openSUSE Updates
Threads by month
- ----- 2024 -----
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
June 2022
- 2 participants
- 123 discussions
08 Jun '22
SUSE Recommended Update: Recommended update for gcc11
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2019-1
Rating: moderate
References: #1192951 #1193659 #1195283 #1196861 #1197065
OBS-124
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 5 recommended fixes and contains one
feature can now be installed.
Description:
This update for gcc11 fixes the following issues:
Update to the GCC 11.3.0 release.
* includes SLS hardening backport on x86_64. [bsc#1195283]
* includes change to adjust gnats idea of the target, fixing the build of
gprbuild. [bsc#1196861]
* fixed miscompile of embedded premake in 0ad on i586. [bsc#1197065]
* use --with-cpu rather than specifying --with-arch/--with-tune
* Fix D memory corruption in -M output.
* Fix ICE in is_this_parameter with coroutines. [bsc#1193659]
* fixes issue with debug dumping together with -o /dev/null
* fixes libgccjit issue showing up in emacs build [bsc#1192951]
* Package mwaitintrin.h
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2019=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2019=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2019=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2019=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2019=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2019=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2019=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2019=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
cpp11-11.3.0+git1637-150000.1.9.1
cpp11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-sparcv9-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
gcc11-11.3.0+git1637-150000.1.9.1
gcc11-PIE-11.3.0+git1637-150000.1.9.1
gcc11-ada-11.3.0+git1637-150000.1.9.1
gcc11-ada-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-c++-11.3.0+git1637-150000.1.9.1
gcc11-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
gcc11-fortran-11.3.0+git1637-150000.1.9.1
gcc11-fortran-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-go-11.3.0+git1637-150000.1.9.1
gcc11-go-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-locale-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-objc-11.3.0+git1637-150000.1.9.1
gcc11-objc-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-testresults-11.3.0+git1637-150000.1.9.1
libada11-11.3.0+git1637-150000.1.9.1
libada11-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-11.3.0+git1637-150000.1.9.1
libasan6-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-11.3.0+git1637-150000.1.9.1
libatomic1-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-11.3.0+git1637-150000.1.9.1
libgfortran5-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-11.3.0+git1637-150000.1.9.1
libgo19-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-11.3.0+git1637-150000.1.9.1
libgomp1-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-11.3.0+git1637-150000.1.9.1
libitm1-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-11.3.0+git1637-150000.1.9.1
libobjc4-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-11.3.0+git1637-150000.1.9.1
libstdc++6-locale-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-11.3.0+git1637-150000.1.9.1
libubsan1-11.3.0+git1637-150000.1.9.1
libubsan1-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (aarch64 ppc64le x86_64):
cross-s390x-gcc11-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
liblsan0-11.3.0+git1637-150000.1.9.1
liblsan0-debuginfo-11.3.0+git1637-150000.1.9.1
libtsan0-11.3.0+git1637-150000.1.9.1
libtsan0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x):
cross-x86_64-gcc11-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (ppc64le s390x x86_64):
cross-aarch64-gcc11-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (aarch64 s390x x86_64):
cross-ppc64le-gcc11-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
gcc11-d-11.3.0+git1637-150000.1.9.1
gcc11-d-debuginfo-11.3.0+git1637-150000.1.9.1
libgdruntime2-11.3.0+git1637-150000.1.9.1
libgdruntime2-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-11.3.0+git1637-150000.1.9.1
libgphobos2-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (ppc64le x86_64):
libquadmath0-11.3.0+git1637-150000.1.9.1
libquadmath0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (s390x x86_64):
gcc11-32bit-11.3.0+git1637-150000.1.9.1
gcc11-ada-32bit-11.3.0+git1637-150000.1.9.1
gcc11-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-d-32bit-11.3.0+git1637-150000.1.9.1
gcc11-fortran-32bit-11.3.0+git1637-150000.1.9.1
gcc11-go-32bit-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-objc-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-32bit-11.3.0+git1637-150000.1.9.1
libasan6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgdruntime2-32bit-11.3.0+git1637-150000.1.9.1
libgdruntime2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-32bit-11.3.0+git1637-150000.1.9.1
libgo19-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-32bit-11.3.0+git1637-150000.1.9.1
libitm1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (aarch64):
libhwasan0-11.3.0+git1637-150000.1.9.1
libhwasan0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (x86_64):
cross-nvptx-gcc11-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-nvptx-newlib11-devel-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.4 (noarch):
gcc11-info-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
cpp11-11.3.0+git1637-150000.1.9.1
cpp11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-arm-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-arm-none-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-avr-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-epiphany-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-hppa-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-m68k-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-mips-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-ppc64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-elf-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-riscv64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-rx-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-sparc-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-sparc64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
