Container summary for bci/openjdk-devel


SUSE-CU-2024:5219-1

Container Advisory IDSUSE-CU-2024:5219-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-32.7
Container Release32.7
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3659-1
ReleasedWed Oct 16 15:12:47 2024
SummaryRecommended update for gcc14
Typerecommended
Severitymoderate
References1188441,1210959,1214915,1219031,1220724,1221601
Description:

This update for gcc14 fixes the following issues:
This update ships the GNU Compiler Collection GCC 14.2. (jsc#PED-10474)
The compiler runtime libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 13 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP5 and SP6, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories.
To use gcc14 compilers use:


For a full changelog with all new GCC14 features, check out
https://gcc.gnu.org/gcc-14/changes.html



SUSE-CU-2024:5132-1

Container Advisory IDSUSE-CU-2024:5132-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-32.3
Container Release32.3
The following patches have been included in this update:

SUSE-CU-2024:5080-1

Container Advisory IDSUSE-CU-2024:5080-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-32.1
Container Release32.1
The following patches have been included in this update:

SUSE-CU-2024:5009-1

Container Advisory IDSUSE-CU-2024:5009-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.9
Container Release31.9
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3597-1
ReleasedFri Oct 11 10:39:52 2024
SummaryRecommended update for bash
Typerecommended
Severitymoderate
References1227807
Description:

This update for bash fixes the following issues:


SUSE-CU-2024:5008-1

Container Advisory IDSUSE-CU-2024:5008-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.8
Container Release31.8
The following patches have been included in this update:

SUSE-CU-2024:4975-1

Container Advisory IDSUSE-CU-2024:4975-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.7
Container Release31.7
The following patches have been included in this update:

SUSE-CU-2024:4876-1

Container Advisory IDSUSE-CU-2024:4876-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.6
Container Release31.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3527-1
ReleasedFri Oct 4 15:27:07 2024
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References1230145
Description:

This update for e2fsprogs fixes the following issue:


SUSE-CU-2024:4777-1

Container Advisory IDSUSE-CU-2024:4777-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.3
Container Release31.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3503-1
ReleasedTue Oct 1 16:13:07 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1228661
Description:

This update for glibc fixes the following issue:


SUSE-CU-2024:4745-1

Container Advisory IDSUSE-CU-2024:4745-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-31.1
Container Release31.1
The following patches have been included in this update:

SUSE-CU-2024:4710-1

Container Advisory IDSUSE-CU-2024:4710-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-30.5
Container Release30.5
The following patches have been included in this update:

SUSE-CU-2024:4646-1

Container Advisory IDSUSE-CU-2024:4646-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-30.3
Container Release30.3
The following patches have been included in this update:

SUSE-CU-2024:4627-1

Container Advisory IDSUSE-CU-2024:4627-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-30.2
Container Release30.2
The following patches have been included in this update:

SUSE-CU-2024:4505-1

Container Advisory IDSUSE-CU-2024:4505-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-28.6
Container Release28.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3300-1
ReleasedWed Sep 18 14:27:53 2024
SummaryRecommended update for ncurses
Typerecommended
Severitymoderate
References1229028
Description:

This update for ncurses fixes the following issues:


SUSE-CU-2024:4444-1

Container Advisory IDSUSE-CU-2024:4444-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-28.4
Container Release28.4
The following patches have been included in this update:

SUSE-CU-2024:4430-1

Container Advisory IDSUSE-CU-2024:4430-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-27.5
Container Release27.5
The following patches have been included in this update:

SUSE-CU-2024:4305-1

Container Advisory IDSUSE-CU-2024:4305-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-27.3
Container Release27.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3245-1
ReleasedMon Sep 16 07:55:19 2024
SummaryRecommended update for maven, maven-resolver, sbt, xmvn
Typerecommended
Severitymoderate
References
Description:

This update for maven, maven-resolver, sbt, xmvn fixes the following issues:
maven-resolver was upgraded to version 1.9.22:


* Resolver-Supplier unusable in OSGi runtimes * Invalid Cookie set under proxy conditions * In typical setups, DefaultArtifact copies the same maps over and over again * Memory consumption improvements

* Import o.e.aether packages with the exact same version in OSGi metadata

* Removed excessive strictness of OSGi dependency metadata

maven was upgraded to version 3.9.9:

* Fixed search for topDirectory when using -f / --file for Maven 3.9.x * Fixed Maven not finding extensions for -f when current dir is root * Fixed warning for com.sun:tools:jar that refers to a non-existing file * Fixed profile activation based on OS properties for 'mvn site' * Fixed Resolver wrongly assuming it is deploying a plugin by presence of META-INF/maven/plugins.xml in JAR * Fixed missing or mismatching Trusted Checksum for some artifacts is not properly reported * Fixed regression causing Property not resolved in profile pluginManagement
sbt, xmvn:


Advisory IDSUSE-RU-2024:3247-1
ReleasedMon Sep 16 07:59:42 2024
SummaryRecommended update for hamcrest
Typerecommended
Severitymoderate
References
Description:

This update for hamcrest fixes the following issues:


* Breaking Changes:
+ From version 3.0, the jar distributed to Maven Central is now compiled to Java 1.8 bytecode, and is not compatible with previous versions of Java. Developers who use Java 1.7 earlier can still depend upon hamcrest-2.2.jar.
* Improvements: + FileMatchersTest simplification + License cleanup


SUSE-CU-2024:4270-1

Container Advisory IDSUSE-CU-2024:4270-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-27.2
Container Release27.2
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3216-1
ReleasedThu Sep 12 13:05:20 2024
SummarySecurity update for expat
Typesecurity
Severitymoderate
References1229930,1229931,1229932,CVE-2024-45490,CVE-2024-45491,CVE-2024-45492
Description:

This update for expat fixes the following issues:


Advisory IDSUSE-RU-2024:3237-1
ReleasedFri Sep 13 11:49:56 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1229476
Description:

This update for util-linux fixes the following issue:


SUSE-CU-2024:4235-1

Container Advisory IDSUSE-CU-2024:4235-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.22
Container Release26.22
The following patches have been included in this update:

SUSE-CU-2024:4122-1

Container Advisory IDSUSE-CU-2024:4122-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.21
Container Release26.21
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3167-1
ReleasedMon Sep 9 12:31:59 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1228043
Description:

This update for glibc fixes the following issue:


SUSE-CU-2024:4082-1

Container Advisory IDSUSE-CU-2024:4082-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.19
Container Release26.19
The following patches have been included in this update:

SUSE-CU-2024:4027-1

Container Advisory IDSUSE-CU-2024:4027-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.17
Container Release26.17
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:3143-1
ReleasedWed Sep 4 12:45:50 2024
SummaryRecommended update for sles-release
Typerecommended
Severitymoderate
References1227114
Description:

This update for sles-release fixes the following issue:


SUSE-CU-2024:3989-1

Container Advisory IDSUSE-CU-2024:3989-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.14
Container Release26.14
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:3086-1
ReleasedTue Sep 3 08:57:32 2024
SummarySecurity update for glib2
Typesecurity
Severitylow
References1224044,CVE-2024-34397
Description:

This update for glib2 fixes the following issues:


Advisory IDSUSE-RU-2024:3131-1
ReleasedTue Sep 3 17:42:24 2024
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1224113
Description:

This update for mozilla-nss fixes the following issues:


SUSE-CU-2024:3883-1

Container Advisory IDSUSE-CU-2024:3883-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.6
Container Release26.6
The following patches have been included in this update:

SUSE-CU-2024:3837-1

Container Advisory IDSUSE-CU-2024:3837-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.4
Container Release26.4
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2967-1
ReleasedMon Aug 19 15:41:29 2024
SummaryRecommended update for pam
Typerecommended
Severitymoderate
References1194818
Description:

This update for pam fixes the following issue:


SUSE-CU-2024:3726-1

Container Advisory IDSUSE-CU-2024:3726-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-26.2
Container Release26.2
The following patches have been included in this update:

SUSE-CU-2024:3654-1

Container Advisory IDSUSE-CU-2024:3654-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-25.12
Container Release25.12
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2887-1
ReleasedTue Aug 13 10:52:45 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1159034,1194818,1222285
Description:

This update for util-linux fixes the following issues:


Advisory IDSUSE-SU-2024:2891-1
ReleasedTue Aug 13 11:39:53 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1226463,1227138,CVE-2024-5535
Description:

This update for openssl-1_1 fixes the following issues:


Other fixes:


SUSE-CU-2024:3585-1

Container Advisory IDSUSE-CU-2024:3585-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-25.3
Container Release25.3
The following patches have been included in this update:

SUSE-CU-2024:3497-1

Container Advisory IDSUSE-CU-2024:3497-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-24.9
Container Release24.9
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2804-1
ReleasedWed Aug 7 09:48:29 2024
SummarySecurity update for shadow
Typesecurity
Severitymoderate
References1228770,CVE-2013-4235
Description:

This update for shadow fixes the following issues:


SUSE-CU-2024:3496-1

Container Advisory IDSUSE-CU-2024:3496-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-24.6
Container Release24.6
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2791-1
ReleasedTue Aug 6 16:35:06 2024
SummaryRecommended update for various 32bit packages
Typerecommended
Severitymoderate
References1228322
Description:


This update of various packages delivers 32bit variants to allow running Wine on SLE PackageHub 15 SP6.


SUSE-CU-2024:3430-1

Container Advisory IDSUSE-CU-2024:3430-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-24.2
Container Release24.2
The following patches have been included in this update:

SUSE-CU-2024:3332-1

Container Advisory IDSUSE-CU-2024:3332-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-23.20
Container Release23.20
The following patches have been included in this update:
Advisory IDSUSE-feature-2024:2296-1
ReleasedThu Jul 4 06:29:20 2024
SummaryFeature update for jakarta-inject
Typefeature
Severitymoderate
References
Description:

This update for jakarta-inject fixes the following issues:


Advisory IDSUSE-SU-2024:2629-1
ReleasedTue Jul 30 09:11:33 2024
SummarySecurity update for java-11-openjdk
Typesecurity
Severityimportant
References1227298,1228046,1228047,1228048,1228050,1228051,1228052,CVE-2024-21131,CVE-2024-21138,CVE-2024-21140,CVE-2024-21144,CVE-2024-21145,CVE-2024-21147
Description:

This update for java-11-openjdk fixes the following issues:
Updated to version 11.0.24+8 (July 2024 CPU):


Advisory IDSUSE-RU-2024:2642-1
ReleasedTue Jul 30 10:03:52 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References
Description:

This update for Java fixes the following issues:
maven-shared-utils was updated to version 3.4.2:


* New features and improvements:
+ Made Commandline.addSystemEnvironment public and deprecated + Deprecated IsEmpty/IsNotEmpty methods + Deprecated newXmlWriter + Deprecated redundant isEmptyString method + Deprecated join methods now available in Java 8 String class + FileUtils: avoid getCanonicalPath() + Added build() method and document toString() method + Optionally inherit system environment variables by Commandline + Dropped plexus container default
* Bugs Fixed:
+ Removed trim parameter + Fixed blocking in StreamFeeder + Ignore MessageUtilsTest methods on unsupported platforms + Make copyFile succeed with source file having lastModified() = 0 + XmlWriterUtil platform independent and consistent + Poll data from input stream
plexus-io was updated to version 3.2.0 to 3.4.2:

* Drop legacy and make components pure JSR330 * Restore speed improvements * Plexus IO build is now reproducible * Various speed improvements * Plexus IO now requires Java 8

* Update sisu.inject to 0.9.0.M2 * Bumped guice from 5.1.0 to 6.0.0 * Bumped commons-io:commons-io from 2.11.0 to 2.15.1 * Bumped plexus-utils from 3.5.0 to 4.0.0 * Bumped org.codehaus.plexus:plexus-testing from 1.1.0 to 1.3.0

* Fix symbolic link are being resolved into absolute path * Fix symbolic links to directories are not recognized as directories * Fix issue related to symbolic link tests issue
plexus-interpolation was updated to version 1.27.0:

* Added support for PPC64LE * Added dependabot and release drafter configuration * Moved to Junit5

* Bumped plexus from 7 to 16 * Bumped maven-bundle-plugin from 3.0.1 to 5.1.9
plexus-cli was updated to version 1.7:

* Bumped plexus-components from 6.5 to 10.0 * Bumped checkstyle from 9.2 to 9.2.1 * Bumped plexus-container-default from 1.0-alpha-34 to 2.1.1 * Bumped checkstyle from 9.2.1 to 9.3 * Bumped commons-cli from 1.0 to 1.5.0 * Bumped maven-checkstyle-plugin from 3.1.2 to 3.3.0 * Bumped maven-shared-resources from 4 to 5 * Bumped apache/maven-gh-actions-shared from 1 to 3 * Updated to Parent pom 15 * Bumped commons-cli:commons-cli from 1.5.0 to 1.6.0 * Reuse plexus-pom action for CI * Bumped org.codehaus.plexus:plexus from 15 to 16 * Replace plexus-container-default with Sisu Plexus * Bumped org.codehaus.plexus:plexus-testing from 1.2.0 to 1.3.0
plexus-cipher was updated to version 2.1.0:

* Switched to java.util.Base64 * Moved code to Java 8 * Fixed insecure cryptography in PBECipher.java * Enabled missed decryption test and adjust to new algorithm
plexus-archiver was updated to version 4.9.2:

* Allow copy all files without timestamp checking by DirectoryArchiver * Provide fluent setter for usingDefaultExcludes flag in AbstractFileSet * Various dependencies were upgraded
plexus-interactivity was updated to version 1.3:

+ Ensure prompter does not double colon + Java 8 as mininum + Moved off plexus

* The class previously in plexus-interactivity-jdom artifact is folded into the main plexus-interactivity-api.
maven-shared-incremental:


Advisory IDSUSE-RU-2024:2647-1
ReleasedTue Jul 30 10:44:44 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References
Description:

This update for Java fixes the following issues:
antinject was updated to version 1.0.5:





* This release corrects the 1.0.2 release which was incorrectly done from the master branch with the jakarta.* packages. * It adds the Automatic-Module-Name=java.inject to the api jar manifest.

