuffs (bsc#1166003).
- md: return -ENODEV if rdev has no mddev assigned (bsc#1166003).
- md: use correct type in super_1_load (bsc#1166003).
- md: use correct type in super_1_sync (bsc#1166003).
- md: use correct types in md_bitmap_print_sb (bsc#1166003).
- media: uvcvideo: Refactor teardown of uvc on USB disconnect
(bsc#1164507).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: macb: Limit maximum GEM TX length in TSO
(networking-stable-20_02_09).
- net: macb: Remove unnecessary alignment check for TSO
(networking-stable-20_02_09).
- net: mvneta: move rx_dropped and rx_errors in per-cpu stats
(networking-stable-20_02_09).
- net: systemport: Avoid RBUF stuck in Wake-on-LAN mode
(networking-stable-20_02_09).
- net_sched: fix a resource leak in tcindex_set_parms()
(networking-stable-20_02_09).
- nvme: Fix parsing of ANA log page (bsc#1166658).
- nvme: Translate more status codes to blk_status_t (bsc#1156510).
- nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510).
- orinoco: avoid assertion in case of NULL pointer (bsc#1051510).
- padata: always acquire cpu_hotplug_lock before pinst->lock (git-fixes).
- pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins
(bsc#1051510).
- pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes).
- pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510).
- powerpc/pseries: fix of_read_drc_info_cell() to point at next record
(bsc#1165980 ltc#183834).
- powerpc: fix hardware PMU exception bug on PowerVM compatibility mode
systems (bsc#1056686).
- qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510).
- raid10: refactor common wait code from regular read/write request
(bsc#1166003).
- raid1: factor out a common routine to handle the completion of sync
write (bsc#1166003).
- raid1: simplify raid1_error function (bsc#1166003).
- raid1: use an int as the return value of raise_barrier() (bsc#1166003).
- raid5 improve too many read errors msg by adding limits (bsc#1166003).
- raid5: block failing device if raid will be failed (bsc#1166003).
- raid5: do not increment read_errors on EILSEQ return (bsc#1166003).
- raid5: do not set STRIPE_HANDLE to stripe which is in batch list
(bsc#1166003).
- raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003).
- raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003).
- raid5: remove worker_cnt_per_group argument from alloc_thread_groups
(bsc#1166003).
- raid5: set write hint for PPL (bsc#1166003).
- raid5: use bio_end_sector in r5_next_bio (bsc#1166003).
- raid6/test: fix a compilation error (bsc#1166003).
- raid6/test: fix a compilation warning (bsc#1166003).
- remoteproc: Initialize rproc_class before use (bsc#1051510).
- rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510).
- s390/pci: Fix unexpected write combine on resource (git-fixes).
- s390/uv: Fix handling of length extensions (git-fixes).
- staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510).
- staging: rtl8188eu: Fix potential security hole (bsc#1051510).
- staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510).
- staging: rtl8723bs: Fix potential security hole (bsc#1051510).
- tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231).
- tools: Update include/uapi/linux/fcntl.h copy from the kernel
(bsc#1166003).
- usb: host: xhci: update event ring dequeue pointer on purpose
(git-fixes).
- vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279)
- virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes).
- x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF
(bsc#1114279).
- x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895).
- x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895).
- x86/mce/amd: Fix kobject lifetime (bsc#1114279).
- x86/mce/amd: Publish the bank pointer only after setup has succeeded
(bsc#1114279).
- x86/mm: Split vmalloc_sync_all() (bsc#1165741).
- xfs: also remove cached ACLs when removing the underlying attr
(bsc#1165873).
- xfs: bulkstat should copy lastip whenever userspace supplies one
(bsc#1165984).
- xhci: Force Maximum Packet size for Full-speed bulk devices to valid
range (bsc#1051510).
- xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-388=1
Package List:
- openSUSE Leap 15.1 (noarch):
kernel-devel-4.12.14-lp151.28.44.1
kernel-docs-4.12.14-lp151.28.44.1
kernel-docs-html-4.12.14-lp151.28.44.1
kernel-macros-4.12.14-lp151.28.44.1
kernel-source-4.12.14-lp151.28.44.1
kernel-source-vanilla-4.12.14-lp151.28.44.1
- openSUSE Leap 15.1 (x86_64):
kernel-debug-4.12.14-lp151.28.44.1
kernel-debug-base-4.12.14-lp151.28.44.1
kernel-debug-base-debuginfo-4.12.14-lp151.28.44.1
kernel-debug-debuginfo-4.12.14-lp151.28.44.1
kernel-debug-debugsource-4.12.14-lp151.28.44.1
kernel-debug-devel-4.12.14-lp151.28.44.1
kernel-debug-devel-debuginfo-4.12.14-lp151.28.44.1
kernel-default-4.12.14-lp151.28.44.1
kernel-default-base-4.12.14-lp151.28.44.1
kernel-default-base-debuginfo-4.12.14-lp151.28.44.1
kernel-default-debuginfo-4.12.14-lp151.28.44.1
kernel-default-debugsource-4.12.14-lp151.28.44.1
kernel-default-devel-4.12.14-lp151.28.44.1
kernel-default-devel-debuginfo-4.12.14-lp151.28.44.1
kernel-kvmsmall-4.12.14-lp151.28.44.1
kernel-kvmsmall-base-4.12.14-lp151.28.44.1
kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.44.1
kernel-kvmsmall-debuginfo-4.12.14-lp151.28.44.1
kernel-kvmsmall-debugsource-4.12.14-lp151.28.44.1
kernel-kvmsmall-devel-4.12.14-lp151.28.44.1
kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.44.1
kernel-obs-build-4.12.14-lp151.28.44.1
kernel-obs-build-debugsource-4.12.14-lp151.28.44.1
kernel-obs-qa-4.12.14-lp151.28.44.1
kernel-syms-4.12.14-lp151.28.44.1
kernel-vanilla-4.12.14-lp151.28.44.1
kernel-vanilla-base-4.12.14-lp151.28.44.1
kernel-vanilla-base-debuginfo-4.12.14-lp151.28.44.1
kernel-vanilla-debuginfo-4.12.14-lp151.28.44.1
kernel-vanilla-debugsource-4.12.14-lp151.28.44.1
kernel-vanilla-devel-4.12.14-lp151.28.44.1
kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.44.1
References:
https://www.suse.com/security/cve/CVE-2019-19768.html
https://www.suse.com/security/cve/CVE-2020-8647.html
https://www.suse.com/security/cve/CVE-2020-8649.html
https://www.suse.com/security/cve/CVE-2020-9383.html
https://bugzilla.suse.com/1044231
https://bugzilla.suse.com/1051510
https://bugzilla.suse.com/1056686
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1111666
https://bugzilla.suse.com/1111974
https://bugzilla.suse.com/1112178
https://bugzilla.suse.com/1113956
https://bugzilla.suse.com/1114279
https://bugzilla.suse.com/1119680
https://bugzilla.suse.com/1141895
https://bugzilla.suse.com/1156510
https://bugzilla.suse.com/1158187
https://bugzilla.suse.com/1159285
https://bugzilla.suse.com/1161561
https://bugzilla.suse.com/1162929
https://bugzilla.suse.com/1162931
https://bugzilla.suse.com/1164078
https://bugzilla.suse.com/1164507
https://bugzilla.suse.com/1164632
https://bugzilla.suse.com/1165111
https://bugzilla.suse.com/1165741
https://bugzilla.suse.com/1165873
https://bugzilla.suse.com/1165929
https://bugzilla.suse.com/1165950
https://bugzilla.suse.com/1165980
https://bugzilla.suse.com/1165984
https://bugzilla.suse.com/1165985
https://bugzilla.suse.com/1166003
https://bugzilla.suse.com/1166101
https://bugzilla.suse.com/1166102
https://bugzilla.suse.com/1166103
https://bugzilla.suse.com/1166104
https://bugzilla.suse.com/1166632
https://bugzilla.suse.com/1166658
https://bugzilla.suse.com/1166730
https://bugzilla.suse.com/1166731
https://bugzilla.suse.com/1166732
https://bugzilla.suse.com/1166733
https://bugzilla.suse.com/1166734
https://bugzilla.suse.com/1166735
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0391-1: moderate: Security update for mcpp
by opensuse-security@opensuse.org 27 Mar '20
by opensuse-security@opensuse.org 27 Mar '20
27 Mar '20
openSUSE Security Update: Security update for mcpp
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0391-1
Rating: moderate
References: #1143032
Cross-References: CVE-2019-14274
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mcpp fixes the following issues:
- CVE-2019-14274: Fixed a heap-based buffer overflow in the do_msg()
(boo#1143032)
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-391=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
libmcpp0-2.7.2-bp151.4.3.1
mcpp-2.7.2-bp151.4.3.1
mcpp-devel-2.7.2-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2019-14274.html
https://bugzilla.suse.com/1143032
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0389-1: important: Security update for chromium
by opensuse-security@opensuse.org 27 Mar '20
by opensuse-security@opensuse.org 27 Mar '20
27 Mar '20
openSUSE Security Update: Security update for chromium
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0389-1
Rating: important
References: #1167090
Cross-References: CVE-2019-20503 CVE-2020-6422 CVE-2020-6424
CVE-2020-6425 CVE-2020-6426 CVE-2020-6427
CVE-2020-6428 CVE-2020-6429 CVE-2020-6449
Affected Products:
openSUSE Backports SLE-15-SP1
______________________________________________________________________________
An update that fixes 9 vulnerabilities is now available.