cross-sparcv9-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
gcc11-11.3.0+git1637-150000.1.9.1
gcc11-PIE-11.3.0+git1637-150000.1.9.1
gcc11-ada-11.3.0+git1637-150000.1.9.1
gcc11-ada-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-c++-11.3.0+git1637-150000.1.9.1
gcc11-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
gcc11-fortran-11.3.0+git1637-150000.1.9.1
gcc11-fortran-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-go-11.3.0+git1637-150000.1.9.1
gcc11-go-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-locale-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-objc-11.3.0+git1637-150000.1.9.1
gcc11-objc-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-testresults-11.3.0+git1637-150000.1.9.1
libada11-11.3.0+git1637-150000.1.9.1
libada11-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-11.3.0+git1637-150000.1.9.1
libasan6-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-11.3.0+git1637-150000.1.9.1
libatomic1-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-11.3.0+git1637-150000.1.9.1
libgfortran5-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-11.3.0+git1637-150000.1.9.1
libgo19-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-11.3.0+git1637-150000.1.9.1
libgomp1-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-11.3.0+git1637-150000.1.9.1
libitm1-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-11.3.0+git1637-150000.1.9.1
libobjc4-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-11.3.0+git1637-150000.1.9.1
libstdc++6-locale-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-11.3.0+git1637-150000.1.9.1
libubsan1-11.3.0+git1637-150000.1.9.1
libubsan1-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le x86_64):
cross-s390x-gcc11-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-s390x-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
liblsan0-11.3.0+git1637-150000.1.9.1
liblsan0-debuginfo-11.3.0+git1637-150000.1.9.1
libtsan0-11.3.0+git1637-150000.1.9.1
libtsan0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x):
cross-x86_64-gcc11-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-x86_64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (ppc64le s390x x86_64):
cross-aarch64-gcc11-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-debuginfo-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-bootstrap-debugsource-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-aarch64-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (aarch64 s390x x86_64):
cross-ppc64le-gcc11-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-ppc64le-gcc11-icecream-backend-11.3.0+git1637-150000.1.9.1
gcc11-d-11.3.0+git1637-150000.1.9.1
gcc11-d-debuginfo-11.3.0+git1637-150000.1.9.1
libgdruntime2-11.3.0+git1637-150000.1.9.1
libgdruntime2-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-11.3.0+git1637-150000.1.9.1
libgphobos2-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (ppc64le x86_64):
libquadmath0-11.3.0+git1637-150000.1.9.1
libquadmath0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (s390x x86_64):
gcc11-32bit-11.3.0+git1637-150000.1.9.1
gcc11-ada-32bit-11.3.0+git1637-150000.1.9.1
gcc11-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-d-32bit-11.3.0+git1637-150000.1.9.1
gcc11-fortran-32bit-11.3.0+git1637-150000.1.9.1
gcc11-go-32bit-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-objc-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-32bit-11.3.0+git1637-150000.1.9.1
libasan6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgdruntime2-32bit-11.3.0+git1637-150000.1.9.1
libgdruntime2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-32bit-11.3.0+git1637-150000.1.9.1
libgo19-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-32bit-11.3.0+git1637-150000.1.9.1
libitm1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (aarch64):
libhwasan0-11.3.0+git1637-150000.1.9.1
libhwasan0-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (x86_64):
cross-nvptx-gcc11-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-nvptx-newlib11-devel-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- openSUSE Leap 15.3 (noarch):
gcc11-info-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
cpp11-11.3.0+git1637-150000.1.9.1
cpp11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-11.3.0+git1637-150000.1.9.1
gcc11-PIE-11.3.0+git1637-150000.1.9.1
gcc11-ada-11.3.0+git1637-150000.1.9.1
gcc11-ada-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-c++-11.3.0+git1637-150000.1.9.1
gcc11-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
gcc11-fortran-11.3.0+git1637-150000.1.9.1
gcc11-fortran-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-go-11.3.0+git1637-150000.1.9.1
gcc11-go-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-locale-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64):
libhwasan0-11.3.0+git1637-150000.1.9.1
libhwasan0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (x86_64):
cross-nvptx-gcc11-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
cross-nvptx-gcc11-debugsource-11.3.0+git1637-150000.1.9.1
cross-nvptx-newlib11-devel-11.3.0+git1637-150000.1.9.1
gcc11-32bit-11.3.0+git1637-150000.1.9.1
gcc11-ada-32bit-11.3.0+git1637-150000.1.9.1
gcc11-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-fortran-32bit-11.3.0+git1637-150000.1.9.1
gcc11-go-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-32bit-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch):
gcc11-info-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
cpp11-11.3.0+git1637-150000.1.9.1
cpp11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-11.3.0+git1637-150000.1.9.1
gcc11-PIE-11.3.0+git1637-150000.1.9.1
gcc11-ada-11.3.0+git1637-150000.1.9.1
gcc11-ada-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-c++-11.3.0+git1637-150000.1.9.1
gcc11-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
gcc11-fortran-11.3.0+git1637-150000.1.9.1
gcc11-fortran-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-go-11.3.0+git1637-150000.1.9.1
gcc11-go-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-locale-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-objc-11.3.0+git1637-150000.1.9.1
gcc11-objc-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-testresults-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 s390x x86_64):
