SUSE-RU-2024:3316-1: moderate: Recommended update for ddclient
# Recommended update for ddclient Announcement ID: SUSE-RU-2024:3316-1 Rating: moderate References: * bsc#1069468 * bsc#1127387 * bsc#1191885 * bsc#267306 * bsc#881520 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP5 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP2 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP2 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has five fixes can now be installed. ## Description: This update for ddclient fixes the following issues: * Remove buildRequires to perl(HTTP::Message::PSGI) not available and needed only for tests. * Add curl as BuildRequires/Requires to be able to use the '-curl' option (eg. in DDCLIENT_OPTIONS in /etc/sysconfig/ddclient). * Minor version update * Added support for domaindiscount24.com * Added support for njal.la * Added support for Cloudflare API tokens * Added support for OVH DynHost. * Added support for ClouDNS. * Added support for dinahosting. * Added support for Gandi LiveDNS. * The freedns protocol (for https://freedns.afraid.org) now supports IPv6 addresses. * New ssl_ca_dir and ssl_ca_file options to specify the location of CA certificates. * New built-in IP discovery service shorthands: * googledomains from https://domains.google * he from https://he.net ip+4only.me, ip6only.me from http://whatismyv6.com * ipify-ipv4 and ipify-ipv6 from https://www.ipify.org * myonlineportal from https://myonlineportal.net * noip-ipv4 and noip-ipv6 from https://www.noip.com * nsupdate.info-ipv4 and nsupdate.info-ipv6 from * https://www.nsupdate.info * zoneedit from https://www.zoneedit.com * Added option -curl to access network with system Curl command instead of the Perl built-in IO::Socket classes. * Added option -{no}web-ssl-validate and -{no}fw-ssl-validateto provide option to disable SSL certificate validation. Note that these only apply for network access when obtaining an IP address with use=web or use=fw (any firewall). Network access to Dynamic DNS servers to set or retrieve IP address will always require certificate validation. * The fw-banlocal option is deprecated and no longer does anything. * The if-skip option is deprecated and no longer does anything. * The default server for the dslreports1 protocol changed from members.dyndns.org to www.dslreports.com. * Removed support for defunct dnsspark service * Removed support for defunct dtdns service * Removed support for defunct Hammernode service * (Bug) ddclient no longer sends info mails add SupplementaryGroups=maildrop to service file (bsc#1191885). * rebase patches * update Source to %{name}-%{version} * Modify the systemd service file so ddclient is run After network- online.target instead of just network.target, since running ddclient without being online is pointless. * Added a Wants statement for the same systemd targets as in After * Added hardening to systemd service(s). * systemd-tmpfiles need updating from /var/run/ _to /run/_ (bsc#1127387). * fix for unit systemd-tmpfiles-setup.service entered failed state (bsc#881520). * Require perl-Data-Validate-IP. * remove leftover debug line in init script (bsc#267306). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-3316=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-3316=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-3316=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-3316=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2024-3316=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-3316=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2024-3316=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2024-3316=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2024-3316=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2024-3316=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2024-3316=1 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-3316=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-3316=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-3316=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-3316=1 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-3316=1 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-3316=1 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-3316=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Manager Proxy 4.3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Manager Retail Branch Server 4.3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Manager Server 4.3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Enterprise Storage 7.1 (noarch) * ddclient-3.10.0-150000.3.10.3 * openSUSE Leap 15.5 (noarch) * ddclient-3.10.0-150000.3.10.3 * openSUSE Leap 15.6 (noarch) * ddclient-3.10.0-150000.3.10.3 * Server Applications Module 15-SP5 (noarch) * ddclient-3.10.0-150000.3.10.3 * Server Applications Module 15-SP6 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch) * ddclient-3.10.0-150000.3.10.3 * SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch) * ddclient-3.10.0-150000.3.10.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1127387 * https://bugzilla.suse.com/show_bug.cgi?id=1191885 * https://bugzilla.suse.com/show_bug.cgi?id=267306 * https://bugzilla.suse.com/show_bug.cgi?id=881520
participants (1)
-
OPENSUSE-UPDATES