* Set Automatic-Module-Name to java.inject * Added OSGi bundle headers

* Added Automatic-Module-Name of jakarta.inject

* First Injection API release for Jakarta EE
cdi-api:

google-guice was updated to version 6.0.0:

* JEE Jakarta Transition:
+ Guice 6.0 adds support for jakarta.inject, the new namespace for the JSR330 spec (after the javax -> jakarta JEE transition). Guice 6.0 is intended to help users migrate their code to the jakarta namespace. It continues to fully support the javax.inject namespace while also mostly supporting the jakarta.inject namespace. The only part of Guice 6.0 that doesn't support jakarta.inject are the bind(..).toProvider methods. Those methods still require javax.inject or com.google.inject Providers. + The Guice 6.0 servlet & persist extensions only support the javax.servlet and javax.persistence namespaces respectively. + Guice 6.0 can help with incremental migrations to the jakarta.inject namespace, by incrementally replacing javax.inject references to jakarta.inject. This works everywhere, except for code where a jakarta Provider is passed to bind(..).toProvider. * Guice Core:
+ Adds jakarta.inject support. + Support Java 21 (via updating ASM to 9.5 and other changes). + Improve AOP support on JVMs such as Azul. + Fix a deadlock or crash associated with recursively loading just-in-time bindings. + Make PrivateModule.binder() non-private, to allow subclass customization, such as calling skipSources. + Fix an endloop loop (that can OOM) in singleton lock cycle detection. + Fix tests to pass on Windows, despite the different line separator. + Improvements to OSGi metadata. + Mark the JSR305 dependency as optional (since it's not required at runtime). + Fix Binder.requestInjection(TypeLiteral, T) to use the TypeLiteral. + Honor scoping annotations on concrete types when provisioned by their @ProvidedBy annotation + Add a way to tell if a class is 'enhanced' by Guice, and retrieve the original class. + Ensure the order of bind(...) statements does not matter when referring to JIT bindings. + Implement Matcher.and and Matcher.or as default methods directly in Matcher, so that the AbstractMatcher subclass isn't required. + Mark the error_prone_annotations dependency as optional.
* Servlet:
+ Fix an NPE if contextPath is null
* Persist: + Persist had a number of changes, some of which are backwards incompatible. Notably: injection of EntityManager no longer implicitly starts a unit of work (because this led to leaks). Users can opt-in to the legacy behavior by constructing the JpaPersistModule with a JpaPersistOptions that sets setAutoBeginWorkOnEntityManagerCreation to true. + EntityManager provisioning no longer automatically starts an unit of work. + Ignore multiple start/stop calls, rather than throwing an exception. + Support manually initiated rollbacks. + Don't wrap Object-defined methods (e.g: toString, finalize, equals, hashCode) in transactions.
gradle-bootstrap:

gradle:


maven-artifact-transfer, maven-doxia-sitetools, maven-doxia, maven-plugin-testing, maven-surefire:

maven-javadoc-plugin:

modello:

plexus-component-metadata and plexus-containers were updated to version 2.2.0:

* This will be needed for smooth upgrade to plexus-utils 4.0.0

* Improved documentation to switch to Sisu * Cleaned up poms after parent upgrade * Improved plexus-component metadata - removed dependency to plexus-container-default * Added deprecation information to Plexus components * Require Java 8 * Dropped plexus-container-default artefact * Require Maven 3.6.3+ * Switched to Junit5 * Bumped org.eclipse.sisu.plexus from 0.3.0.M1 to 0.9.0.M2

* Last version before deprecation * Requires Java 7 and Maven 3.2.5+ * Upgraded ASM to 9.2 * Security upgrade org.jdom:jdom2 from 2.0.6 to 2.0.6.1
plexus-utils was updated to version 4.0.0:

* Starting with version 4, XML classes (in org.codehaus.plexus.util.xml and org.codehaus.plexus.util.xml.pull) have been extracted to a separate plexus-xml: if you need them, just use this new artifact\
* Other changes:
+ Fixed false difference detected with CachingOutputStream/CachingWriter when streams are flushed + Dependency updates + Switched to Junit 5 plexus-xml was update to version 3.0.1:

* Bugs fixed:
+ Allow nulls for write elements in MXSerializer + Removed special chars from xml output
* Dependency updates:
+ Bumped org.codehaus.plexus:plexus from 17 to 18 + Bumped release-drafter/release-drafter from 5 to 6 + Bumped parent to 17 and updates
* Maintenance:
+ Switched to Junit 5 + Switched to shared gh actions setup from master branch
sbt:

sisu was updated to version 0.9.0.M3:

* Annotated new method * Updated workflow to run on Java 21 * Build with final Java 21 on GitHub * Switched to JUnit5 * Disabled annotation processor by default * Do not silently fail in case of class scanning exceptions * Updated to ASM 9.7 * Updated CONTRIBUTING.md * Aligned Plexus ASM version * Renamed release profile * Fixed Jacoco coverage repots in Sonar * Added a method to allow LifecycleManager to free keys * Licence change: From EPL1 to EPL2 * Updated documentation for exposed core extensions, fix anchors * Trigger Sonarcloud analysis from GHA

* Fixed SpaceScanner to use latest ASM API version * 3.7 is not an officially supported version therefore specify3.8 instead * Provide script to help upgrade embedded copy of ASM * ASM_9_4 * Require Java 8 * Sisu specific PreConstruct/PreDestroy annotations * Updated build plugins * ASM 9.5 * Aligned to latest Maven plugins * Moved release elements from oss-parent to local project * Create a 'no_asm' jar at release time which doesn't embed ASM

* Fixed CDI related issues * Build with Eclipse/Tycho 2.5.0 and Java 11 * Raise problem reporting logs to DEBUG, fixes #36 * Upgraded internal copy of ASM to 9.2 * Implemented PathTypeConverter * Added JUnit 5 annotations to InjectedTest setUp/tearDown * Fixed static parameters binding lookup * Run injection tests against multiple versions of Guice * Support using @priority on Providers * Use read lock when subscribing to publishers… * Cache binding lookups for single bean providers * Use AtomicReferenceFieldUpdater as it works better for large numbers of instances * Enabled Java CI workflow * Enabled CodeQL analysis * Replaced potentially-expensive regex with simple tokenizer * Allow Main to boot with extra bindings * Re-enabled various resource-related unit tests * Reworked globber pattern strategy to avoid use of regex * Use GlobberStrategy.PATTERN instead of regex for ServiceBindings filtering

* Make build work with Java17 * Aligned to latest Maven plugins * Moved release elements from oss-parent to local project

* Aligned logback with sisu.inject * Build with Eclipse/Tycho 2.5.0 and Java 11 * Support configuration of collections with complex generic types * Enabled Java CI workflow * Enabled CodeQL analysis
sisu-mojos:


Advisory IDSUSE-SU-2024:2658-1
ReleasedTue Jul 30 15:37:26 2024
SummarySecurity update for shadow
Typesecurity
Severityimportant
References916845,CVE-2013-4235
Description:

This update for shadow fixes the following issues:


Advisory IDSUSE-RU-2024:2667-1
ReleasedTue Jul 30 16:14:01 2024
SummaryRecommended update for libxkbcommon
Typerecommended
Severitymoderate
References1218640,1228322
Description:


This update of libxkbcommon fixes the following issue:


Advisory IDSUSE-RU-2024:2679-1
ReleasedWed Jul 31 09:47:44 2024
SummaryRecommended update for patterns-base
Typerecommended
Severitymoderate
References
Description:

This update for patterns-base fixes the following issues:
Added a fips-certified pattern matching the exact certified FIPS versions of the Linux Kernel, openssl 1.1.1, gnutls/nettle, mozilla-nss and libgcrypt.
Note that applying this pattern might cause downgrade of various packages and so deinstall security and bugfix updates released after the certified binaries.


Advisory IDSUSE-RU-2024:2684-1
ReleasedWed Jul 31 20:04:41 2024
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1214980,1222804,1222807,1222811,1222813,1222814,1222821,1222822,1222826,1222828,1222830,1222833,1222834,1223724,1224113,1224115,1224116,1224118,1227918,CVE-2023-5388
Description:

This update for mozilla-nss fixes the following issues:




Update to NSS 3.101.2:



update to NSS 3.101.1:

update to NSS 3.101:


Update to NSS 3.100:

Update to NSS 3.99:

Update to NSS 3.98:

Update to NSS 3.97:

Update to NSS 3.96.1:

Update to NSS 3.95:

Update to NSS 3.94:

Update to NSS 3.93:

Update to NSS 3.92:

Update to NSS 3.91:

Update to NSS 3.90.3:


SUSE-CU-2024:3266-1

Container Advisory IDSUSE-CU-2024:3266-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-23.5
Container Release23.5
The following patches have been included in this update:

SUSE-CU-2024:3195-1

Container Advisory IDSUSE-CU-2024:3195-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-23.4
Container Release23.4
The following patches have been included in this update:

SUSE-CU-2024:3112-1

Container Advisory IDSUSE-CU-2024:3112-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-22.3
Container Release22.3
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2302-1
ReleasedThu Jul 4 16:21:10 2024
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1227186,1227187,CVE-2024-37370,CVE-2024-37371
Description:

This update for krb5 fixes the following issues:


SUSE-CU-2024:3010-1

Container Advisory IDSUSE-CU-2024:3010-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-21.8
Container Release21.8
The following patches have been included in this update:
Advisory IDSUSE-OU-2024:2282-1
ReleasedTue Jul 2 22:41:28 2024
SummaryOptional update for openscap, scap-security-guide
Typeoptional
Severitymoderate
References
Description:


This update for scap-security-guide and openscap provides the SCAP tooling for SLE Micro 5.3, 5.4, 5.5.
This includes shipping openscap dependencies libxmlsec1-1 and libxmlsec1-openssl for SLE Micro.


SUSE-CU-2024:2966-1

Container Advisory IDSUSE-CU-2024:2966-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-21.2
Container Release21.2
The following patches have been included in this update:
Advisory IDSUSE-SU-2019:2730-1
ReleasedMon Oct 21 16:04:57 2019
SummarySecurity update for procps
Typesecurity
Severityimportant
References1092100,1121753,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126
Description:

This update for procps fixes the following issues:
procps was updated to 3.3.15. (bsc#1092100)
Following security issues were fixed:



Also this non-security issue was fixed:

The update to 3.3.15 contains the following fixes:


Advisory IDSUSE-RU-2020:225-1
ReleasedFri Jan 24 06:49:07 2020
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1158830
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2020:2958-1
ReleasedTue Oct 20 12:24:55 2020
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1158830
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2021:1169-1
ReleasedTue Apr 13 15:01:42 2021
SummaryRecommended update for procps
Typerecommended
Severitylow
References1181976
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2021:1549-1
ReleasedMon May 10 13:48:00 2021
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1185417
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2022:808-1
ReleasedFri Mar 11 06:07:58 2022
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1195468
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2022:2944-1
ReleasedWed Aug 31 05:39:14 2022
SummaryRecommended update for procps
Typerecommended
Severityimportant
References1181475
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2023:181-1
ReleasedThu Jan 26 21:55:43 2023
SummaryRecommended update for procps
Typerecommended
Severitylow
References1206412
Description:

This update for procps fixes the following issues:


Advisory IDSUSE-RU-2023:2104-1
ReleasedThu May 4 21:05:30 2023
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1209122
Description:

This update for procps fixes the following issue:


Advisory IDSUSE-SU-2023:3440-1
ReleasedMon Aug 28 08:57:10 2023
SummarySecurity update for gawk
Typesecurity
Severitylow
References1214025,CVE-2023-4156
Description:

This update for gawk fixes the following issues:


Advisory IDSUSE-SU-2023:3472-1
ReleasedTue Aug 29 10:55:16 2023
SummarySecurity update for procps
Typesecurity
Severitylow
References1214290,CVE-2023-4016
Description:

This update for procps fixes the following issues:
- CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290).