gcc11-d-11.3.0+git1637-150000.1.9.1
gcc11-d-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (x86_64):
gcc11-32bit-11.3.0+git1637-150000.1.9.1
gcc11-ada-32bit-11.3.0+git1637-150000.1.9.1
gcc11-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-d-32bit-11.3.0+git1637-150000.1.9.1
gcc11-fortran-32bit-11.3.0+git1637-150000.1.9.1
gcc11-go-32bit-11.3.0+git1637-150000.1.9.1
gcc11-obj-c++-32bit-11.3.0+git1637-150000.1.9.1
gcc11-objc-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-32bit-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch):
gcc11-info-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
libada11-11.3.0+git1637-150000.1.9.1
libada11-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-11.3.0+git1637-150000.1.9.1
libasan6-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-11.3.0+git1637-150000.1.9.1
libatomic1-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-11.3.0+git1637-150000.1.9.1
libgfortran5-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-11.3.0+git1637-150000.1.9.1
libgo19-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-11.3.0+git1637-150000.1.9.1
libgomp1-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-11.3.0+git1637-150000.1.9.1
libitm1-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-11.3.0+git1637-150000.1.9.1
libobjc4-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-11.3.0+git1637-150000.1.9.1
libstdc++6-locale-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-11.3.0+git1637-150000.1.9.1
libubsan1-11.3.0+git1637-150000.1.9.1
libubsan1-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le x86_64):
liblsan0-11.3.0+git1637-150000.1.9.1
liblsan0-debuginfo-11.3.0+git1637-150000.1.9.1
libtsan0-11.3.0+git1637-150000.1.9.1
libtsan0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (ppc64le x86_64):
libquadmath0-11.3.0+git1637-150000.1.9.1
libquadmath0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
libada11-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-32bit-11.3.0+git1637-150000.1.9.1
libasan6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-32bit-11.3.0+git1637-150000.1.9.1
libgo19-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-32bit-11.3.0+git1637-150000.1.9.1
libitm1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libada11-11.3.0+git1637-150000.1.9.1
libada11-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-11.3.0+git1637-150000.1.9.1
libasan6-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-11.3.0+git1637-150000.1.9.1
libatomic1-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-11.3.0+git1637-150000.1.9.1
libgfortran5-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-11.3.0+git1637-150000.1.9.1
libgo19-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-11.3.0+git1637-150000.1.9.1
libgomp1-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-11.3.0+git1637-150000.1.9.1
libitm1-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-11.3.0+git1637-150000.1.9.1
libobjc4-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-devel-gcc11-11.3.0+git1637-150000.1.9.1
libstdc++6-locale-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-11.3.0+git1637-150000.1.9.1
libubsan1-11.3.0+git1637-150000.1.9.1
libubsan1-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le x86_64):
liblsan0-11.3.0+git1637-150000.1.9.1
liblsan0-debuginfo-11.3.0+git1637-150000.1.9.1
libtsan0-11.3.0+git1637-150000.1.9.1
libtsan0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 s390x x86_64):
libgdruntime2-11.3.0+git1637-150000.1.9.1
libgdruntime2-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-11.3.0+git1637-150000.1.9.1
libgphobos2-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (ppc64le x86_64):
libquadmath0-11.3.0+git1637-150000.1.9.1
libquadmath0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (s390x x86_64):
libada11-32bit-11.3.0+git1637-150000.1.9.1
libada11-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libasan6-32bit-11.3.0+git1637-150000.1.9.1
libasan6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-11.3.0+git1637-150000.1.9.1
libatomic1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-11.3.0+git1637-150000.1.9.1
libgcc_s1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-11.3.0+git1637-150000.1.9.1
libgfortran5-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-11.3.0+git1637-150000.1.9.1
libgomp1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libitm1-32bit-11.3.0+git1637-150000.1.9.1
libitm1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-11.3.0+git1637-150000.1.9.1
libstdc++6-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-11.3.0+git1637-150000.1.9.1
libubsan1-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64):
libhwasan0-11.3.0+git1637-150000.1.9.1
libhwasan0-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
libgdruntime2-32bit-11.3.0+git1637-150000.1.9.1
libgdruntime2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgo19-32bit-11.3.0+git1637-150000.1.9.1
libgo19-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-11.3.0+git1637-150000.1.9.1
libgphobos2-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-11.3.0+git1637-150000.1.9.1
libobjc4-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-11.3.0+git1637-150000.1.9.1
libquadmath0-32bit-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-pp-gcc11-32bit-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (s390x):
libstdc++6-devel-gcc11-32bit-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
gcc11-debuginfo-11.3.0+git1637-150000.1.9.1
gcc11-debugsource-11.3.0+git1637-150000.1.9.1
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libgcc_s1-11.3.0+git1637-150000.1.9.1
libgcc_s1-debuginfo-11.3.0+git1637-150000.1.9.1
libstdc++6-11.3.0+git1637-150000.1.9.1
libstdc++6-debuginfo-11.3.0+git1637-150000.1.9.1
References:
https://bugzilla.suse.com/1192951
https://bugzilla.suse.com/1193659
https://bugzilla.suse.com/1195283
https://bugzilla.suse.com/1196861
https://bugzilla.suse.com/1197065
1
0
08 Jun '22
SUSE Recommended Update: Recommended update for vulkan
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2016-1
Rating: low
References: #1197862
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for vulkan fixes the following issue:
- Disable RPATH to make the inherited package run on SLE-15-SP4.