Description:
This update for chromium to version 80.0.3987.149 fixes the following
issues:
Chromium was update to 80.0.3987.149 (bsc#1167090):
- CVE-2020-6422: Fixed a use after free in WebGL.
- CVE-2020-6424: Fixed a use after free in media.
- CVE-2020-6425: Fixed an insufficient policy enforcement in extensions.
- CVE-2020-6426: Fixed an inappropriate implementation in V8.
- CVE-2020-6427: Fixed a use after free in audio.
- CVE-2020-6428: Fixed a use after free in audio.
- CVE-2020-6429: Fixed a use after free in audio.
- CVE-2019-20503: Fixed an out of bounds read in usersctplib.
- CVE-2020-6449: Fixed a use after free in audio.
This update was imported from the openSUSE:Leap:15.1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-389=1
Package List:
- openSUSE Backports SLE-15-SP1 (aarch64 x86_64):
chromedriver-80.0.3987.149-bp151.3.63.3
chromium-80.0.3987.149-bp151.3.63.3
References:
https://www.suse.com/security/cve/CVE-2019-20503.html
https://www.suse.com/security/cve/CVE-2020-6422.html
https://www.suse.com/security/cve/CVE-2020-6424.html
https://www.suse.com/security/cve/CVE-2020-6425.html
https://www.suse.com/security/cve/CVE-2020-6426.html
https://www.suse.com/security/cve/CVE-2020-6427.html
https://www.suse.com/security/cve/CVE-2020-6428.html
https://www.suse.com/security/cve/CVE-2020-6429.html
https://www.suse.com/security/cve/CVE-2020-6449.html
https://bugzilla.suse.com/1167090
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0376-1: moderate: Security update for apache2-mod_auth_openidc
by opensuse-security@opensuse.org 25 Mar '20
by opensuse-security@opensuse.org 25 Mar '20
25 Mar '20
openSUSE Security Update: Security update for apache2-mod_auth_openidc
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0376-1
Rating: moderate
References: #1164459
Cross-References: CVE-2019-20479
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for apache2-mod_auth_openidc fixes the following issues:
- CVE-2019-20479: Fixed an open redirect issue in URLs with slash and
backslash (bsc#1164459).
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-376=1
Package List:
- openSUSE Leap 15.1 (x86_64):
apache2-mod_auth_openidc-2.3.8-lp151.2.6.1
apache2-mod_auth_openidc-debuginfo-2.3.8-lp151.2.6.1
apache2-mod_auth_openidc-debugsource-2.3.8-lp151.2.6.1
References:
https://www.suse.com/security/cve/CVE-2019-20479.html
https://bugzilla.suse.com/1164459
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0

[security-announce] openSUSE-SU-2020:0377-1: moderate: Security update for skopeo
by opensuse-security@opensuse.org 25 Mar '20
by opensuse-security@opensuse.org 25 Mar '20
25 Mar '20
openSUSE Security Update: Security update for skopeo
______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:0377-1
Rating: moderate
References: #1159530 #1165715
Cross-References: CVE-2019-10214
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for skopeo fixes the following issues:
Update to skopeo v0.1.41 (bsc#1165715):
- Bump github.com/containers/image/v5 from 5.2.0 to 5.2.1
- Bump gopkg.in/yaml.v2 from 2.2.7 to 2.2.8
- Bump github.com/containers/common from 0.0.7 to 0.1.4
- Remove the reference to openshift/api
- vendor github.com/containers/image/v5@v5.2.0
- Manually update buildah to v1.13.1
- add specific authfile options to copy (and sync) command.