Advisory IDSUSE-RU-2024:11-1
ReleasedTue Jan 2 13:24:52 2024
SummaryRecommended update for procps
Typerecommended
Severitymoderate
References1029961,1158830,1206798,1209122
Description:

This update for procps fixes the following issues:




* library: Incremented to 8:3:0 (no removals or additions, internal changes only) * all: properly handle utf8 cmdline translations * kill: Pass int to signalled process * pgrep: Pass int to signalled process * pgrep: Check sanity of SG_ARG_MAX * pgrep: Add older than selection * pidof: Quiet mode * pidof: show worker threads * ps.1: Mention stime alias * ps: check also match on truncated 16 char comm names * ps: Add exe output option * ps: A lot more sorting available * pwait: New command waits for a process * sysctl: Match systemd directory order * sysctl: Document directory order * top: ensure config file backward compatibility * top: add command line 'e' for symmetry with 'E' * top: add '4' toggle for two abreast cpu display * top: add '!' toggle for combining multiple cpus * top: fix potential SEGV involving -p switch * vmstat: Wide mode gives wider proc columns * watch: Add environment variable for interval * watch: Add no linewrap option * watch: Support more colors * free,uptime,slabtop: complain about extra ops




* library: Increment to 8:2:0
No removals or functions Internal changes only, so revision is incremented. Previous version should have been 8:1:0 not 8:0:1
* docs: Use correct symbols for -h option in free.1 * docs: ps.1 now warns about command name length * docs: install translated man pages * pgrep: Match on runstate * snice: Fix matching on pid * top: can now exploit 256-color terminals * top: preserves 'other filters' in configuration file * top: can now collapse/expand forest view children * top: parent %CPU time includes collapsed children * top: improve xterm support for vim navigation keys * top: avoid segmentation fault at program termination * 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830)


Advisory IDSUSE-RU-2024:2255-1
ReleasedTue Jul 2 05:25:54 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References
Description:

This update for Java fixes the following issues:
maven-file-management:


maven-shared-io:
maven2:

maven-shared-utils was updated to version 3.3.4:

plexus-ant-factory:

plexus-bsh-factory:

plexus-cli:

plexus-i18n:

plexus-resources:

plexus-sec-dispatcher:

plexus-velocity:

tesla-polyglot:


SUSE-CU-2024:2890-1

Container Advisory IDSUSE-CU-2024:2890-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-20.9
Container Release20.9
The following patches have been included in this update:

SUSE-CU-2024:2868-1

Container Advisory IDSUSE-CU-2024:2868-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-20.8
Container Release20.8
The following patches have been included in this update:

SUSE-CU-2024:2836-1

Container Advisory IDSUSE-CU-2024:2836-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-20.5
Container Release20.5
The following patches have been included in this update:
Advisory IDSUSE-feature-2024:1664-1
ReleasedThu May 16 07:56:10 2024
SummaryFeature update for Java
Typefeature
Severitymoderate
References
Description:

This update for byte-buddy, javadoc-parser, jurand, modulemaker-maven-plugin, open-test-reporting, plexus-xml fixes the following issues:
byte-buddy:


javadoc-parser:

jurand:

modulemaker-maven-plugin:

open-test-reporting:

plexus-xml:


Advisory IDSUSE-RU-2024:2000-1
ReleasedWed Jun 12 05:43:59 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References
Description:

This update for Java fixes the following issues:
javadoc-parser:

maven-filtering was updated to version 3.3.2:

+ pick correct hamcrest dependency + Prefer commons lang to plexus utils + MSHARED-1214: move tag back to HEAD + MSHARED-1216: Use caching output stream + Bump org.codehaus.plexus:plexus-utils from 3.0.16 to 3.0.24 in /src/test/resources + Fix typos and grammar + Fix 'licenced' typo in PR template + refactor IncrementalResourceFilteringTest + MSHARED-1340: Require Maven 3.6.3+ + Bump commons-io:commons-io from 2.11.0 to 2.15.1 + Bump org.apache.commons:commons-lang3 from 3.12.0 to 3.14.0 + MSHARED-1339: Bump org.apache.maven.shared:maven-shared-components from 39 to 41 + MSHARED-1290: Fix PropertyUtils cycle detection results in false positives + MSHARED-1285: use an up-to-date scanner instead the newscanner + Bump org.codehaus.plexus:plexus-testing from 1.2.0 to 1.3.0 + Bump org.codehaus.plexus:plexus-interpolation from 1.26 to 1.27 + Bump org.codehaus.plexus:plexus-utils from 3.5.1 to 4.0.0 + Bump release-drafter/release-drafter from 5 to 6 + Bump org.junit.jupiter:junit-jupiter-api from 5.10.1 to 5.10.2 + MSHARED-1351: Fix console message when origin is baseDir + MSHARED-1050: Fix ConcurrentModificationException for maven-filtering + MSHARED-1330: Always overwrite files

* Changes:
+ MSHARED-1175: Copying x resources from rel/path to rel/path + MSHARED-1213: Bug: filtering existing but 0 byte file + MSHARED-1199: Upgrade parent pom to 39 + MSHARED-1112: Ignore setting permissions on non existing dest files/symlinks + MSHARED-1144: remove rendundant error message

* Changes:
+ Fixed cloning of MavenResourcesExecution's instances using copyOf() method + MRESOURCES-258: Copying and filtering logic is delegated to FileUtils + replace deprecated methods + replace deprecated code in favor of Java 7 core and apache commons libraries declare dependencies + MSHARED-1080: Parent POM 36, Java8, drop legacy.
maven-plugin-tools:

modello was updated to version 2.4.0:

* New features and improvements:
+ Keep license structure + Support addition of license header to generated files + Make generated code - Java 8 based by default + threadsafety
* Bugs fixed:
+ Revert snakeyaml to 1.33 (as 2.x is not fully compatible with 1.x).

* Changes:
+ Kill off dead Plexus + Fix for #366

* Changes:
+ Parse javadoc tags in xdoc generator (only @since is supported atm) + Use generic in Xpp3Reader for JDK 5+ + Get rid of usage deprecated Reader/WriterFactory + Make spotless plugin work with Java 21 + Support java source property being discovered as 1.x + Fix thread safety issues by not using singletons for generators + Improve discovering javaSource based on maven.compiler properties, default as 8 + Switch Plexus Annotation to JSR-330 + Make spotless plugin work with Java 21

plexus-build-api was updated to version 1.2.0:
* Potentially breaking changes:
+ change package to org.codehaus.plexus.build
* New features and improvements:
+ Convert to JSR 330 component + Bump sisu-maven-plugin from 0.3.5 to 0.9.0.M2 + Switch to parent 13 and reformat + Use a CachingOutputStream when using the build context + Reuse plexus-pom action for CI + Add README and LICENSE + Remove ThreadBuildContext
* Bugs fixed:
+ Store Objects in the DefaultContext in a map + Let the DefaultBuildContext delegate to the legacy build-api
plexus-build-api0 was implemented at version 0.0.8:

plexus-xml:


Advisory IDSUSE-RU-2024:2079-1
ReleasedWed Jun 19 05:41:08 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References
Description:

This update for Gradle and Maven fixes the following issues:
gradle-bootstrap:


gradle:

maven-artifact-transfer:

maven-assembly-plugin, maven-doxia, maven-doxia-sitetools, maven-install-plugin, maven-javadoc-plugin, maven-plugin-testing, maven-resolver, maven:


Advisory IDSUSE-RU-2024:2086-1
ReleasedWed Jun 19 11:48:24 2024
SummaryRecommended update for gcc13
Typerecommended
Severitymoderate
References1188441
Description:

This update for gcc13 fixes the following issues:
Update to GCC 13.3 release


SUSE-CU-2024:2781-1

Container Advisory IDSUSE-CU-2024:2781-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-19.11
Container Release19.11
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:2051-1
ReleasedTue Jun 18 09:16:01 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severityimportant
References1225551,CVE-2024-4741
Description:

This update for openssl-1_1 fixes the following issues:


SUSE-CU-2024:2703-1

Container Advisory IDSUSE-CU-2024:2703-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-19.7
Container Release19.7
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:2024-1
ReleasedThu Jun 13 16:15:18 2024
SummaryRecommended update for jitterentropy
Typerecommended
Severitymoderate
References1209627
Description:

This update for jitterentropy fixes the following issues:


Updated to 3.4.1


SUSE-CU-2024:2637-1

Container Advisory IDSUSE-CU-2024:2637-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-19.2
Container Release19.2
The following patches have been included in this update:

SUSE-CU-2024:2605-1

Container Advisory IDSUSE-CU-2024:2605-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-18.3
Container Release18.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1956-1
ReleasedMon Jun 10 04:50:39 2024
SummaryRecommended update for google-errorprone, guava
Typerecommended
Severitymoderate
References
Description:

This update for google-errorprone, guava fixes the following issues:
guava:


* Changes of version 33.1.0:
+ Updated our Error Prone dependency to 2.26.1, which includes a JPMS-ready jar of annotations. If you use the Error Prone annotations in a modular build of your own code, you may need to add a requires line for them. + base: Added a Duration overload for Suppliers.memoizeWithExpiration. + base: Deprecated the remaining two overloads of Throwables.propagateIfPossible. They won't be deleted, but we recommend migrating off them. + cache: Fixed a bug that could cause false 'recursive load' reports during refresh. + graph: Changed the return types of transitiveClosure() and reachableNodes() to Immutable* types. reachableNodes() already returned an immutable object (even though that was not reflected in the declared return type); transitiveClosure() used to return a mutable object. The old signatures remain available, so this change does not break binary compatibility. + graph: Changed the behavior of views returned by graph accessor methods that take a graph element as input: They now throw IllegalStateException when that element is removed from the graph. + hash: Optimized Checksum-based hash functions for Java 9+. + testing: Exposed FakeTicker Duration methods to Android users. + util.concurrent: Deprecated the constructors of UncheckedExecutionException and ExecutionError that don't accept a cause. We won't remove these constructors, but we recommend migrating off them, as users of those classes often assume that instances will contain a cause. + util.concurrent: Improved the correctness of racy accesses for J2ObjC users.
* Changes of version 33.0.0:
+ This version of guava-android contains some package-private methods whose signature includes the Java 8 Collector API. This is a test to identify any problems before we expose those methods publicly to users. Please report any problems that you encounter. + Changed various classes to catch Exception instead of RuntimeException even when only RuntimeException is theoretically possible. This can help code that throws undeclared exceptions, as some bytecode rewriters (e.g., Robolectric) and languages (e.g., Kotlin) do. + Added an Automatic-Module-Name to failureaccess, Guava's one strong runtime dependency. + reflect: In guava-android only, removed Invokable.getAnnotatedReturnType() and Parameter.getAnnotatedType(). These methods never worked in an Android VM, and to reflect that, they were born @Deprecated, @Beta, and @DoNotCall. They're now preventing us from rolling out some new Android compatibility testing. This is the only binary-incompatible change in this release, and it should have no effect in practice. Still, we bump the major version number to follow Semantic Versioning. + util.concurrent: Changed our implementations to avoid eagerly initializing loggers during class loading. This can help performance, especially under Android.
* Changes of version 32.1.3:
+ Changed Gradle Metadata to include dependency versions directly. This may address 'Could not find some-dependency' errors that some users have reported (which might be a result of users' excluding guava-parent). + collect: Changed Multisets.unmodifiableMultiset(set) .removeIf(predicate) to throw an exception always, even if nothing matches predicate. + graph: Fixed the behavior of Graph/ValueGraph views for a node when that node is removed from the graph. + io: Fixed Files.createTempDir and FileBackedOutputStream under Windows services, a rare use case. (The fix actually covers only Java 9+ because Java 8 would require an additional approach. Let us know if you need support under Java 8.) + net: Made MediaType.parse allow and skip over whitespace around the / and = separator tokens in addition to the ; separator, for which it was already being allowed. + util.concurrent: Tweaked Futures.getChecked constructor-selection behavior: The method continues to prefer to call constructors with a String parameter, but now it breaks ties based on whether the constructor has a Throwable parameter. Beyond that, the choice of constructor remains undefined. (For this and other reasons, we discourage the use of getChecked.)
* Changes of version 32.1.2:
+ Removed the section of our Gradle metadata that caused Gradle to report conflicts with listenablefuture. + Changed our Maven project to avoid affecting which version of Mockito our Gradle users see. + collect: Under J2CL, exposed ImmutableList and ImmutableSet methods copyOf and of for JavaScript usage. + net: Optimized InternetDomainName construction.
* Changes of version 32.1.1:
+ Fixed our broken Gradle metadata from 32.1.0. Sorry again for the trouble. If you use Gradle, please still read the release notes from that version: You may still see errors from the new checking that the metadata enables, and the release notes discuss how to fix those errors.
* Changes of version 32.1.0:
+ collect: Tweaked more nullness annotations. + hash: Enhanced crc32c() to use Java's hardware-accelerated implementation where available. + util.concurrent: Added Duration-based default methods to ListeningExecutorService. + Began updating Javadoc to focus less on APIs that have been superseded by additions to the JDK. We're also looking to add more documentation that directs users to JDK equivalents for our APIs. Further PRs welcome! + Fixed some problems with using Guava from a Java Agent. (But we don't test that configuration, and we don't know how well we'll be able to keep it working.) + Fixed BootstrapMethodError when using CacheBuilder from a custom system class loader. (As with the previous item, we're not sure how well we'll be able to keep this use case working.) + Suppressed a harmless unusable-by-js warning seen by users of guava-gwt.

google-errorprone, google-errorprone-annotations:

* Changes of version 2.26.1:
+ Fixes the module name: from 'com.google.errorprone.annotation' to 'com.google.errorprone.annotations'. Amends the OSGi build not to include 'Automatic-Module-Name' in the MANIFEST.MF for the 'annotations' project.
* Changes of version 2.26.0:
+ The 'annotations' artifact now includes a module-info.java for Java Platform Module System support. + Disabled checks passed to -XepPatchChecks are now ignored, instead of causing a crash. + New checks:
- SystemConsoleNull: Null-checking System.console() is not a reliable way to detect if the console is connected to a terminal. - EnumOrdinal: Discourage uses of Enum.ordinal()
+ Closed issues:
- Add module-info.java - 2.19.x: Exception thrown when a disabled check is passed to -XepPatchChecks - Ignore disabled checks passed to -XepPatchChecks - feat: add jpms definition for annotations - Add the 'compile' goal for 'compile-java9'
* Changes of version 2.25.0:
+ New checks:
- JUnitIncompatibleType: Detects incompatible types passed to an assertion, similar to TruthIncompatibleType - RedundantSetterCall: Detects fields set twice in the same chained expression. Generalization of previous ProtoRedundantSet check to also handle AutoValue.
+ Closed issues:
- Crash in UnnecessaryStringBuilder - Fix typos - Add support for specifying badEnclosingTypes for BadImport via flags - Some BugPattern docs are missing code examples - Remove incorrect statement from BugPattern index doc - Do not report NonFinalStaticField findings for fields modified in @BeforeAll methods
* Changes of version 2.24.1:
+ Add an assertion to try to help debug
* Changes of version 2.24.0:
+ New checks:
- MultipleNullnessAnnotations: Discourage multiple nullness annotations - NullableTypeParameter: Discourage nullness annotations on type parameters - NullableWildcard: Discourage nullness annotations on wildcards - SuperCallToObjectMethod: Generalization of SuperEqualsIsObjectEquals, now covers hashCode
* Changes of version 2.23.0:
+ New checks: DuplicateDateFormatField, NonFinalStaticField, StringCharset, StringFormatWithLiteral, SuperEqualsIsObjectEquals + Bug fixes and improvements
* Changes of version 2.22.0:
+ New checks:
- ClosingStandardOutputStreams: Prevents accidentally closing System.{out,err} with try-with-resources - TruthContainsExactlyElementsInUsage: containsExactly is preferred over containsExactlyElementsIn when creating new iterables - UnnecessaryAsync: detects unnecessary use of async primitives in local (and hence single-threaded) scopes - ReturnAtTheEndOfVoidFunction: detects unnecessary return statements at the end of void functions - MultimapKeys: Suggests using keySet() instead of iterating over Multimap.keys(), which does not collapse duplicates
+ Bug fixes and improvements: - Don't complain about literal IP addresses in AddressSelection - Prevent SuggestedFixes#renameMethod from modifying return type declaration - Fix UnusedVariable false positives for private record parameters - When running in conservative mode, no longer assume that implementations of Map.get, etc. return null - CanIgnoreReturnValueSuggester: Support additional exempting method annotations - UnusedVariable: exclude junit5's @RegisterExtension - Support running all available patch checks - Upgrade java-diff-utils 4.0 -> 4.12 - Flag unused Refaster template parameters - Support @SuppressWarnings('all') - Prevent Refaster UMemberSelect from matching method parameters - MissingDefault : Don't require // fall out comments on expression switches - Skip UnnecessaryLambda findings for usages in enhanced for loops - Fix bug where nested MissingBraces violations' suggested fixes result in broken code - Add support for specifying exemptPrefixes/exemptNames for UnusedVariable via flags - UnusedMethod: Added exempting variable annotations
* Changes of version 2.21.1: + Handle overlapping ranges in suppressedRegions + Add AddressSelection to discourage APIs that convert a hostname to a single address
* Changes of version 2.21.0:
+ New Checkers:
- AttemptedNegativeZero: Prevents accidental use of -0, which is the same as 0. The floating-point negative zero is -0.0. - ICCProfileGetInstance: Warns on uses of ICC_Profile.getInstance(String), due to JDK-8191622. - MutableGuiceModule: Fields in Guice modules should be final. - NullableOptional: Discourages @Nullable-annotated Optionals. - OverridingMethodInconsistentArgumentNamesChecker: Arguments of overriding method are inconsistent with overridden method.
+ Fixed issues:
- Avoid MemberName IOOBE on lambda parameters inside overriding methods - Improve LockOnNonEnclosingClassLiteral documentation - Security scan reported high CVE for com.google.guava:guava:31.1-jre - Upgrade guava to 32.0.1 - Proposal: checker to prevent other checkers from calling javac methods that changed across JDKs - Add support in ASTHelpersSuggestions for getEnclosedElements
* Changes of version 2.20.0:
+ This release is compatible with early-access builds of JDK 21. + New Checkers: InlineTrivialConstant, UnnecessaryStringBuilder, BanClassLoader, DereferenceWithNullBranch, DoNotUseRuleChain, LockOnNonEnclosingClassLiteral, MissingRefasterAnnotation, NamedLikeContextualKeyword, NonApiType + Fixes issues:
- Introduce MissingRefasterAnnotation checker - Fix minor typo in URepeated - Drop unused constant Template#AUTOBOXING_DEFAULT - Introduce command-line flag -XepAllSuggestionsAsWarnings - JDK21 compatibility - Add OSGi runtime metadata to error-prone's MANIFEST.MF files - Use EISOP Checker Framework version 3.34.0-eisop1 - NotJavadoc pattern does not allow Javadoc on module declarations - ErrorProneInjector incorrectly picks up the no-args constructor - Several high CVEs related to dependency com.google.protobuf:protobuf-java:3.19.2 - Upgrade protobuf-java to 3.19.6
* Changes of version 2.19.1:
+ This release fixes a binary compatibility issue when running on JDK 11
* Changes of version 2.19.0:
+ New Checkers: NotJavadoc, StringCaseLocaleUsage, UnnecessaryTestMethodPrefix + Fixes issues:
- Exclude inner classes annotated with @Nested from ClassCanBeStatic rule - Optimize VisitorState#getSymbolFromName - ClassCanBeStatic: Exclude JUnit @Nested classes - BadImport: flag static import of newInstance methods - Support given for enforcing DirectInvocationOnMock: issue 3396 - Handle yield statement case in ASTHelpers#targetType - Should ASTHelpers.getSymbol(Tree) be annotated with @Nullable? - Fix '@' character in javadoc code snippets - Replace guava cache with caffeine - Discourage APIs locale-dependent APIs like String.to{Lower,Upper}Case - Introduce StringCaseLocaleUsage check
* Changes of version 2.18.0:
+ New Checkers: InjectOnBugCheckers, LabelledBreakTarget, UnusedLabel, YodaCondition + Fixes issues:
- @SuppressWarnings('InlineFormatString') doesn't work - Refaster: support method invocation type argument inlining - java.lang.IllegalArgumentException: Cannot edit synthetic AST nodes with specific record constructor - Rename class to match filename - Optimize VisitorState#getSymbolFromName - refactor: refactor bad smell UnusedLabel - LambdaFunctionalInterface crash with IllegalArgumentException when processing an enum constructor taking a lambda - Fix JDK 20-ea build compatibility - UngroupedOverloads: ignore generated constructors - [errorprone 2.17.0] NPE in StatementSwitchToExpressionSwitch.analyzeSwitchTree - StatementSwitchToExpressionSwitch: handle empty statement blocks - StatementSwitchToExpressionSwitch: only trigger on compatible target versions - Fix Finalize bugpattern to match protected finalize() - Make MemoizeConstantVisitorStateLookups check suppressible
* Changes of version 2.17.0:
+ New Checkers: AvoidObjectArrays, Finalize, IgnoredPureGetter, ImpossibleNullComparison, MathAbsoluteNegative, NewFileSystem, StatementSwitchToExpressionSwitch, UnqualifiedYield + Fixed issues:
- InvalidParam warning on Javadoc for Java record components - UnusedMethod flags @JsonValue methods as unused - UnusedMethod: Add more JPA lifecycle annotations or make annotations configurable - UnusedMethod: Support additional exempting method annotations - Have InvalidParam support records - Fix -XepDisableAllWarnings flag when passed on its own - ASTHelpersSuggestions does not flag call to packge() on com.sun.tools.javac.code.Symbol.ClassSymbol - @SupressWarnings on record compact constructor causes crash
* Changes of version 2.16.0:
+ New Checkers: ASTHelpersSuggestions, CanIgnoreReturnValueSuggester, LenientFormatStringValidation, UnnecessarilyUsedValue + Fixed issues: - Avoid using non-ASCII Unicode characters outside of comments and literals - NullPointerException thrown during analysis - NPE analysing new style switch statement (2.14.0) - ImmutableChecker handles null types - Drop pre-JDK 11 logic from Refaster's Inliner class
* Changes of version 2.15.0:
+ New Checkers: BuilderReturnThis, CanIgnoreReturnValueSuggester, CannotMockFinalClass, CannotMockFinalMethod, DirectInvocationOnMock, ExtendsObject, MockNotUsedInProduction, NoCanIgnoreReturnValueOnClasses, NullArgumentForNonNullParameter, SelfAlwaysReturnsThis, UnsafeWildcard, UnusedTypeParameter
* Changes of version 2.14.0:
+ New checkers: BanJNDI, EmptyTopLevelDeclaration, ErroneousBitwiseExpression, FuzzyEqualsShouldNotBeUsedInEqualsMethod, Interruption, NullableOnContainingClass
* Changes of version 2.13.1:
+ Fix a crash in UnnecessaryBoxedVariable + Include the unicode character in the diagnostic message
* Changes of version 2.13.0:
+ Handle all annotations with the simple name Generated in -XepDisableWarningsInGeneratedCode + Reconcile BugChecker#isSuppressed with suppression handling in ErrorProneScanner + Fix a bug in enclosingPackage + Improve performance of fix application + Implicitly treat @AutoBuilder setter methods as @CanIgnoreReturnValue. + Remove some obsolete checks (PublicConstructorForAbstractClass, HashCodeToString)
* Changes of version 2.12.1:
+ This release adds an infrastructure optimization to AppliedFix source code processing.
* Changes of version 2.12.0:
+ New checks: BoxedPrimitiveEquality, DoubleBraceInitialization, IgnoredPureGetter, LockOnBoxedPrimitive, IncorrectMainMethod, LongDoubleConversion, RobolectricShadowDirectlyOn, StaticAssignmentOfThrowable, UnnecessaryLongToIntConversion, Varifier


SUSE-CU-2024:2568-1

Container Advisory IDSUSE-CU-2024:2568-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-18.2
Container Release18.2
The following patches have been included in this update:

SUSE-CU-2024:2515-1

Container Advisory IDSUSE-CU-2024:2515-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-17.5
Container Release17.5
The following patches have been included in this update:

SUSE-CU-2024:2465-1

Container Advisory IDSUSE-CU-2024:2465-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.23
Container Release16.23
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1895-1
ReleasedMon Jun 3 09:00:20 2024
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1221940,1223423,1223424,1223425,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602
Description:

This update for glibc fixes the following issues:



SUSE-CU-2024:2416-1

Container Advisory IDSUSE-CU-2024:2416-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.19
Container Release16.19
The following patches have been included in this update:

SUSE-CU-2024:2361-1

Container Advisory IDSUSE-CU-2024:2361-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.17
Container Release16.17
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1763-1
ReleasedThu May 23 04:34:48 2024
SummaryRecommended update for ant, hamcrest, junit
Typerecommended
Severitymoderate
References
Description:

This update for ant, hamcrest, junit fixes the following issues:
ant, ant-antlr, ant-junit5, ant-junit:


hamcrest was updated to version 2.2:

* This version simplifies the packaging of Hamcrest into a single jar. Other big changes include Java 9 module compatibility, along with numerous other improvements and bug fixes. * Breaking Changes: + Although the class API has not changed since Hamcrest 1.3, the way that the project is packaged has changed. Refer to the Hamcrest Distributables documentation for more information, and in particular the section on Upgrading from Hamcrest 1.x + The org.hamcrest.Factory annotation has been removed (it should not be used in client code)
* Improvements: + AllOf/AnyOf: Pass the matchers to constructor using varargs + Matchers.anyOf: Fixed generic bounds compatibility for JDK 11 + AssertionError message is unhelpful when match fails for byte type + Use platform specific line breaks + The build now checks for consistent use of spaces
* Bugs fixed and other changes: + Fixed compatibility issue for development with Android D8 + Fixed typo in license name + 1.3 compatible constructors for string matchers + Fixed for split packages with Java 9 modules + Documentation updates + Added implementation for CharSequence length matcher + Fixed for TypeSafeDiagnosingMatcher can't detect generic types for subclass + Renamed IsCollectionContaining to IsIterableContaining + Make Hamcrest an OSGI bundle + Added StringRegularExpression matcher + Fixed StringContainsInOrder to detect if a repeated pattern is missing + Added ArrayAsIterableMatcher + Fixed description for IsEqualIgnoringCase + Fixed JavaDoc examples + Upgraded to Java 7 + Build with Gradle + Deprecate IsCollectionContaining and IsArrayContainingXXX + Removed deprecated methods from previous release + Improve mismatch description of hasItem/hasItems + General improvements to mismatch descriptions + Several JavaDoc improvements and corrections + Deprecated several matcher factory methods of the for 'isXyz' + Fixed address doclint errors reported in JDK 1.8 + Fixed Iterable contains in order is null-safe + Added equalToObject() (i.e. unchecked) method + Fixed arrayContaining(null, null) cause NullPointerException * Fixed string matching on regular expressions * Fixed isCloseTo() shows wrong delta in mismatch description * Fixed add untyped version of equalTo, named equalToObject * Implement IsEmptyMap, IsMapWithSize * Fixed IsArray.describeMismatchSafely() should use Matcher.describeMismatch * Added Matcher implementation for files * Fixed NPE in IsIterableContainingInOrder
junit:


Advisory IDSUSE-RU-2024:1802-1
ReleasedTue May 28 16:20:18 2024
SummaryRecommended update for e2fsprogs
Typerecommended
Severitymoderate
References1223596
Description:

This update for e2fsprogs fixes the following issues:
EA Inode handling fixes:


Advisory IDSUSE-SU-2024:1807-1
ReleasedTue May 28 22:11:31 2024
SummarySecurity update for git
Typesecurity
Severityimportant
References1224168,1224170,1224171,1224172,1224173,CVE-2024-32002,CVE-2024-32004,CVE-2024-32020,CVE-2024-32021,CVE-2024-32465
Description:

This update for git fixes the following issues:


Advisory IDSUSE-SU-2024:1808-1
ReleasedTue May 28 22:12:38 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1222548,CVE-2024-2511
Description:

This update for openssl-1_1 fixes the following issues:


Advisory IDSUSE-RU-2024:1810-1
ReleasedWed May 29 08:58:01 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1218609,1220117,1223605
Description:

This update for util-linux fixes the following issues:


Advisory IDSUSE-SU-2024:1830-1
ReleasedWed May 29 14:08:50 2024
SummarySecurity update for glib2
Typesecurity
Severitylow
References1224044,CVE-2024-34397
Description:

This update for glib2 fixes the following issues:


Advisory IDSUSE-SU-2024:1874-1
ReleasedFri May 31 05:05:25 2024
SummarySecurity update for Java
Typesecurity
Severityimportant
References1187446,1224410,CVE-2021-33813
Description:

This update for Java fixes thefollowing issues:
apiguardian was updated to vesion 1.1.2:


assertj-core was implemented at version 3.25.3:

byte-buddy was updated to version v1.14.16:

* Update ASM and introduce support for Java 23.

* Allow attaching from root on J9.