(bsc#1197862)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2016=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2016=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2016=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2016=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
vulkan-1.0.65.0-150000.5.3.1
vulkan-debuginfo-1.0.65.0-150000.5.3.1
vulkan-debugsource-1.0.65.0-150000.5.3.1
- openSUSE Leap 15.4 (x86_64):
vulkan-devel-32bit-1.0.65.0-150000.5.3.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
vulkan-1.0.65.0-150000.5.3.1
vulkan-debuginfo-1.0.65.0-150000.5.3.1
vulkan-debugsource-1.0.65.0-150000.5.3.1
- openSUSE Leap 15.3 (x86_64):
vulkan-devel-32bit-1.0.65.0-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
vulkan-1.0.65.0-150000.5.3.1
vulkan-debuginfo-1.0.65.0-150000.5.3.1
vulkan-debugsource-1.0.65.0-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
vulkan-1.0.65.0-150000.5.3.1
vulkan-debuginfo-1.0.65.0-150000.5.3.1
vulkan-debugsource-1.0.65.0-150000.5.3.1
References:
https://bugzilla.suse.com/1197862
1
0
SUSE Recommended Update: Recommended update for icewm
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2017-1
Rating: low
References: #1197729
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for icewm fixes the following issues:
- A later glib2 update will cause icewm fail to build. (bsc#1197729)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2017=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2017=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2017=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2017=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
icewm-1.4.2-150000.7.15.1
icewm-debuginfo-1.4.2-150000.7.15.1
icewm-debugsource-1.4.2-150000.7.15.1
icewm-default-1.4.2-150000.7.15.1
icewm-default-debuginfo-1.4.2-150000.7.15.1
icewm-lite-1.4.2-150000.7.15.1
icewm-lite-debuginfo-1.4.2-150000.7.15.1
- openSUSE Leap 15.4 (noarch):
icewm-config-upstream-1.4.2-150000.7.15.1
icewm-lang-1.4.2-150000.7.15.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
icewm-1.4.2-150000.7.15.1
icewm-debuginfo-1.4.2-150000.7.15.1
icewm-debugsource-1.4.2-150000.7.15.1
icewm-default-1.4.2-150000.7.15.1
icewm-default-debuginfo-1.4.2-150000.7.15.1
icewm-lite-1.4.2-150000.7.15.1
icewm-lite-debuginfo-1.4.2-150000.7.15.1
- openSUSE Leap 15.3 (noarch):
icewm-config-upstream-1.4.2-150000.7.15.1
icewm-lang-1.4.2-150000.7.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
icewm-1.4.2-150000.7.15.1
icewm-debuginfo-1.4.2-150000.7.15.1
icewm-debugsource-1.4.2-150000.7.15.1
icewm-default-1.4.2-150000.7.15.1
icewm-default-debuginfo-1.4.2-150000.7.15.1
icewm-lite-1.4.2-150000.7.15.1
icewm-lite-debuginfo-1.4.2-150000.7.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
icewm-lang-1.4.2-150000.7.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
icewm-1.4.2-150000.7.15.1
icewm-debuginfo-1.4.2-150000.7.15.1
icewm-debugsource-1.4.2-150000.7.15.1
icewm-default-1.4.2-150000.7.15.1
icewm-default-debuginfo-1.4.2-150000.7.15.1
icewm-lite-1.4.2-150000.7.15.1
icewm-lite-debuginfo-1.4.2-150000.7.15.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
icewm-lang-1.4.2-150000.7.15.1
References:
https://bugzilla.suse.com/1197729
1
0
SUSE-RU-2022:2014-1: moderate: Recommended update for scap-security-guide
by maintenance@opensuse.org 07 Jun '22
by maintenance@opensuse.org 07 Jun '22
07 Jun '22
SUSE Recommended Update: Recommended update for scap-security-guide
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2014-1
Rating: moderate
References: ECO-3319
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has 0 recommended fixes and contains one
feature can now be installed.
Description:
This update for scap-security-guide fixes the following issues:
scap-security-guide was updated to 0.1.61 (jsc#ECO-3319):
- Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7
- Introduce OL9 product
- Implement handling of logical expressions in platform definitions
Please note that SUSE supports only the DISA STIG, HIPAA and PCI-DSS
profiles for SUSE Linux Enterprise Server 12 and 15.
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2014=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2014=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2014=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2014=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2014=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2014=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2014=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-2014=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2014=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2014=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2014=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2014=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-2014=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2014=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2014=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2014=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2014=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2014=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- openSUSE Leap 15.3 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Manager Server 4.1 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Manager Proxy 4.1 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Enterprise Storage 7 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE Enterprise Storage 6 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
- SUSE CaaS Platform 4.0 (noarch):
scap-security-guide-0.1.61-150000.1.32.1
scap-security-guide-debian-0.1.61-150000.1.32.1
scap-security-guide-redhat-0.1.61-150000.1.32.1
