openSUSE Recommended Update: Recommended update for xfsprogs
______________________________________________________________________________
Announcement ID: openSUSE-RU-2021:1325-1
Rating: moderate
References: #1085917 #1181299 #1181306 #1181309 #1181535
#1181536 #1188651 #1189552 SLE-20360
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that has 8 recommended fixes and contains one
feature can now be installed.
Description:
This update for xfsprogs fixes the following issues:
- Fixes an issue when 'fstests' with 'xfs' fail. (bsc#1181309, bsc#1181299)
- xfsprogs: Split 'libhandle1' into a separate package, since nothing
within xfsprogs dynamically links against it. The shared library is
still required by xfsdump as a runtime dependency.
- mkfs.xfs: Fix 'ASSERT' on too-small device with stripe geometry.
(bsc#1181536)
- mkfs.xfs: If either 'sunit' or 'swidth' is not zero, the other must be
as well. (bsc#1085917, bsc#1181535)
- xfs_growfs: Refactor geometry reporting. (bsc#1181306)
- xfs_growfs: Allow mounted device node as argument. (bsc#1181299)
- xfs_repair: Rebuild directory when non-root leafn blocks claim block 0.
(bsc#1181309)
- xfs_repair: Check plausibility of root dir pointer before trashing it.
(bsc#1188651)
- xfs_bmap: Remove '-c' from manpage. (bsc#1189552)
- xfs_bmap: Do not reject '-e'. (bsc#1189552)
- Implement 'libhandle1' through ECO. (jsc#SLE-20360)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1325=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
libhandle1-4.15.0-lp152.12.3.1
libhandle1-debuginfo-4.15.0-lp152.12.3.1
xfsprogs-4.15.0-lp152.12.3.1
xfsprogs-debuginfo-4.15.0-lp152.12.3.1
xfsprogs-debugsource-4.15.0-lp152.12.3.1
xfsprogs-devel-4.15.0-lp152.12.3.1
References:
https://bugzilla.suse.com/1085917https://bugzilla.suse.com/1181299https://bugzilla.suse.com/1181306https://bugzilla.suse.com/1181309https://bugzilla.suse.com/1181535https://bugzilla.suse.com/1181536https://bugzilla.suse.com/1188651https://bugzilla.suse.com/1189552
openSUSE Feature Update: Feature update for SUSE Manager 4.1.11 Proxy
______________________________________________________________________________
Announcement ID: openSUSE-FU-2021:3262-1
Rating: moderate
References:
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has 0 feature fixes can now be installed.
Description:
This update provides the following packages to SUSE Manager 4.1.11 Proxy
golang-github-prometheus-prometheus:
- golang-github-prometheus-prometheus is added to SUSE Manager Proxy as L3
supported
Patch Instructions:
To install this openSUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3262=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
golang-github-prometheus-prometheus-2.27.1-3.12.1
References:
openSUSE Feature Update: Feature update for SUSE Manager 4.1.11 Proxy
______________________________________________________________________________
Announcement ID: openSUSE-FU-2021:3263-1
Rating: moderate
References:
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has 0 feature fixes can now be installed.
Description:
This update provides the following packages to SUSE Manager 4.1.11 Proxy
golang-github-prometheus-alertmanager:
- golang-github-prometheus-alertmanager is added to SUSE Manager Proxy as
L3 supported
system-user-prometheus:
- system-user-prometheus is added to SUSE Manager Proxy as L3 supported
Patch Instructions:
To install this openSUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3263=1
Package List:
- openSUSE Leap 15.3 (noarch):
system-user-prometheus-1.0.0-6.1
References:
openSUSE Recommended Update: Recommended update for docker
______________________________________________________________________________
Announcement ID: openSUSE-RU-2021:1324-1
Rating: important
References: #1190670
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for docker fixes the following issues:
- Return ENOSYS for clone3 in the seccomp profile to avoid breaking
containers using glibc 2.34.
- Add shell requires for the *-completion subpackages.
This update was imported from SUSE:SLE-15:Update.
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1324=1
Package List:
- openSUSE Leap 15.2 (noarch):
docker-bash-completion-20.10.6_ce-lp152.2.15.1
docker-fish-completion-20.10.6_ce-lp152.2.15.1
docker-zsh-completion-20.10.6_ce-lp152.2.15.1
- openSUSE Leap 15.2 (x86_64):
docker-20.10.6_ce-lp152.2.15.1
docker-debuginfo-20.10.6_ce-lp152.2.15.1
References:
https://bugzilla.suse.com/1190670
openSUSE Security Update: Security update for postgresql13
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3255-1
Rating: moderate
References: #1179945 #1185952 #1187751 #1189748
Cross-References: CVE-2021-3677
CVSS scores:
CVE-2021-3677 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for postgresql13 fixes the following issues:
- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).
- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang
optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround
(bsc#1185952).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3255=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libecpg6-13.4-5.16.2
libecpg6-debuginfo-13.4-5.16.2
libpq5-13.4-5.16.2
libpq5-debuginfo-13.4-5.16.2
postgresql13-13.4-5.16.2
postgresql13-contrib-13.4-5.16.2
postgresql13-contrib-debuginfo-13.4-5.16.2
postgresql13-debuginfo-13.4-5.16.2
postgresql13-debugsource-13.4-5.16.1
postgresql13-debugsource-13.4-5.16.2
postgresql13-devel-13.4-5.16.2
postgresql13-devel-debuginfo-13.4-5.16.2
postgresql13-llvmjit-13.4-5.16.2
postgresql13-llvmjit-debuginfo-13.4-5.16.2
postgresql13-plperl-13.4-5.16.2
postgresql13-plperl-debuginfo-13.4-5.16.2
postgresql13-plpython-13.4-5.16.2
postgresql13-plpython-debuginfo-13.4-5.16.2
postgresql13-pltcl-13.4-5.16.2
postgresql13-pltcl-debuginfo-13.4-5.16.2
postgresql13-server-13.4-5.16.2
postgresql13-server-debuginfo-13.4-5.16.2
postgresql13-server-devel-13.4-5.16.2
postgresql13-server-devel-debuginfo-13.4-5.16.2
postgresql13-test-13.4-5.16.2
- openSUSE Leap 15.3 (noarch):
postgresql13-docs-13.4-5.16.2
- openSUSE Leap 15.3 (x86_64):
libecpg6-32bit-13.4-5.16.2
libecpg6-32bit-debuginfo-13.4-5.16.2
libpq5-32bit-13.4-5.16.2
libpq5-32bit-debuginfo-13.4-5.16.2
References:
https://www.suse.com/security/cve/CVE-2021-3677.htmlhttps://bugzilla.suse.com/1179945https://bugzilla.suse.com/1185952https://bugzilla.suse.com/1187751https://bugzilla.suse.com/1189748
openSUSE Security Update: Security update for postgresql12
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:3256-1
Rating: moderate
References: #1179945 #1185952 #1187751 #1189748
Cross-References: CVE-2021-3677
CVSS scores:
CVE-2021-3677 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
This update for postgresql12 fixes the following issues:
- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).
- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang
optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround
(bsc#1185952).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2021-3256=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
postgresql12-12.8-8.23.2
postgresql12-contrib-12.8-8.23.2
postgresql12-contrib-debuginfo-12.8-8.23.2
postgresql12-debuginfo-12.8-8.23.2
postgresql12-debugsource-12.8-8.23.2
postgresql12-devel-12.8-8.23.2
postgresql12-devel-debuginfo-12.8-8.23.2
postgresql12-llvmjit-12.8-8.23.2
postgresql12-llvmjit-debuginfo-12.8-8.23.2
postgresql12-plperl-12.8-8.23.2
postgresql12-plperl-debuginfo-12.8-8.23.2
postgresql12-plpython-12.8-8.23.2
postgresql12-plpython-debuginfo-12.8-8.23.2
postgresql12-pltcl-12.8-8.23.2
postgresql12-pltcl-debuginfo-12.8-8.23.2
postgresql12-server-12.8-8.23.2
postgresql12-server-debuginfo-12.8-8.23.2
postgresql12-server-devel-12.8-8.23.2
postgresql12-server-devel-debuginfo-12.8-8.23.2
postgresql12-test-12.8-8.23.2
- openSUSE Leap 15.3 (noarch):
postgresql12-docs-12.8-8.23.2
References:
https://www.suse.com/security/cve/CVE-2021-3677.htmlhttps://bugzilla.suse.com/1179945https://bugzilla.suse.com/1185952https://bugzilla.suse.com/1187751https://bugzilla.suse.com/1189748
openSUSE Recommended Update: Recommended update for ServiceReport
______________________________________________________________________________
Announcement ID: openSUSE-RU-2021:1323-1
Rating: moderate
References: SLE-18193
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that has 0 recommended fixes and contains one
feature can now be installed.
Description:
This update for ServiceReport fixes the following issues:
Update to version 2.2.3+git1.55a13db1c256:
* [fadump] Update crashkernel recommendation (tid#7023277).