* Adjust type validation to accept additional names that are legal in the class file format. * Fix dynamic attach on Windows when a service user is active. * Avoid failure when using Android's strict mode.
dom4j was updated to version 2.1.4:

* Added new factory method org.dom4j.io.SAXReader.createDefault(). It has more secure defaults than new SAXReader(), which uses system XMLReaderFactory.createXMLReader() or SAXParserFactory.newInstance().newSAXParser(). * If you use some optional dependency of dom4j (for example Jaxen, xsdlib etc.), you need to specify an explicit dependency on it in your project. They are no longer marked as a mandatory transitive dependency by dom4j. * Following SAX parser features are disabled by default in DocumentHelper.parse() for security reasons (they were enabled in previous versions): + http://xml.org/sax/properties/external-general-entities + http://xml.org/sax/properties/external-parameter-entities

* Do not depend on jtidy, since it is not used during build * Fixed license to Plexus * JPMS: Add the Automatic-Module-Name attribute to the manifest. * Make a separate flavour for a minimal `dom4j-bootstrap` package used to build `jaxen` and full `dom4j` * Updated pull-parser version * Reuse the writeAttribute method in writeAttributes * Support build on OS with non-UTF8 as default charset * Gradle: add an automatic module name * Use Correct License Name 'Plexus' * Possible vulnerability of DocumentHelper.parseText() to XML injection * CVS directories left in the source tree * XMLWriter does not escape supplementary unicode characters correctly * writer.writeOpen(x) doesn't write namespaces * Fixed concurrency problem with QNameCache * All dependencies are optional * SAXReader: hardcoded namespace features * Validate QNames * StringIndexOutOfBoundsException in XMLWriter.writeElementContent() * TreeNode has grown some generics * QName serialization fix * DocumentException initialize with nested exception * Accidentally occurring error in a multi-threaded test * Added compatibility with W3C DOM Level 3 * Use Java generics
hamcrest:

junit had the following change:

junit5 was updated to version 5.10.2:
jdom:

* CVE-2021-33813: Fixed an XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request (bsc#1187446)

jaxen was implemented at version 2.0.0:

jopt-simple:

objectweb-asm was updated to version 9.7:


open-test-reporting:

saxpath was implemented at version 1.0 FCS:

xom was implemented at version 1.3.9:


Advisory IDSUSE-RU-2024:1876-1
ReleasedFri May 31 06:47:32 2024
SummaryRecommended update for aaa_base
Typerecommended
Severitymoderate
References1221361
Description:

This update for aaa_base fixes the following issues:


SUSE-CU-2024:2215-1

Container Advisory IDSUSE-CU-2024:2215-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.13
Container Release16.13
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1762-1
ReleasedWed May 22 16:14:17 2024
SummarySecurity update for perl
Typesecurity
Severityimportant
References1082216,1082233,1213638,CVE-2018-6798,CVE-2018-6913
Description:

This update for perl fixes the following issues:
Security issues fixed:


Non-security issue fixed:


SUSE-CU-2024:2133-1

Container Advisory IDSUSE-CU-2024:2133-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.10
Container Release16.10
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1665-1
ReleasedThu May 16 08:00:09 2024
SummaryRecommended update for coreutils
Typerecommended
Severitymoderate
References1221632
Description:

This update for coreutils fixes the following issues:


SUSE-CU-2024:2071-1

Container Advisory IDSUSE-CU-2024:2071-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.5
Container Release16.5
The following patches have been included in this update:

SUSE-CU-2024:2001-1

Container Advisory IDSUSE-CU-2024:2001-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-16.3
Container Release16.3
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1598-1
ReleasedFri May 10 11:50:36 2024
SummarySecurity update for less
Typesecurity
Severityimportant
References1222849,CVE-2024-32487
Description:

This update for less fixes the following issues:


SUSE-CU-2024:1964-1

Container Advisory IDSUSE-CU-2024:1964-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.23
Container Release15.23
The following patches have been included in this update:

SUSE-CU-2024:1917-1

Container Advisory IDSUSE-CU-2024:1917-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.22
Container Release15.22
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1498-1
ReleasedMon May 6 09:42:11 2024
SummarySecurity update for java-11-openjdk
Typesecurity
Severitylow
References1213470,1222979,1222983,1222984,1222986,1222987,CVE-2024-21011,CVE-2024-21012,CVE-2024-21068,CVE-2024-21085,CVE-2024-21094
Description:

This update for java-11-openjdk fixes the following issues:


Other fixes:


SUSE-CU-2024:1867-1

Container Advisory IDSUSE-CU-2024:1867-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.20
Container Release15.20
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1485-1
ReleasedThu May 2 05:33:36 2024
SummaryRecommended update for python39
Typerecommended
Severitymoderate
References
Description:

This update for python39 fixes the following issues:


Advisory IDSUSE-RU-2024:1487-1
ReleasedThu May 2 10:43:53 2024
SummaryRecommended update for aaa_base
Typerecommended
Severitymoderate
References1211721,1221361,1221407,1222547
Description:

This update for aaa_base fixes the following issues:


SUSE-CU-2024:1815-1

Container Advisory IDSUSE-CU-2024:1815-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.13
Container Release15.13
The following patches have been included in this update:

SUSE-CU-2024:1777-1

Container Advisory IDSUSE-CU-2024:1777-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.12
Container Release15.12
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1429-1
ReleasedWed Apr 24 15:13:10 2024
SummaryRecommended update for ca-certificates
Typerecommended
Severitymoderate
References1188500,1221184
Description:

This update for ca-certificates fixes the following issue:


SUSE-CU-2024:1655-1

Container Advisory IDSUSE-CU-2024:1655-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.8
Container Release15.8
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1375-1
ReleasedMon Apr 22 14:56:13 2024
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1222992,CVE-2024-2961
Description:

This update for glibc fixes the following issues:


SUSE-CU-2024:1569-1

Container Advisory IDSUSE-CU-2024:1569-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.4
Container Release15.4
The following patches have been included in this update:

SUSE-CU-2024:1498-1

Container Advisory IDSUSE-CU-2024:1498-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-15.3
Container Release15.3
The following patches have been included in this update:

SUSE-CU-2024:1455-1

Container Advisory IDSUSE-CU-2024:1455-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.101
Container Release14.101
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1231-1
ReleasedThu Apr 11 15:20:40 2024
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1220441
Description:

This update for glibc fixes the following issues:


Advisory IDSUSE-RU-2024:1253-1
ReleasedFri Apr 12 08:15:18 2024
SummaryRecommended update for gcc13
Typerecommended
Severitymoderate
References1210959,1214934,1217450,1217667,1218492,1219031,1219520,1220724,1221239
Description:

This update for gcc13 fixes the following issues:


SUSE-CU-2024:1382-1

Container Advisory IDSUSE-CU-2024:1382-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.90
Container Release14.90
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:1129-1
ReleasedMon Apr 8 09:12:08 2024
SummarySecurity update for expat
Typesecurity
Severityimportant
References1219559,1221289,CVE-2023-52425,CVE-2024-28757
Description:

This update for expat fixes the following issues:


Advisory IDSUSE-SU-2024:1133-1
ReleasedMon Apr 8 11:29:02 2024
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1220061,CVE-2023-45918
Description:

This update for ncurses fixes the following issues:


Advisory IDSUSE-SU-2024:1151-1
ReleasedMon Apr 8 11:36:23 2024
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1221665,1221667,CVE-2024-2004,CVE-2024-2398
Description:

This update for curl fixes the following issues:


Advisory IDSUSE-SU-2024:1167-1
ReleasedMon Apr 8 15:11:11 2024
SummarySecurity update for nghttp2
Typesecurity
Severityimportant
References1221399,CVE-2024-28182
Description:

This update for nghttp2 fixes the following issues:


Advisory IDSUSE-SU-2024:1172-1
ReleasedTue Apr 9 09:52:32 2024
SummarySecurity update for util-linux
Typesecurity
Severityimportant
References1207987,1221831,CVE-2024-28085
Description:

This update for util-linux fixes the following issues:


Advisory IDSUSE-SU-2024:1192-1
ReleasedWed Apr 10 09:14:37 2024
SummarySecurity update for less
Typesecurity
Severityimportant
References1219901,CVE-2022-48624
Description:

This update for less fixes the following issues:


SUSE-CU-2024:1250-1

Container Advisory IDSUSE-CU-2024:1250-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.78
Container Release14.78
The following patches have been included in this update:

SUSE-CU-2024:1249-1

Container Advisory IDSUSE-CU-2024:1249-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.77
Container Release14.77
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:1015-1
ReleasedThu Mar 28 06:08:11 2024
SummaryRecommended update for sed
Typerecommended
Severityimportant
References1221218
Description:

This update for sed fixes the following issues:


SUSE-CU-2024:1130-1

Container Advisory IDSUSE-CU-2024:1130-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.73
Container Release14.73
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:997-1
ReleasedTue Mar 26 11:03:37 2024
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1220770,1220771,1220772,CVE-2024-26458,CVE-2024-26461,CVE-2024-26462
Description:

This update for krb5 fixes the following issues:


SUSE-CU-2024:1079-1

Container Advisory IDSUSE-CU-2024:1079-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.70
Container Release14.70
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:960-1
ReleasedThu Mar 21 09:35:14 2024
SummaryRecommended update for git
Typerecommended
Severitymoderate
References1216545
Description:

This update for git fixes the following issues:


SUSE-CU-2024:1053-1

Container Advisory IDSUSE-CU-2024:1053-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.69
Container Release14.69
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:914-1
ReleasedMon Mar 18 06:39:03 2024
SummaryRecommended update for shadow
Typerecommended
Severityimportant
References1176006,1188307,1203823
Description:

This update for shadow fixes the following issues:


Advisory IDSUSE-RU-2024:929-1
ReleasedTue Mar 19 06:36:24 2024
SummaryRecommended update for coreutils
Typerecommended
Severitymoderate
References1219321
Description:

This update for coreutils fixes the following issues:


SUSE-CU-2024:993-1

Container Advisory IDSUSE-CU-2024:993-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.63
Container Release14.63
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:786-1
ReleasedWed Mar 6 21:07:20 2024
SummarySecurity update for giflib
Typesecurity
Severityimportant
References1198880,1200551,1217390,CVE-2021-40633,CVE-2022-28506,CVE-2023-48161
Description:

This update for giflib fixes the following issues:
Update to version 5.2.2


Advisory IDSUSE-RU-2024:861-1
ReleasedWed Mar 13 09:12:30 2024
SummaryRecommended update for aaa_base
Typerecommended
Severitymoderate
References1218232
Description:

This update for aaa_base fixes the following issues:


Advisory IDSUSE-SU-2024:870-1
ReleasedWed Mar 13 13:05:14 2024
SummarySecurity update for glibc
Typesecurity
Severitymoderate
References1217445,1217589,1218866
Description:

This update for glibc fixes the following issues:
Security issues fixed:


Other issues fixed:


Advisory IDSUSE-RU-2024:907-1
ReleasedFri Mar 15 08:57:38 2024
SummaryRecommended update for audit
Typerecommended
Severitymoderate
References1215377
Description:

This update for audit fixes the following issue:


SUSE-CU-2024:826-1

Container Advisory IDSUSE-CU-2024:826-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.47
Container Release14.47
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:766-1
ReleasedTue Mar 5 13:50:28 2024
SummaryRecommended update for libssh
Typerecommended
Severityimportant
References1220385
Description:

This update for libssh fixes the following issues:


SUSE-CU-2024:790-1

Container Advisory IDSUSE-CU-2024:790-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.41
Container Release14.41
The following patches have been included in this update:

SUSE-CU-2024:769-1

Container Advisory IDSUSE-CU-2024:769-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.35
Container Release14.35
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:726-1
ReleasedThu Feb 29 12:12:44 2024
SummarySecurity update for Java
Typesecurity
Severityimportant
References1220068,1220070,CVE-2024-25710,CVE-2024-26308
Description:

This update for Java fixes the following issues:
apache-commons-codec was updated to version 1.16.1:


* New features:
+ Added Maven property project.build.outputTimestamp for build reproducibility
* Bugs fixed:
+ Correct error in Base64 Javadoc + Added minimum Java version in changes.xml + Documentation update for the org.apache.commons.codec.digest.* package + Precompile regular expression in UnixCrypt.crypt(byte[], String) + Fixed possible IndexOutOfBoundException in PhoneticEngine.encode method + Fixed possible ArrayIndexOutOfBoundsException in QuotedPrintableCodec.encodeQuotedPrintable() method + Fixed possible StringIndexOutOfBoundException in MatchRatingApproachEncoder.encode() method + Fixed possible ArrayIndexOutOfBoundException in RefinedSoundex.getMappingCode() + Fixed possible IndexOutOfBoundsException in PercentCodec.insertAlwaysEncodeChars() method + Deprecated UnixCrypt 0-argument constructor + Deprecated Md5Crypt 0-argument constructor + Deprecated Crypt 0-argument constructor + Deprecated StringUtils 0-argument constructor + Deprecated Resources 0-argument constructor + Deprecated Charsets 0-argument constructor + Deprecated CharEncoding 0-argument constructor

* Remove duplicated words from Javadocs * Use Standard Charset object * Use String.contains() functions * Avoid use toString() or substring() in favor of a simplified expression * Fixed byte-skipping in Base16 decoding * Fixed several typos, improve writing in some javadocs * BaseNCodecOutputStream.eof() should not throw IOException. * Javadoc improvements and cleanups. * Deprecated BaseNCodec.isWhiteSpace(byte) and use Character.isWhitespace(int). * Added support for Blake3 family of hashes * Added github/codeql-action * Bump actions/cache from v2 to v3.0.10 * Bump actions/setup-java from v1.4.1 to 3.5.1 * Bump actions/checkout from 2.3.2 to 3.1.0 * Bump commons-parent from 52 to 58 * Bump junit from 4.13.1 to 5.9.1 * Bump Java 7 to 8. * Bump japicmp-maven-plugin from 0.14.3 to 0.17.1. * Bump jacoco-maven-plugin from 0.8.5 to 0.8.8 (Fixes Java 15 builds). * Bump maven-surefire-plugin from 2.22.2 to 3.0.0-M7 * Bump maven-javadoc-plugin from 3.2.0 to 3.4.1. * Bump animal-sniffer-maven-plugin from 1.19 to 1.22. * Bump maven-pmd-plugin from 3.13.0 to 3.19.0 * Bump pmd from 6.47.0 to 6.52.0. * Bump maven-checkstyle-plugin from 2.17 to 3.2.0 * Bump checkstyle from 8.45.1 to 9.3 * Bump taglist-maven-plugin from 2.4 to 3.0.0 * Bump jacoco-maven-plugin from 0.8.7 to 0.8.8.
apache-commons-compress was updated to version 1.26:

* Security issues fixed:
+ CVE-2024-26308: Fixed allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress (bsc#1220068) + CVE-2024-25710: Fixed loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Compress (bsc#1220070)
* New Features:
+ Added and use ZipFile.builder(), ZipFile.Builder, and deprecate constructors + Added and use SevenZFile.builder(), SevenZFile.Builder, and deprecate constructors + Added and use ArchiveInputStream.getCharset() + Added and use ArchiveEntry.resolveIn(Path) + Added Maven property project.build.outputTimestamp for build reproducibility
* Bugs fixed: + Check for invalid PAX values in TarArchiveEntry + Fixed zero size headers in ArjInputStream + Fixes and tests for ArInputStream + Fixes for dump file parsing + Improved CPIO exception detection and handling + Deprecated SkipShieldingInputStream without replacement (nolonger used) + Reuse commons-codec, don't duplicate class PureJavaCrc32C (removed package-private class) + Reuse commons-codec, don't duplicate class XXHash32 (deprecated class) + Reuse commons-io, don't duplicate class Charsets (deprecated class) + Reuse commons-io, don't duplicate class IOUtils (deprecated methods) + Reuse commons-io, don't duplicate class BoundedInputStream (deprecated class) + Reuse commons-io, don't duplicate class FileTimes (deprecated TimeUtils methods) + Reuse Arrays.equals(byte[], byte[]) and deprecate ArchiveUtils.isEqual(byte[], byte[]) + Added a null-check for the class loader of OsgiUtils + Added a null-check in Pack200.newInstance(String, String) + Deprecated ChecksumCalculatingInputStream in favor of java.util.zip.CheckedInputStream + Deprecated CRC32VerifyingInputStream.CRC32VerifyingInputStream(InputStream, long, int) + FramedSnappyCompressorOutputStream produces incorrect output when writing a large buffer + Fixed TAR directory entries being misinterpreted as files + Deprecated unused method FileNameUtils.getBaseName(String) + Deprecated unused method FileNameUtils.getExtension(String) + ArchiveInputStream.BoundedInputStream.read() incorrectly adds 1 for EOF to the bytes read count + Deprecated IOUtils.read(File, byte[]) + Deprecated IOUtils.copyRange(InputStream, long, OutputStream, int) + ZipArchiveOutputStream multi archive updates metadata in incorrect file + Deprecated ByteUtils.InputStreamByteSupplier + Deprecated ByteUtils.fromLittleEndian(InputStream, int) + Deprecated ByteUtils.toLittleEndian(DataOutput, long, int) + Reduce duplication by having ArchiveInputStream extend FilterInputStream + Support preamble garbage in ZipArchiveInputStream + Fixed formatting the lowest expressable DOS time + Dropped reflection from ExtraFieldUtils static initialization + Preserve exception causation in ExtraFieldUtils.register(Class)

* For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes-report.html#a1.25.0

* For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes-report.html#a1.24.0

* For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes-report.html#a1.23.0

* For the full list of changes please consult: https://commons.apache.org/proper/commons-compress/changes-report.html#a1.22
apache-commons-io was updated to version 2.15.1:

* For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.1

* For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.0

* For the full list of changes please consult: https://commons.apache.org/proper/commons-io/changes-report.html#a2.14.0
javapackages-meta:

maven was updated to version 3.9.6:

* Bugs fixed:
+ Error message when modelVersion is 4.0 is confusing
* Improvements:
+ Colorize transfer messages + Support ${project.basedir} in file profile activation + Allow to exclude plugins from validation
* Tasks:
+ Maven Resolver Provider classes ctor change + Undeprecate wrongly deprecated repository metadata + Deprecated `org.apache.maven.repository.internal.MavenResolverModule` + maven-resolver-provider: introduce NAME constants.
* Dependency upgrade:
+ Updated to Resolver 1.9.16 + Upgraded Sisu version to 0.9.0.M2 + Upgraded Resolver version to 1.9.18 + Upgraded to parent POM 41 + Upgraded default plugin bindings
maven-assembly-plugin:

maven-doxia was updated to version 1.12.0:
* Changes in version 1.12.0:
+ Upgraded to FOP 2.2 + Fixed rendering links and paragraphs inside tables + Rewrite .md and .markdown links to .html + Upgraded HttpComponents: httpclient to 4.5.8 and httpcore to 4.4.11 + Escape links to xml based figureGraphics image elements + SECURITY: Use HTTPS to resolve dependencies in Maven Build + Removed old Maven 1 and 2 info + Updated commons-lang to 3.8.1 + Dropped dependency to outdated Log4j + Fixed Java 7 compatibility that was broken + Import tests from maven-site-plugin + Fixed crosslinks starting with a dot in markdown files + Replace deprecated class from commons-lang + Fill in some generic types
maven-doxia-sitetools was updated to version 1.11.1:

* Bugs fixed:
+ CLIRR can't find previous version
* Improvements:
+ Removed all   in default-site-macros.vm and replace by a space + Improved documentation on site.xml inheritance vs interpolation
* Tasks:
+ Deprecated Doxia Sitetools Doc Renderer
* Dependency upgrade:
+ Fixed javadoc issues with JDK 8 when generating documentation + Wrong coordinates for jai_core: hyphen should be underscore + Use latest JUnit version 4.13.2 + Upgraded Plexus Utils to 3.3.0 + Upgraded Plexus Interpolation to 1.26 + Upgraded Maven Doxia to 1.10 + Upgraded Maven Doxia to 1.11.1
maven-jar-plugin was updated to version 3.3.0:

* Bugs fixed:
+ outputTimestamp not applied to module-info; breaks reproducible builds
* Task:
+ Updated plugin (requires Maven 3.2.5+) + Java 8 as minimum
* Dependency upgrade:
+ Upgraded Plexus Utils to 3.3.1 + Removed override for Plexus Archiver to fix order of META-INF/ and META-INF/MANIFEST.MF entries + Upgraded Parent to 36 + Updated Plexus Utils to 3.4.2 + Upgraded Parent to 37
maven-jar-plugin was updated to version 3.6.0:

* Bugs fixed:
+ Setting maven.javadoc.isoffline seems to have no effect + javadoc site is broken for projects that contain modules + Alternative doclet page points to an SEO spammy page + [REGRESSION] Transitive dependencies of docletArtifact missing + Unresolvable link in javadoc tag with value ResourcesBundleMojo#getAttachmentClassifier() found in ResourcesBundleMojo + IOException --> NullPointerException in JavadocUtil.copyResource + JavadocReportTest.testExceptions is broken + javadoc creates invalid --patch-module statements + javadoc plugin can not deal with transitive filename based modules
* Improvements:
+ Clean up deprecated and unpreferred methods in JavadocUtil + Cleanup dependency declarations as best possible + Allow building javadoc 'the old fashioned way' after Java 8
* Tasks:
+ Dropped use of deprecated localRepository mojo parameter + Make build pass with Java 20 + Refresh download page
* Dependency upgrade:
+ Updated to commons-io 2.13.0 + Updated plexus-archiver from 4.7.1 to 4.8.0 + Upgraded Parent to 40

* Bugs fixed:
+ Invalid anchors in Javadoc and plugin mojo + Plugin duplicates classes in Java 8 all-classes lists + javadoc site creation ignores configuration parameters
* Improvements:
+ Deprecated parameter 'stylesheet' + Parse stderr output and suppress informational lines + Link to Javadoc references from JDK 17 + Migrate components to JSR 330, get rid of maven-artifact-transfer, update to parent 37
* Tasks:
+ Removed remains of org.codehaus.doxia.sink.Sink
* Dependency upgrades:
+ Upgraded plugins in ITs + Upgraded to Maven 3.2.5 + Updated Maven Archiver to 3.6.0 + Upgraded Maven Reporting API to 3.1.1/Complete with Maven Reporting Impl 3.2.0 + Upgraded commons-text to 1.10.0 + Upgraded Parent to 39 + Upgraded plugins and components
maven-reporting-api was updated to version 3.1.1:

maven-reporting-impl was updated to version 3.2.0:

* Improvement:
+ Render with a skin when report is run in standalone mode
* Dependency upgrades:
+ Upgraded Maven Reporting API to 3.1.1 + Upgraded plugins and components in project and ITs
maven-resolver was updated to version 1.9.18:

* Bugs fixed:
+ Sporadic AccessDeniedEx on Windows + Undo FileUtils changes that altered non-Windows execution path
* Improvements:
+ Native transport should retry on HTTP 429 (Retry-After)
* Task:
+ Deprecated Guice modules + Get rid of component name string literals, make them constants and reusable + Expose configuration for inhibiting Expect-Continue handshake in 1.x + Refresh download page + Resolver should not override given HTTP transport default use of expect-continue handshake
maven-resources-plugin was updated to version 3.3.1:

* Bugs fixed:
+ Resource plugin's handling of symbolic links changed in 3.0.x, broke existing behavior + Resource copying not using specified encoding + java.nio.charset.MalformedInputException: Input length = 1 + Filtering of Maven properties with long names is not working after transition from 2.6 to 3.2.0 + Valid location for directory parameter is always required + Symlinks cause copying resources to fail + FileUtils.copyFile() fails with source file having `lastModified = 0`
* New Features:
+ Added ability to flatten folder structure into target directory when copying resources
* Improvements:
+ Make tests jar reproducible + Describe from and to in 'Copying xresources' info message
* Task:
+ Dropped plexus legacy + Updated to parent POM 39, reformat sources + Updated plugin (requires Maven 3.2.5+) + Require Java 8
* Dependency upgrade:
+ Upgraded maven-plugin parent to 36 + Upgraded Maven Filtering to 3.3.0 + Upgraded plexus-utils to 3.5.1 + Upgraded to maven-filtering 3.3.1
sbt:

xmvn:


SUSE-CU-2024:750-1

Container Advisory IDSUSE-CU-2024:750-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.28
Container Release14.28
The following patches have been included in this update:

SUSE-CU-2024:717-1

Container Advisory IDSUSE-CU-2024:717-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.25
Container Release14.25
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:614-1
ReleasedMon Feb 26 11:31:18 2024
SummaryRecommended update for rpm
Typerecommended
Severityimportant
References1216752
Description:

This update for rpm fixes the following issues:


SUSE-CU-2024:673-1

Container Advisory IDSUSE-CU-2024:673-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.19
Container Release14.19
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:549-1
ReleasedTue Feb 20 17:05:52 2024
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1219243,CVE-2024-0727
Description:

This update for openssl-1_1 fixes the following issues:


Advisory IDSUSE-SU-2024:555-1
ReleasedTue Feb 20 17:22:17 2024
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1219576,CVE-2024-25062
Description:

This update for libxml2 fixes the following issues:


Advisory IDSUSE-RU-2024:560-1
ReleasedWed Feb 21 05:34:18 2024
SummaryRecommended update for Java
Typerecommended
Severitymoderate
References1215973,CVE-2023-37460
Description:

This update for Java fixes the following issues:
plexus-archiver was updated from version 4.2.1 to 4.8.0:


* Security issues fixed:
+ CVE-2023-37460: Avoid override target symlink by standard file in AbstractUnArchiver (bsc#1215973)
* New features and improvements:
+ Added tzst alias for tar.zst archiver/unarchived
* Bugs fixed:
+ Detect permissions for addFile
* Maintenance:
+ Removed public modifier from JUnit 5 tests + Use https in scm/url + Removed junit-jupiter-engine from project dependencies + Removed parent and reports menu from site + Cleanup after 'veryLargeJar' test + Override project.url

* Bugs fixed:
+ Don't apply umask on unknown perms (Win)

* New features and improvements:
+ add umask support and use 022 in RB mode + Use NIO Files for creating temporary files + Deprecate the JAR Index feature (JDK-8302819) + Added Archiver aliases for tar.*
* Maintenance:
+ Use JUnit TempDir to manage temporary files in tests + Override uId and gId for Tar in test + Bump maven-resources-plugin from 2.7 to 3.3.1

* New features and improvements:
+ Fixed path traversal vulnerability The vulnerability affects only directories whose name begins with the same prefix as the destination directory. For example malicious archive may extract file in /opt/directory instead of /opt/dir.