scap-security-guide-ubuntu-0.1.61-150000.1.32.1
References:
1
0
SUSE-SU-2022:2004-1: important: Security update for go1.17
by opensuse-security@opensuse.org 07 Jun '22
by opensuse-security@opensuse.org 07 Jun '22
07 Jun '22
SUSE Security Update: Security update for go1.17
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2004-1
Rating: important
References: #1190649 #1200134 #1200135 #1200136 #1200137
Cross-References: CVE-2022-29804 CVE-2022-30580 CVE-2022-30629
CVE-2022-30634
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for go1.17 fixes the following issues:
Update to go1.17.11 (released 2022-06-01) (bsc#1190649):
- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large
buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random
ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on
Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running
unintended binary on Windows (bsc#1200136).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2004=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2004=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2004=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2004=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
References:
https://www.suse.com/security/cve/CVE-2022-29804.html
https://www.suse.com/security/cve/CVE-2022-30580.html
https://www.suse.com/security/cve/CVE-2022-30629.html
https://www.suse.com/security/cve/CVE-2022-30634.html
https://bugzilla.suse.com/1190649
https://bugzilla.suse.com/1200134
https://bugzilla.suse.com/1200135
https://bugzilla.suse.com/1200136
https://bugzilla.suse.com/1200137
1
0
SUSE-SU-2022:2005-1: important: Security update for go1.18
by opensuse-security@opensuse.org 07 Jun '22
by opensuse-security@opensuse.org 07 Jun '22
07 Jun '22
SUSE Security Update: Security update for go1.18
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2005-1
Rating: important
References: #1193742 #1200134 #1200135 #1200136 #1200137
Cross-References: CVE-2022-29804 CVE-2022-30580 CVE-2022-30629
CVE-2022-30634
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for go1.18 fixes the following issues:
Update to go1.18.3 (released 2022-06-01) (bsc#1193742):
- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large
buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random
ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on
Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running
unintended binary on Windows (bsc#1200136).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2005=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2005=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2005=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2005=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
References:
https://www.suse.com/security/cve/CVE-2022-29804.html
https://www.suse.com/security/cve/CVE-2022-30580.html
https://www.suse.com/security/cve/CVE-2022-30629.html
https://www.suse.com/security/cve/CVE-2022-30634.html
https://bugzilla.suse.com/1193742
https://bugzilla.suse.com/1200134
https://bugzilla.suse.com/1200135
https://bugzilla.suse.com/1200136
https://bugzilla.suse.com/1200137
1
0
SUSE-SU-2022:2003-1: important: Security update for mariadb
by opensuse-security@opensuse.org 07 Jun '22
by opensuse-security@opensuse.org 07 Jun '22
07 Jun '22
SUSE Security Update: Security update for mariadb
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2003-1
Rating: important
References: #1198603 #1198604 #1198605 #1198606 #1198607
#1198609 #1198610 #1198611 #1198612 #1198613
#1198628 #1198629 #1198630 #1198631 #1198632
#1198633 #1198634 #1198635 #1198636 #1198637
#1198638 #1198639 #1198640 #1199928
Cross-References: CVE-2021-46669 CVE-2022-21427 CVE-2022-27376
CVE-2022-27377 CVE-2022-27378 CVE-2022-27379
CVE-2022-27380 CVE-2022-27381 CVE-2022-27382
CVE-2022-27383 CVE-2022-27384 CVE-2022-27386
CVE-2022-27387 CVE-2022-27444 CVE-2022-27445
CVE-2022-27446 CVE-2022-27447 CVE-2022-27448
CVE-2022-27449 CVE-2022-27451 CVE-2022-27452
CVE-2022-27455 CVE-2022-27456 CVE-2022-27457
CVE-2022-27458
CVSS scores:
CVE-2021-46669 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21427 (NVD) : 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27376 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27376 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27377 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27377 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27378 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27378 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27379 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27379 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27380 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27380 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27381 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27381 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27382 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27382 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27383 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27383 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27384 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27384 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27386 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27386 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27387 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27387 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-27444 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27444 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27445 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27445 