Added hardening to systemd service(s).
Update to version 2.2.3 (jsc#SLE-18193):
* ServiceReport v2.2.3 release
* [Daemon] check active status along with enabled
* Run-on supported architectures only
* Take crashkernel recommendation from kdump-lib.sh scripts
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1323=1
Package List:
- openSUSE Leap 15.2 (noarch):
ServiceReport-2.2.3+git1.55a13db1c256-lp152.8.1
References:
openSUSE Recommended Update: Recommended update for Leap-release
______________________________________________________________________________
Announcement ID: openSUSE-RU-2021:1321-1
Rating: low
References: #1187214
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
Leap-release was updated to fix:
- Add %sle_version rpm macro as is in SUSE Linux Enterprise (bsc#1187214).
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2021-1321=1
Package List:
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
openSUSE-Addon-NonOss-release-15.3-lp153.149.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
openSUSE-release-15.3-lp153.149.1
openSUSE-release-appliance-custom-15.3-lp153.149.1
openSUSE-release-appliance-docker-15.3-lp153.149.1
openSUSE-release-appliance-hyperv-15.3-lp153.149.1
openSUSE-release-appliance-kvm-15.3-lp153.149.1
openSUSE-release-appliance-openstack-15.3-lp153.149.1
openSUSE-release-appliance-vmware-15.3-lp153.149.1
openSUSE-release-appliance-wsl-15.3-lp153.149.1
openSUSE-release-dvd-15.3-lp153.149.1
openSUSE-release-ftp-15.3-lp153.149.1
openSUSE-release-livecd-gnome-15.3-lp153.149.1
openSUSE-release-livecd-kde-15.3-lp153.149.1
openSUSE-release-livecd-x11-15.3-lp153.149.1
openSUSE-release-livecd-xfce-15.3-lp153.149.1
openSUSE-release-mini-15.3-lp153.149.1
openSUSE-release-usb-gnome-15.3-lp153.149.1
openSUSE-release-usb-kde-15.3-lp153.149.1
openSUSE-release-usb-x11-15.3-lp153.149.1
openSUSE-release-usb-xfce-15.3-lp153.149.1
References:
https://bugzilla.suse.com/1187214
openSUSE Recommended Update: Recommended update for rpm-repos-openSUSE
______________________________________________________________________________
Announcement ID: openSUSE-RU-2021:1322-1
Rating: moderate
References: #1189892
Affected Products:
openSUSE Leap 15.3
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for rpm-repos-openSUSE fixes the following issues:
- Fix GPG key references for updates from openSUSE backports (boo#1189892)
Patch Instructions:
To install this openSUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-2021-1322=1
Package List:
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
rpm-repos-openSUSE-Leap-1500-lp153.2.6.2
rpm-repos-openSUSE-Tumbleweed-1500-lp153.2.6.2
- openSUSE Leap 15.3 (noarch):
openSUSE-build-key-1.0-lp153.4.2.1
rpm-repo-keys-openSUSE-0-lp153.2.6.2
References:
https://bugzilla.suse.com/1189892
openSUSE Security Update: Security update for hivex
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:1319-1
Rating: moderate
References: #1189060
Cross-References: CVE-2021-3622
CVSS scores:
CVE-2021-3622 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for hivex fixes the following issues:
- CVE-2021-3622: Fixed stack overflow due to recursive call of
_get_children() (bsc#1189060).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-1319=1
Package List:
- openSUSE Leap 15.2 (x86_64):
hivex-1.3.14-lp152.4.6.1
hivex-debuginfo-1.3.14-lp152.4.6.1
hivex-debugsource-1.3.14-lp152.4.6.1
hivex-devel-1.3.14-lp152.4.6.1
libhivex0-1.3.14-lp152.4.6.1
libhivex0-debuginfo-1.3.14-lp152.4.6.1
ocaml-hivex-1.3.14-lp152.4.6.1
ocaml-hivex-debuginfo-1.3.14-lp152.4.6.1
ocaml-hivex-devel-1.3.14-lp152.4.6.1
perl-Win-Hivex-1.3.14-lp152.4.6.1
perl-Win-Hivex-debuginfo-1.3.14-lp152.4.6.1
python-hivex-1.3.14-lp152.4.6.1
python-hivex-debuginfo-1.3.14-lp152.4.6.1
- openSUSE Leap 15.2 (noarch):
hivex-lang-1.3.14-lp152.4.6.1
References:
https://www.suse.com/security/cve/CVE-2021-3622.htmlhttps://bugzilla.suse.com/1189060