- Bump github.com/containers/buildah from 1.11.6 to 1.12.0
- Add context to --encryption-key / --decryption-key processing failures
- Bump github.com/containers/storage from 1.15.2 to 1.15.3
- Bump github.com/containers/buildah from 1.11.5 to 1.11.6
- remove direct reference on c/image/storage
- Makefile: set GOBIN
- Bump gopkg.in/yaml.v2 from 2.2.2 to 2.2.7
- Bump github.com/containers/storage from 1.15.1 to 1.15.2
- Introduce the sync command
- openshift cluster: remove .docker directory on teardown
- Bump github.com/containers/storage from 1.14.0 to 1.15.1
- document installation via apk on alpine
- Fix typos in doc for image encryption
- Image encryption/decryption support in skopeo
- make vendor-in-container
- Bump github.com/containers/buildah from 1.11.4 to 1.11.5
- Travis: use go v1.13
- Use a Windows Nano Server image instead of Server Core for multi-arch
testing
- Increase test timeout to 15 minutes
- Run the test-system container without --net=host
- Mount /run/systemd/journal/socket into test-system containers
- Don't unnecessarily filter out vendor from (go list ./...)
output
- Use -mod=vendor in (go {list,test,vet})
- Bump github.com/containers/buildah from 1.8.4 to 1.11.4
- Bump github.com/urfave/cli from 1.20.0 to 1.22.1
- skopeo: drop support for ostree
- Don't critically fail on a 403 when listing tags
- Revert "Temporarily work around auth.json location confusion"
- Remove references to atomic
- Remove references to storage.conf
- Dockerfile: use golang-github-cpuguy83-go-md2man
- bump version to v0.1.41-dev
- systemtest: inspect container image different from current platform arch
Changes in v0.1.40:
- vendor containers/image v5.0.0
- copy: add a --all/-a flag
- System tests: various fixes
- Temporarily work around auth.json location confusion
- systemtest: copy: docker->storage->oci-archive
- systemtest/010-inspect.bats: require only PATH
- systemtest: add simple env test in inspect.bats
- bash completion: add comments to keep scattered options in sync
- bash completion: use read -r instead of disabling SC2207
- bash completion: support --opt arg completion
- bash-completion: use replacement instead of sed
- bash completion: disable shellcheck SC2207
- bash completion: double-quote to avoid re-splitting
- bash completions: use bash replacement instead of sed
- bash completion: remove unused variable
- bash-completions: split decl and assignment to avoid masking retvals
- bash completion: double-quote fixes
- bash completion: hard-set PROG=skopeo
- bash completion: remove unused variable
- bash completion: use `||` instead of `-o`
- bash completion: rm eval on assigned variable
- copy: add --dest-compress-format and --dest-compress-level
- flag: add optionalIntValue
- Makefile: use go proxy
- inspect --raw: skip the NewImage() step
- update OCI image-spec to 775207bd45b6cb8153ce218cc59351799217451f
- inspect.go: inspect env variables
- ostree: use both image and & storage buildtags
Update to skopeo v0.1.39 (bsc#1159530):
- inspect: add a --config flag
- Add --no-creds flag to skopeo inspect
- Add --quiet option to skopeo copy
- New progress bars
- Parallel Pulls and Pushes for major speed improvements
- containers/image moved to a new progress-bar library to fix various
issues related to overlapping bars and redundant entries.
- enforce blocking of registries
- Allow storage-multiple-manifests
- When copying images and the output is not a tty (e.g., when piping to a
file) print single lines instead of using progress bars. This avoids
long and hard to parse output
- man pages: add --dest-oci-accept-uncompressed-layers
- completions:
- Introduce transports completions
- Fix bash completions when a option requires a argument
- Use only spaces in indent
- Fix completions with a global option
- add --dest-oci-accept-uncompressed-layers
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-377=1
Package List:
- openSUSE Leap 15.1 (x86_64):
skopeo-0.1.41-lp151.2.6.1
skopeo-debuginfo-0.1.41-lp151.2.6.1
References:
https://www.suse.com/security/cve/CVE-2019-10214.html
https://bugzilla.suse.com/1159530
https://bugzilla.suse.com/1165715
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe(a)opensuse.org
For additional commands, e-mail: opensuse-security-announce+help(a)opensuse.org
1
0