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27446 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27446 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27447 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27447 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27448 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27448 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27449 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27449 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27451 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27451 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27452 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27452 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27455 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27455 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27456 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27456 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27457 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27457 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-27458 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-27458 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 25 vulnerabilities is now available.
Description:
This update for mariadb fixes the following issues:
Update to 10.5.16 (bsc#1199928):
- CVE-2021-46669 (bsc#1199928)
- CVE-2022-27376 (bsc#1198628)
- CVE-2022-27377 (bsc#1198603)
- CVE-2022-27378 (bsc#1198604)
- CVE-2022-27379 (bsc#1198605)
- CVE-2022-27380 (bsc#1198606)
- CVE-2022-27381 (bsc#1198607)
- CVE-2022-27382 (bsc#1198609)
- CVE-2022-27383 (bsc#1198610)
- CVE-2022-27384 (bsc#1198611)
- CVE-2022-27386 (bsc#1198612)
- CVE-2022-27387 (bsc#1198613)
- CVE-2022-27444 (bsc#1198634)
- CVE-2022-27445 (bsc#1198629)
- CVE-2022-27446 (bsc#1198630)
- CVE-2022-27447 (bsc#1198631)
- CVE-2022-27448 (bsc#1198632)
- CVE-2022-27449 (bsc#1198633)
- CVE-2022-27451 (bsc#1198639)
- CVE-2022-27452 (bsc#1198640)
- CVE-2022-27455 (bsc#1198638)
- CVE-2022-27456 (bsc#1198635)
- CVE-2022-27457 (bsc#1198636)
- CVE-2022-27458 (bsc#1198637)
- The following issue is not affecting this package: CVE-2022-21427
External refernences:
- https://mariadb.com/kb/en/library/mariadb-10516-release-notes
- https://mariadb.com/kb/en/library/mariadb-10516-changelog
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2003=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-2003=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2003=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libmariadbd-devel-10.5.16-150300.3.18.1
libmariadbd19-10.5.16-150300.3.18.1
libmariadbd19-debuginfo-10.5.16-150300.3.18.1
mariadb-10.5.16-150300.3.18.1
mariadb-bench-10.5.16-150300.3.18.1
mariadb-bench-debuginfo-10.5.16-150300.3.18.1
mariadb-client-10.5.16-150300.3.18.1
mariadb-client-debuginfo-10.5.16-150300.3.18.1
mariadb-debuginfo-10.5.16-150300.3.18.1
mariadb-debugsource-10.5.16-150300.3.18.1
mariadb-rpm-macros-10.5.16-150300.3.18.1
mariadb-test-10.5.16-150300.3.18.1
mariadb-test-debuginfo-10.5.16-150300.3.18.1
mariadb-tools-10.5.16-150300.3.18.1
mariadb-tools-debuginfo-10.5.16-150300.3.18.1
- openSUSE Leap 15.3 (noarch):
mariadb-errormessages-10.5.16-150300.3.18.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
libmariadbd-devel-10.5.16-150300.3.18.1
libmariadbd19-10.5.16-150300.3.18.1
libmariadbd19-debuginfo-10.5.16-150300.3.18.1
mariadb-10.5.16-150300.3.18.1
mariadb-client-10.5.16-150300.3.18.1
mariadb-client-debuginfo-10.5.16-150300.3.18.1
mariadb-debuginfo-10.5.16-150300.3.18.1
mariadb-debugsource-10.5.16-150300.3.18.1
mariadb-tools-10.5.16-150300.3.18.1
mariadb-tools-debuginfo-10.5.16-150300.3.18.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
mariadb-errormessages-10.5.16-150300.3.18.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
mariadb-galera-10.5.16-150300.3.18.1
References:
https://www.suse.com/security/cve/CVE-2021-46669.html
https://www.suse.com/security/cve/CVE-2022-21427.html
https://www.suse.com/security/cve/CVE-2022-27376.html
https://www.suse.com/security/cve/CVE-2022-27377.html
https://www.suse.com/security/cve/CVE-2022-27378.html
https://www.suse.com/security/cve/CVE-2022-27379.html
https://www.suse.com/security/cve/CVE-2022-27380.html
https://www.suse.com/security/cve/CVE-2022-27381.html
https://www.suse.com/security/cve/CVE-2022-27382.html
https://www.suse.com/security/cve/CVE-2022-27383.html
https://www.suse.com/security/cve/CVE-2022-27384.html
https://www.suse.com/security/cve/CVE-2022-27386.html
https://www.suse.com/security/cve/CVE-2022-27387.html
https://www.suse.com/security/cve/CVE-2022-27444.html
https://www.suse.com/security/cve/CVE-2022-27445.html
https://www.suse.com/security/cve/CVE-2022-27446.html
https://www.suse.com/security/cve/CVE-2022-27447.html
https://www.suse.com/security/cve/CVE-2022-27448.html
https://www.suse.com/security/cve/CVE-2022-27449.html
https://www.suse.com/security/cve/CVE-2022-27451.html
https://www.suse.com/security/cve/CVE-2022-27452.html
https://www.suse.com/security/cve/CVE-2022-27455.html
https://www.suse.com/security/cve/CVE-2022-27456.html
https://www.suse.com/security/cve/CVE-2022-27457.html
https://www.suse.com/security/cve/CVE-2022-27458.html
https://bugzilla.suse.com/1198603
https://bugzilla.suse.com/1198604
https://bugzilla.suse.com/1198605
https://bugzilla.suse.com/1198606
https://bugzilla.suse.com/1198607
https://bugzilla.suse.com/1198609
https://bugzilla.suse.com/1198610
https://bugzilla.suse.com/1198611
https://bugzilla.suse.com/1198612
https://bugzilla.suse.com/1198613
https://bugzilla.suse.com/1198628
https://bugzilla.suse.com/1198629
https://bugzilla.suse.com/1198630
https://bugzilla.suse.com/1198631
https://bugzilla.suse.com/1198632
https://bugzilla.suse.com/1198633
https://bugzilla.suse.com/1198634
https://bugzilla.suse.com/1198635
https://bugzilla.suse.com/1198636
https://bugzilla.suse.com/1198637
https://bugzilla.suse.com/1198638
https://bugzilla.suse.com/1198639
https://bugzilla.suse.com/1198640
https://bugzilla.suse.com/1199928
1
0
06 Jun '22
SUSE Recommended Update: Recommended update for s3fs
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:2001-1
Rating: moderate
References: #1198900
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP1
SUSE Linux Enterprise High Performance Computing 15-SP2
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Public Cloud 15-SP1
SUSE Linux Enterprise Module for Public Cloud 15-SP2
SUSE Linux Enterprise Module for Public Cloud 15-SP3
SUSE Linux Enterprise Module for Public Cloud 15-SP4
SUSE Linux Enterprise Server 15-SP1
SUSE Linux Enterprise Server 15-SP2
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP1
SUSE Linux Enterprise Server for SAP Applications 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Storage 6
SUSE Linux Enterprise Storage 7
SUSE Manager Proxy 4.0
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Server 4.0
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for s3fs fixes the following issues:
- Update to version 1.91 (bsc#1198900)
* Fix RowFlush can not upload last part smaller than 5MB using
NoCacheMultipartPost
* Fix IAM role retrieval from IMDSv2
* Add option to allow unsigned payloads
* Fix mixupload return EntityTooSmall while a copypart is less than 5MB
after split
* Allow compilation on Windows via MSYS2
* Handle utimensat UTIME_NOW and UTIME_OMIT special values
* Preserve sub-second precision in more situations
* Always flush open files with O_CREAT flag
* Fixed not to call Flush even if the file size is increased
* Include climits to support musl libc
- Update to version 1.90
+ Don't ignore nomultipart when storage is low
+ Fix POSIX compatibility issues found by pjdfstest
+ Fail CheckBucket when S3 returns PermanentRedirect
+ Do not create zero-byte object when creating file
+ Allow arbitrary size AWS secret keys
+ Fix race conditions
+ Set explicit Content-Length: 0 when initiating MPU
+ Set CURLOPT_UNRESTRICTED_AUTH when authenticating
+ Add jitter to avoid thundering herd
+ Loosen CheckBucket to check only the bucket
+ Add support for AWS-style environment variables
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2001=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2001=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2001=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2001=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP2:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP2-2022-2001=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP1:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP1-2022-2001=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP4 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP2 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP1 (aarch64 ppc64le s390x x86_64):
s3fs-1.91-150000.3.9.1
s3fs-debuginfo-1.91-150000.3.9.1
s3fs-debugsource-1.91-150000.3.9.1
References:
https://bugzilla.suse.com/1198900
1
0
SUSE Recommended Update: Recommended update for sssd
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:1936-1
Rating: low
References: #1199393
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for sssd fixes the following issues:
- Update sss_cache command's manpage to clarify its effects on the memory
cache. (bsc#1199393)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1936=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1936=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1936=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1936=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1936=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1936=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
sssd-wbclient-1.16.1-150300.23.31.1
sssd-wbclient-debuginfo-1.16.1-150300.23.31.1
sssd-wbclient-devel-1.16.1-150300.23.31.1
- openSUSE Leap 15.4 (x86_64):
sssd-common-32bit-1.16.1-150300.23.31.1
sssd-common-32bit-debuginfo-1.16.1-150300.23.31.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libipa_hbac-devel-1.16.1-150300.23.31.1
libipa_hbac0-1.16.1-150300.23.31.1
libipa_hbac0-debuginfo-1.16.1-150300.23.31.1
libnfsidmap-sss-1.16.1-150300.23.31.1
libnfsidmap-sss-debuginfo-1.16.1-150300.23.31.1
libsss_certmap-devel-1.16.1-150300.23.31.1
libsss_certmap0-1.16.1-150300.23.31.1
libsss_certmap0-debuginfo-1.16.1-150300.23.31.1
libsss_idmap-devel-1.16.1-150300.23.31.1
libsss_idmap0-1.16.1-150300.23.31.1
libsss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_nss_idmap-devel-1.16.1-150300.23.31.1
libsss_nss_idmap0-1.16.1-150300.23.31.1
libsss_nss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_simpleifp-devel-1.16.1-150300.23.31.1
libsss_simpleifp0-1.16.1-150300.23.31.1
libsss_simpleifp0-debuginfo-1.16.1-150300.23.31.1
python3-ipa_hbac-1.16.1-150300.23.31.1
python3-ipa_hbac-debuginfo-1.16.1-150300.23.31.1
python3-sss-murmur-1.16.1-150300.23.31.1
python3-sss-murmur-debuginfo-1.16.1-150300.23.31.1
python3-sss_nss_idmap-1.16.1-150300.23.31.1
python3-sss_nss_idmap-debuginfo-1.16.1-150300.23.31.1
python3-sssd-config-1.16.1-150300.23.31.1
python3-sssd-config-debuginfo-1.16.1-150300.23.31.1
sssd-1.16.1-150300.23.31.1
sssd-ad-1.16.1-150300.23.31.1
sssd-ad-debuginfo-1.16.1-150300.23.31.1
sssd-common-1.16.1-150300.23.31.1
sssd-common-debuginfo-1.16.1-150300.23.31.1
sssd-dbus-1.16.1-150300.23.31.1
sssd-dbus-debuginfo-1.16.1-150300.23.31.1
sssd-debugsource-1.16.1-150300.23.31.1
sssd-ipa-1.16.1-150300.23.31.1
sssd-ipa-debuginfo-1.16.1-150300.23.31.1
sssd-krb5-1.16.1-150300.23.31.1
sssd-krb5-common-1.16.1-150300.23.31.1
sssd-krb5-common-debuginfo-1.16.1-150300.23.31.1
sssd-krb5-debuginfo-1.16.1-150300.23.31.1
sssd-ldap-1.16.1-150300.23.31.1
sssd-ldap-debuginfo-1.16.1-150300.23.31.1
sssd-proxy-1.16.1-150300.23.31.1
sssd-proxy-debuginfo-1.16.1-150300.23.31.1
sssd-tools-1.16.1-150300.23.31.1
sssd-tools-debuginfo-1.16.1-150300.23.31.1
sssd-wbclient-1.16.1-150300.23.31.1
sssd-wbclient-debuginfo-1.16.1-150300.23.31.1
sssd-wbclient-devel-1.16.1-150300.23.31.1
sssd-winbind-idmap-1.16.1-150300.23.31.1
sssd-winbind-idmap-debuginfo-1.16.1-150300.23.31.1
- openSUSE Leap 15.3 (x86_64):
sssd-common-32bit-1.16.1-150300.23.31.1
sssd-common-32bit-debuginfo-1.16.1-150300.23.31.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
sssd-common-32bit-1.16.1-150300.23.31.1
sssd-common-32bit-debuginfo-1.16.1-150300.23.31.1
sssd-debugsource-1.16.1-150300.23.31.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libipa_hbac-devel-1.16.1-150300.23.31.1
libipa_hbac0-1.16.1-150300.23.31.1
libipa_hbac0-debuginfo-1.16.1-150300.23.31.1
libsss_certmap-devel-1.16.1-150300.23.31.1
libsss_certmap0-1.16.1-150300.23.31.1
libsss_certmap0-debuginfo-1.16.1-150300.23.31.1
libsss_idmap-devel-1.16.1-150300.23.31.1
libsss_idmap0-1.16.1-150300.23.31.1
libsss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_nss_idmap-devel-1.16.1-150300.23.31.1
libsss_nss_idmap0-1.16.1-150300.23.31.1
libsss_nss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_simpleifp-devel-1.16.1-150300.23.31.1
libsss_simpleifp0-1.16.1-150300.23.31.1
libsss_simpleifp0-debuginfo-1.16.1-150300.23.31.1
python3-sssd-config-1.16.1-150300.23.31.1
python3-sssd-config-debuginfo-1.16.1-150300.23.31.1
sssd-1.16.1-150300.23.31.1
sssd-ad-1.16.1-150300.23.31.1
sssd-ad-debuginfo-1.16.1-150300.23.31.1
sssd-common-1.16.1-150300.23.31.1
sssd-common-debuginfo-1.16.1-150300.23.31.1
sssd-dbus-1.16.1-150300.23.31.1
sssd-dbus-debuginfo-1.16.1-150300.23.31.1
sssd-debugsource-1.16.1-150300.23.31.1
sssd-ipa-1.16.1-150300.23.31.1
sssd-ipa-debuginfo-1.16.1-150300.23.31.1
sssd-krb5-1.16.1-150300.23.31.1
sssd-krb5-common-1.16.1-150300.23.31.1
sssd-krb5-common-debuginfo-1.16.1-150300.23.31.1
sssd-krb5-debuginfo-1.16.1-150300.23.31.1
sssd-ldap-1.16.1-150300.23.31.1
sssd-ldap-debuginfo-1.16.1-150300.23.31.1
sssd-proxy-1.16.1-150300.23.31.1
sssd-proxy-debuginfo-1.16.1-150300.23.31.1
sssd-tools-1.16.1-150300.23.31.1
sssd-tools-debuginfo-1.16.1-150300.23.31.1
sssd-winbind-idmap-1.16.1-150300.23.31.1
sssd-winbind-idmap-debuginfo-1.16.1-150300.23.31.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
sssd-common-32bit-1.16.1-150300.23.31.1
sssd-common-32bit-debuginfo-1.16.1-150300.23.31.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libsss_certmap0-1.16.1-150300.23.31.1
libsss_certmap0-debuginfo-1.16.1-150300.23.31.1
libsss_idmap0-1.16.1-150300.23.31.1
libsss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_nss_idmap0-1.16.1-150300.23.31.1
libsss_nss_idmap0-debuginfo-1.16.1-150300.23.31.1
sssd-1.16.1-150300.23.31.1
sssd-common-1.16.1-150300.23.31.1
sssd-common-debuginfo-1.16.1-150300.23.31.1
sssd-debugsource-1.16.1-150300.23.31.1
sssd-krb5-common-1.16.1-150300.23.31.1
sssd-krb5-common-debuginfo-1.16.1-150300.23.31.1
sssd-ldap-1.16.1-150300.23.31.1
sssd-ldap-debuginfo-1.16.1-150300.23.31.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libsss_certmap0-1.16.1-150300.23.31.1
libsss_certmap0-debuginfo-1.16.1-150300.23.31.1
libsss_idmap0-1.16.1-150300.23.31.1
libsss_idmap0-debuginfo-1.16.1-150300.23.31.1
libsss_nss_idmap0-1.16.1-150300.23.31.1
libsss_nss_idmap0-debuginfo-1.16.1-150300.23.31.1
sssd-1.16.1-150300.23.31.1
sssd-common-1.16.1-150300.23.31.1
sssd-common-debuginfo-1.16.1-150300.23.31.1
sssd-debugsource-1.16.1-150300.23.31.1
sssd-krb5-common-1.16.1-150300.23.31.1
sssd-krb5-common-debuginfo-1.16.1-150300.23.31.1
sssd-ldap-1.16.1-150300.23.31.1
sssd-ldap-debuginfo-1.16.1-150300.23.31.1
References:
https://bugzilla.suse.com/1199393
1
0
03 Jun '22
SUSE Recommended Update: Recommended update for mutter
______________________________________________________________________________
Announcement ID: SUSE-RU-2022:1935-1
Rating: moderate
References: #1193190
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that has one recommended fix can now be installed.
Description:
This update for mutter fixes the following issues:
- Fixes xterm -iconic support, by reverting a workaround for wrongly
behaved wine games.(bsc#1193190)
Patch Instructions:
To install this SUSE Recommended Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1935=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1935=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-1935=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libmutter-5-0-3.34.6-150200.3.12.1
libmutter-5-0-debuginfo-3.34.6-150200.3.12.1
mutter-data-3.34.6-150200.3.12.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libmutter-5-0-3.34.6-150200.3.12.1
libmutter-5-0-debuginfo-3.34.6-150200.3.12.1
mutter-3.34.6-150200.3.12.1
mutter-data-3.34.6-150200.3.12.1
mutter-debuginfo-3.34.6-150200.3.12.1
mutter-debugsource-3.34.6-150200.3.12.1
mutter-devel-3.34.6-150200.3.12.1
- openSUSE Leap 15.3 (noarch):
mutter-lang-3.34.6-150200.3.12.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
libmutter-5-0-3.34.6-150200.3.12.1
libmutter-5-0-debuginfo-3.34.6-150200.3.12.1
mutter-3.34.6-150200.3.12.1
mutter-data-3.34.6-150200.3.12.1
mutter-debuginfo-3.34.6-150200.3.12.1
mutter-debugsource-3.34.6-150200.3.12.1
mutter-devel-3.34.6-150200.3.12.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (noarch):
mutter-lang-3.34.6-150200.3.12.1
References:
https://bugzilla.suse.com/1193190
1
0