* Bugs fixed:
+ Fixed regression in handling symbolic links

* Bugs fixed:
+ Normalize file separators before warning about equal archive entries

* New features and improvements:
+ keep file/directory permissions in Reproducible Builds mode

* New features and improvements:
+ Added zstd (un)archiver support
* Bugs fixed:
+ Fixed UnArchiver#isOverwrite not working as expected

* New features and improvements:
+ Drop legacy plexus API and use only JSR330 components

* New features and improvements:
+ Require Java 8 + Refactor to use FileTime API + Rename setTime method to setZipEntryTime + Convert InputStreamSupplier to lambdas
* Bugs fixed:
+ Reproducible Builds not working when using modular jar

* New features and improvements:
+ Respect order of META-INF/ and META-INF/MANIFEST.MF entries in a JAR file

* New features and improvements:
+ FileInputStream, FileOutputStream, FileReader and FileWriter are no longer used + Code cleanup

* New features and improvements: + Speed improvements
* Bugs fixed:
+ Fixed use of a mismatching Unicode path extra field in zip unarchiving

* Bugs fixed:
+ Fixed unjustified warning about casing for directory entries

* Bugs fixed:
+ DirectoryArchiver fails for symlinks if a parent directory doesn't exist
objectweb-asm was updated to version 9.6:

* New Opcodes.V22 constant for Java 22
* Bugs fixed:
+ Analyzer produces frames that have different locals than those detected by JRE bytecode verifier + Invalid stackmap generated when the instruction stream has new instruction after invokespecial to + Analyzer can fail to catch thrown exceptions + `asm-analysis` Frame allocates an array unnecessarily inside `executeInvokeInsn` + Fixed bug in `CheckFrameAnalyzer` with static methods

* New Opcodes.V21 constant for Java 21 * New readBytecodeInstructionOffset hook in ClassReader * Added more detailed exception messages * Javadoc improvements and fixes
* Bugs fixed:
+ Silent removal of zero-valued entries from the line-number table

* Changes:
+ New Opcodes.V20 constant for Java 20 + Added more checks in CheckClassAdapter + Javadoc improvements and fixes + `module-info` classes can be built without Gradle and Bnd + Parent POM updated to `org.ow2:ow2:1.5.1`
* Bugs fixed:
+`CheckClassAdapter` is no longer transparent for MAXLOCALS + Added public `getDelegate` method to all visitor classes + Analyzer does not compute optimal maxLocals for static methods + Fixed `SignatureWriter` when a generic type has a depth over 30 + Skip remap inner class name if not changed in Remapper
maven-archiver was updated from version 3.5.0 to 3.6.1:

* New Features:
+ Deprecated the JAR Index feature (JDK-8302819)
* Task:
+ Refreshed download page + Prefer JDK features over plexus-utils, plexus-io

* Task:
+ Require Java 8 + Drop m-shared-utils from deps
maven-assembly-plugin was updated from version 3.3.0 to 3.6.0:

* Bugs fixed:
+ finalName as readonly parameter makes common usecases very complicated + Symbolic links get copied with absolute path + Warning if using Maven 3.9.1 + Minimal default Manifest configuration of jar archiver should be respected
* New Features:
+ Support Zstandard compression format
* Improvements:
+ In RB mode, apply 022 umask to ignore environment group write umask + Added system requirements history
* Task: + Dropped deprecated repository element + Support running build on Java 20 + Refresh download page + Cleanup declared dependencies + Avoid using deprecated methods of `plexus-archiver`

* Bugs fixed:
+ File permissions removed during assembly:single since 3.2.0

* Bugs fixed:
+ Fixed Excludes filtering
* Task:
+ Fixed examples to refer to https instead of http

* Bugs fixed:
+ Fixed error build with shared assemblies

* Bugs fixed:
+ dependencySet includes filter with classifier breaks include of artifacts without classifier
* Task:
+ Speed improvements + Update plugin (requires Maven 3.2.5+) + Assembly plugin resolves too much, even plugins used to build dependencies + Deprecated the repository element in assembly descriptor + Upgraded to Java 8, drop unused dependencies
maven-common-artifact-filters was updated from version 3.0.1 to 3.3.2:

* Bugs fixed:
+ PatternIncludesArtifactFilters raising NPE for patterns w/ wildcards and artifactoid w/ null on any coordinate

* Bugs fixed:
+ Pattern w/ 4 elements may be GATV or GATC

* Bugs fixed:
+ null passed to DependencyFilter in EclipseAetherFilterTransformerTest + PatternIncludesArtifactFilter#include(Artifact) + Common Artifact Filters pattern parsing with classifier is broken
* Task:
+ Sanitized dependencies + Upgraded to Maven Parent 36, to Maven 3.2.5, to Java 8 and clean up dependencies

* Improvements:
+ Big speed improvements for patterns that do not contain any wildcard

* Bugs fixed:
+ Updated JIRA URL for maven-common-artifact-filters
* Improvements:
+ Made build Reproducible

* Bugs fixed:
+ Several filters do not preserve order of artifacts filtered
maven-compiler-plugin was updated from version 3.10.1 to 3.11.0:
Changes of 3.11.0:
* New features and improvements:
+ Added a useModulePath switch to the testCompile mojo + Allow dependency exclusions for 'annotationProcessorPaths' + Use maven-resolver to resolve 'annotationProcessorPaths' dependencies + Upgrade plexus-compiler to improve compiling message + compileSourceRoots parameter should be writable + Change showWarnings to true by default + Warn about warn-config conflicting values + Update default source/target from 1.7 to 1.8 + Display recompilation causes + Added some parameter to pattern from stale source calculation + Added dedicated option for implicit javac flag
* Bugs fixed:
+ Fixed incorrect detection of dependency change + Test with Maven 3.9.0 and fix the failing IT + Resolved all annotation processor dependencies together + Defining maven.compiler.release as empty string ends with NumberFormatException in testCompileMojo + Fixed missing dirs in createMissingPackageInfoClasses + Set Xcludes in config passed to actual compiler
maven-dependency-analyzer was updated from version 1.10 to 1.13.2:

* Changes and bugs fixed:
+ Made mvn dependency:analyze work with OpenJDK 11 + Fixed jdk8 incompatibility at runtime (NoSuchMethodError) + Upgraded asm to 8.0.1 + Use try with resources to avoid leaks + dependency:analyze recommends test scope for test-only artifacts that have non-test scope + remove reference to deprecated public mutable field + Updated JIRA URL + dependency:analyze should recommend narrower scope where possible + Remove dependency on jmock + Inline deprecated field + Added more JavaDoc + Handle different classes from same artifact used by model and test code + Included class names in used undeclared dependencies + Check maximum allowed Maven version + Get rid of maven-plugin-testing-tools for IT test + Require Maven 3.2.5+ + Analyze project classes only once + Fixed array parsing + CONSTANT_METHOD_TYPE should not add to classes + Inner classes are in same compilation unit as container class + Upgraded Parent to 36 + Cleanup IT tests + Replace Codehaus Plexus utils with java.nio.file.Files and Apache Commons + Fixed bug with 'non-test scoped test only dependencies found' + Bump asm from 9.4 to 9.5 + Refresh download page + Upgrade Parent to 39 + Build on JDK 19, 20 + Prefer JDK classes to Plexus utils + Replaced System.out by logger + Fixed java.lang.RuntimeException: Unknown constant pool type + Switched to JUnit 5 + Dependency improvements
maven-dependency-plugin was updated from version 3.1.2 to 3.6.0:

* Bugs fixed:
+ Obsolete example of -Dverbose on web page + Unsupported verbose option still appears in docs + dependency:go-offline does not use repositories from parent pom in reactor build + Fixed possible NPE + `dependency:analyze-only` goal fails on OpenJDK 14 + FileWriter and FileReader should be replaced + Dependency Plugin go-offline doesn't respect artifact classifier + analyze-only failed: Unsupported class file major version 60 (Java 16) + analyze-only failed: Unsupported class file major version 61 (Java 17) + copy-dependencies fails when using excludeScope=test + mvn dependency:analyze detected wrong transitive dependency + dependency plugin does not work with JDK 16 + skip dependency analyze in ear packaging + Non-test dependency reported as Non-test scoped test only dependency + 'Dependency not found' with 3.2.0 and Java-17 while analyzing + Tree plugin does not terminate with 3.2.0 + Minor improvement - continue + analyze-only failed: PermittedSubclasses requires ASM9 + Broken Link to 'Introduction to Dependency Mechanism Page' + Sealed classes not supported + Dependency tree in verbose mode for war is empty + Javadoc was not updated to reflect that :tree's verbose option is now ok + error dependency:list (caused by postgresql dependency) + :list-classes does not skip if skip is set + :list-classes does not use GAV parameters
* New Features:
+ Reintroduce the verbose option for dependency:tree + List classes in a given artifact + dependency:analyze should recommend narrower scope where possible + Added analyze parameter 'ignoreUnusedRuntime' + Allow ignoring non-test-scoped dependencies + Added a option to unpack goals + Allow auto-ignore of all non-test scoped dependencies used only in test scope
* Improvements:
+ Unused method o.a.m.p.d.t.TreeMojo.containsVersion + Minor improvements + GitHub Action build improvement + dependency:analyze should list the classes that cause a used undeclared dependency + Improve documentation of analyze - Non-test scoped + Turn warnings into errors instead of failOnWarning + maven-dependency-plugin should leverage plexus-build-api to support IDEs + TestListClassesMojo logs too much + Use outputDirectory from AbstractMavenReport + Removed not used dependencies / Replace parts + list-repositories - improvements + warns about depending on plexus-container-default + Replace AnalyzeReportView with a new AnalyzeReportRenderer
* Task:
+ Removed no longer required exclusions + Java 1.8 as minimum + Explicitly start and end tables with Doxia Sinks in report renderers + Replace Maven shared StringUtils with Commons Lang3 + Removed unused and ignored parameter - useJvmChmod + Removed custom plexus configuration + Code refactor - UnpackUtil + Refresh download page
maven-dependency-tree was updated from version 3.0.1 to 3.2.1:
  • Changes in 3.2.1:

* Bugs fixed:
+ DependencyCollectorBuilder does not collect dependencies when artifact has 'war' packaging + Transitive provided dependencies are not removed from collected dependency graph
* New Features:
+ DependencyCollectorBuilder more configurable
* Improvements:
+ DependencyGraphBuilder does not provide verbose tree + DependencyGraphBuilders shouldn't need reactorProjects for resolving dependencies + Maven31DependencyGraphBuilder should not download dependencies other than the pom + Fixed `plexus-component-annotation` in line with `plexus-component-metadata` + Upgraded parent to 31 + Added functionality to collect raw dependencies in Maven 3+ + Annotate DependencyNodes with dependency management metadata + Require Java 8 + Upgrade `org.eclipse.aether:aether-util` dependency in org.apache.maven.shared:maven-dependency-tree + Added Exclusions to DependencyNode + Made build Reproducible + Migrate plexus component to JSR-330 + Drop maven 3.0 compatibility
* Dependency upgrade:
+ Upgrade shared-component to version 33 + Upgrade Parent to 36 + Bump maven-shared-components from 36 to 37
  • Removed unnecessary dependency on xmvn tools and parent pom

maven-enforcer was updated to version 3.4.1:
  • Update to version 3.4.1:

* Bugs fixed:
+ In a multi module project 'bannedDependencies' rule tries to resolve project artifacts from external repository + Require Release Dependencies ignorant about aggregator build + banDuplicatePomDependencyVersions does not check managementDependencies + Beanshell rule is not thread-safe + RequireSnapshotVersion not compatible with CI Friendly Versions (${revision}) + NPE when using new syntax with maven-enforcer-plugin + Broken links on Maven Enforcer Plugin site + RequirePluginVersions not recognizing versions-from-properties + [REGRESSION] RequirePluginVersions fails when versions are inherited + requireFilesExist rule should be case sensitive + Broken Links on Project Home Page + TestRequireOS uses hamcrest via transitive dependency + plexus-container-default in enforcer-api is very outdated + classifier not included in output of failes RequireUpperBoundDeps test + Exclusions are not considered when looking at parent for requireReleaseDeps + requireUpperBoundDeps does not fail when packaging is 'war' + DependencyConvergence in 3.0.0 fails on provided scoped dependencies + NPE on requireReleaseDeps with non-matching includes + RequireUpperBoundDeps now follow scope provided transitive dependencies + Use currently build artifacts in IT tests + requireReleaseDeps does not support optional dependencies or runtime scope + Enforcer 3.0.0 breaks with Maven 3.8.4 + Version 3.1.0 is not enforcing bannedDependencies rules + DependencyConvergence treats provided dependencies are runtime dependencies + Plugin shouldn't use NullPointerException for non-exceptional code flow + NPE in RequirePluginVersions + ReactorModuleConvergence not cached in reactor + RequireUpperBoundDeps fails on provided dependencies since 3.2.1 + Problematic dependency resolution by new 'banDynamicVersions' rule + banTransitiveDependencies: failing if a transitive dependencies has another version than the resolved one + Filtering dependency tree by scope + Upgrading to 3.0.0 causes 'Could not build dependency tree' with repositories some unknown protocol + DependencyConvergence in 3.1.0 fails when using version ranges + Semantics of 'ignores' parameter of 'banDynamicVersions' is inverted + Omission of 'excludedScopes' parameter of 'banDynamicVersions' causes NPE + ENFORCER: plugin-info and mojo pages not found
* New Features:
+ requireUpperBounds deps should have includes + Introduce RequireTextFileChecksum with line separator normalization + allow no rules + show rules processed + DependencyConvergence should support including/excluding certain dependencies + Support declaring external banned dependencies in an external file/URL + Maven enforcer rule which checks that all dependencies have an explicit scope set + Maven enforcer rule which checks that all dependencies in dependencyManagement don't have an explicit scope set + Rule for no version ranges, version placeholders or SNAPSHOT versions + Allow one of many files in RequireFiles rules to pass + Skip specific rules + New Enforcer API + New Enforcer API - RuleConfigProvider + Move Built-In Rules to new API
* Improvements:
+ wildcard ignore in requireReleaseDeps + Improve documentation about writing own Enforcer Rule + RequireActiveProfile should respect inherited activated profiles + Upgrade maven-dependency-tree to 3.x + Improve dependency resolving in multiple modules project + requireUpperBoundDeps: add [] and colors to the output + Example for writing a custom rule should be upgraded + Along with JavaVersion, allow enforcement of the JavaVendor + Included Java vendor in display-info output + requireMavenVersion x.y.z is processed as (,x.y.z] instead of [x.y.z,) + Consistently format artifacts same as dependency:tree + Made build Reproducible + Added support for excludes/includes in requireJavaVendor rule + Introduce Maven Enforcer Extension + Extends RequirePluginVersions with banMavenDefaults + Shared GitHub Actions + Log at ERROR level when is set + Reuse getDependenciesToCheck results across rules + Violation messages can be really hard to find in a multi module project + Clarify class loading for custom Enforcer rules + Using junit jupiter bom instead of single artifacts. + Get rid of maven-dependency-tree dependency + Allow 8 as JDK version for requireJavaVersion + Improve error message for rule 'requireJavaVersion' + Include Java Home in Message for Java Rule Failures + Manage all Maven Core dependencies as provided + Mange rules configuration by plugin + Deprecate 'rules' property and introduce 'enforcer.rules' as a replacement + Change success message from executed to passed + EnforcerLogger: Provide isDebugEnabled(), isErrorEnabled(), isWarnEnabled() and isInfoEnabled() + Properly declare dependencies
* Test:
+ Regression test for dependency convergence problem fixed in 3.0.0
* Task:
+ Removed reference to travis or switch to travis.com + Fixed maven assembly links + Require Java 8 + Verify working with Maven 4 + Code cleanup + Refresh download page + Deprecate display-info mojo + Refresh site descriptors + Superfluous blanks in BanDuplicatePomDependencyVersions + Rename ResolveUtil to ResolverUtil
maven-plugin-tools was updated from version 3.6.0 to version 3.9.0:
- Changes of version 3.9.0:
* Bugs fixed:
+ Fixed *-mojo.xml (in PluginXdocGenerator) is overwritten when multiple locales are defined + Generated table by PluginXdocGenerator does not contain default attributes
* Improvements:
+ Omit empty line in generated help goal output if plugin description is empty + Use Plexus I18N rather than fiddling with
* Task:
+ Removed reporting from maven-plugin-plugin: create maven-plugin-report-plugin
* Dependency upgrade:
+ Upgrade plugins and components (in ITs)
  • Changes of version 3.8.2:

* Improvements:
+ Used Resolver API, get rid of localRepository
* Dependency upgrade:
+ Bump httpcore from 4.4.15 to 4.4.16 + Bump httpclient from 4.5.13 to 4.5.14 + Bump antVersion from 1.10.12 to 1.10.13 + Bump slf4jVersion from 1.7.5 to 1.7.36 + Bump plexus-java from 1.1.1 to 1.1.2 + Bump plexus-archiver from 4.6.1 to 4.6.3 + Bump jsoup from 1.15.3 to 1.15.4 + Bump asmVersion from 9.4 to 9.5 + Bump assertj-core from 3.23.1 to 3.24.2
  • Changes of version 3.8.1:

* Bugs fixed:
+ Javadoc reference containing a link label with spaces are not detected + JavadocLinkGenerator.createLink: Support nested binary class names + ERROR during build of m-plugin-report-p and m-plugin-p: Dependencies in wrong scope + 'Executes as an aggregator plugin' documentation: s/plugin/goal/ + Maven scope warning should be logged at WARN level + Fixed Temporary File Information Disclosure Vulnerability
* New features:
+ Support mojos using the new maven v4 api
* Improvements:
+ Plugin descriptor should contain the requiredJavaVersion/requiredMavenVersion + Execute annotation only supports standard lifecycle phases due to use of enum + Clarify deprecation of all extractors but the maven-plugin-tools-annotations
* Dependency upgrade:
+ Update to Maven Parent POM 39 + Bump junit-bom from 5.9.1 to 5.9.2 + Bump plexus-archiver from 4.5.0 to 4.6.1
  • Changes of version 3.7.1: * Bugs fixed:

+ Maven scope warning should be logged at WARN level
  • Changes of version 3.7.0:

* Bugs fixed:
+ The plugin descriptor generated by plugin:descriptor does not consider @ see javadoc taglets + Report-Mojo doesn't respect input encoding + Generating site reports for plugin results in NoSuchMethodError + JDK Requirements in plugin-info.html: Consider property 'maven.compiler.release' + Parameters documentation inheriting @ since from Mojo can be confusing + Don't emit warning for missing javadoc URL of primitives + Don't emit warning for missing javadoc URI if no javadoc sources are configured + Parameter description should be taken from annotated item
* New Features:
+ Added link to javadoc in configuration description page for user defined types of Mojos. + Allow only @ Deprecated annotation without @ deprecated javadoc tag + add system requirements history section + report: allow to generate usage section in plugin-info.html with true + Allow @ Parameter on setters methods + Extract plugin report into its own plugin + report: Expose generics information of Collection and Map types
* Improvement:
+ plugin-info.html should contain a better Usage section + Do not overwrite generate files with no content change + Upgrade to JUnit 5 and @ Inject annotations + Support for java 20 - ASM 9.4 + Don't print empty Memory, Disk Space in System Requirements + simplification in helpmojo build + Get rid of plexus-compiler-manager from tests + Use Maven core artifacts in provided scope + report and descriptor goal need to evaluate Javadoc comments differently + Allow to reference aggregator javadoc from plugin report
* Task:
+ Detect legacy/javadoc Mojo definitions, warn to use Java 5 annotations + Update level to Java 8 + Deprecate scripting support for mojos + Deprecate requirements parameter in report Mojo + Removed duplicate code from PluginReport + Prepare for Doxia (Sitetools) 2.0.0 + Fixed documentation for maven-plugin-report-plugin + Removed deprecated items from new maven-plugin-report-plugin + Improve site build + Improve dependency management + Plugin generator generation fails when the parent class comes from a different project
* Dependency upgrade:
+ Upgrade Maven Reporting API/Impl to 3.1.0 + Upgrade Parent to 36 + Upgrade project dependencies after JDK 1.8 + Bump maven-parent from 36 to 37 + Upgrade Maven Reporting API to 3.1.1/Maven Reporting Impl to 3.2.0 + Upgrade plexus-utils to 3.5.0
  • Changes of version 3.6.4:

* Restored compatibility with Maven 3 ecosystem * Upgraded dependencies
  • Changes of version 3.6.3:

* Added prerequisites to plugin pom * Exclude dependency in provided scope from plugin descriptor * Get rid of String.format use * Fixed this logging as well * Simplify documentation * Exclude maven-archiver and maven-jxr from warning
  • Changes of version 3.6.2:

* Deprecated unused requiresReports flag * Check that Maven dependencies are provided scope * Update ITs * Use shared gh action * Deprecate unsupported Mojo descriptor items * Weed out ITs * Upgrade to maven 3.x and avoid using deprecated API * Drop legacy dependencies * Use shared gh action - v1 * Fixed wording in javadoc
  • Changes of version 3.6.1:

* What's Changed: * Added missing @OverRide and make methods static * Upgraded to JUnit 4.12 * Upgraded parent POM and other dependencies * Updated plugins * Upgraded Doxia Sitetools to 1.9.2 to remove dependency on Struts * removed Maven 2 info * Removed unneeded dependency * Tighten the dependency tree * Ignore .checkstyle * Strict dependencies for maven-plugin-tools-annotations * Improved @execute(goal...) docs * Improve @execute(lifecycle...) docs
plexus-compiler was updated from version 2.11.1 to 2.14.2:
  • Changes of 2.14.2:

* Removed:
+ Drop J2ObjC compiler
* New features and improvements:
+ Update AspectJ Compiler to 1.9.21 to support Java 21 + Require JDK 17 for build + Improve locking on JavacCompiler + Include 'parameter' and 'preview' describe log + Switch to SISU annotations and plugin, fixes #217 + Support jdk 21 + Require Maven 3.5.4+ + Require Java 11 for plexus-compiler-eclipse an javac-errorprone and aspectj compilers + Added support to run its with Java 20
* Bugs fixed:
+ Fixed javac memory leak + Validate zip file names before extracting (Zip Slip) + Restore AbstractCompiler#getLogger() method + Return empty list for not existing source root location + Improve javac error output parsing
  • Changes of 2.13.0:

* New features and improvements:
+ Fully ignore any possible jdk bug + MCOMPILER-402: Added implicitOption to CompilerConfiguration + Added a custom compile argument replaceProcessorPathWithProcessorModulePath to force the plugin replace processorPath with processormodulepath + describe compiler configuration on run + simplify 'Compiling' info message: display relative path
* Bugs fixed:
+ Respect CompilerConfiguration.sourceFiles in EclipseJavaCompiler + Avoid NPE in AspectJCompilerTest on AspectJ 1.9.8+
* Dependency updates:
+ Bump maven-surefire-plugin from 3.0.0-M5 to 3.0.0-M6 + Bump error_prone_core from 2.11.0 to 2.13.1 + Bump github/codeql-action from 1 to 2 + Bump ecj from 3.28.0 to 3.29.0 + Bump release-drafter/release-drafter from 5.18.1 to 5.19.0 + Bump ecj from 3.29.0 to 3.30.0 + Bump maven-invoker-plugin from 3.2.2 to 3.3.0 + Bump maven-enforcer-plugin from 3.0.0 to 3.1.0 + Bump error_prone_core from 2.13.1 to 2.14.0 + Bump maven-surefire-plugin from 3.0.0-M6 to 3.0.0-M7 + Bump ecj from 3.31.0 to 3.32.0 + Bump junit-bom from 5.9.0 to 5.9.1 + Bump ecj from 3.30.0 to 3.31.0 + Bump groovy from 3.0.12 to 3.0.13 + Bump groovy-json from 3.0.12 to 3.0.13 + Bump groovy-xml from 3.0.12 to 3.0.13 + Bump animal-sniffer-maven-plugin from 1.21 to 1.22 + Bump error_prone_core from 2.14.0 to 2.15.0 + Bump junit-bom from 5.8.2 to 5.9.0 + Bump groovy-xml from 3.0.11 to 3.0.12 + Bump groovy-json from 3.0.11 to 3.0.12 + Bump groovy from 3.0.11 to 3.0.12
* Maintenance:
+ Require Maven 3.2.5


Advisory IDSUSE-SU-2024:597-1
ReleasedThu Feb 22 20:07:11 2024
SummarySecurity update for mozilla-nss
Typesecurity
Severityimportant
References1216198,CVE-2023-5388
Description:

This update for mozilla-nss fixes the following issues:
Update to NSS 3.90.2:

  • CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198)


SUSE-CU-2024:619-1

Container Advisory IDSUSE-CU-2024:619-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.12
Container Release14.12
The following patches have been included in this update:

SUSE-CU-2024:589-1

Container Advisory IDSUSE-CU-2024:589-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.9
Container Release14.9
The following patches have been included in this update:

SUSE-CU-2024:545-1

Container Advisory IDSUSE-CU-2024:545-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-14.7
Container Release14.7
The following patches have been included in this update:

SUSE-CU-2024:465-1

Container Advisory IDSUSE-CU-2024:465-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.39
Container Release13.39
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:321-1
ReleasedFri Feb 2 13:51:01 2024
SummarySecurity update for java-11-openjdk
Typesecurity
Severityimportant
References1218903,1218905,1218906,1218907,1218909,1218911,CVE-2024-20918,CVE-2024-20919,CVE-2024-20921,CVE-2024-20926,CVE-2024-20945,CVE-2024-20952
Description:

This update for java-11-openjdk fixes the following issues:
Updated to version 11.0.22 (January 2024 CPU):
- CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM due to a missing bounds check (bsc#1218907). - CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class file verifier (bsc#1218903). - CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM that could lead to corruption of JVM memory (bsc#1218905). - CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906). - CVE-2024-20945: Fixed a potential private key leak through debug logs (bsc#1218909). - CVE-2024-20952: Fixed an RSA padding issue and timing side-channel attack against TLS (bsc#1218911).
Find the full release notes at:
https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029215.html


Advisory IDSUSE-RU-2024:322-1
ReleasedFri Feb 2 15:13:26 2024
SummaryRecommended update for aaa_base
Typerecommended
Severitymoderate
References1107342,1215434
Description:

This update for aaa_base fixes the following issues:

  • Set JAVA_HOME correctly (bsc#1107342, bsc#1215434)


Advisory IDSUSE-SU-2024:305-1
ReleasedMon Mar 11 14:15:37 2024
SummarySecurity update for cpio
Typesecurity
Severitymoderate
References1218571,1219238,CVE-2023-7207
Description:

This update for cpio fixes the following issues:

  • Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238)


SUSE-CU-2024:410-1

Container Advisory IDSUSE-CU-2024:410-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.22
Container Release13.22
The following patches have been included in this update:

SUSE-CU-2024:387-1

Container Advisory IDSUSE-CU-2024:387-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.20
Container Release13.20
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:238-1
ReleasedFri Jan 26 10:56:41 2024
SummarySecurity update for cpio
Typesecurity
Severitymoderate
References1218571,CVE-2023-7207
Description:

This update for cpio fixes the following issues:

  • CVE-2023-7207: Fixed a path traversal issue that could lead to an arbitrary file write during archive extraction (bsc#1218571).


Advisory IDSUSE-RU-2024:244-1
ReleasedFri Jan 26 13:01:27 2024
SummaryRecommended update for util-linux
Typerecommended
Severitymoderate
References1207987
Description:

This update for util-linux fixes the following issues:

  • Fix performance degradation (bsc#1207987)


SUSE-CU-2024:332-1

Container Advisory IDSUSE-CU-2024:332-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.15
Container Release13.15
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:214-1
ReleasedWed Jan 24 16:01:31 2024
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1214668,1215241,1217460
Description:

This update for systemd fixes the following issues:

  • resolved: actually check authenticated flag of SOA transaction
  • core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive
  • core: Add trace logging to mount_add_device_dependencies()
  • core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460)
  • core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies
  • core: wrap some long comment
  • utmp-wtmp: Handle EINTR gracefully when waiting to write to tty
  • utmp-wtmp: Fix error in case isatty() fails
  • homed: Handle EINTR gracefully when waiting for device node
  • resolved: Handle EINTR returned from fd_wait_for_event() better
  • sd-netlink: Handle EINTR from poll() gracefully, as success
  • varlink: Handle EINTR gracefully when waiting for EIO via ppoll()
  • stdio-bridge: Don't be bothered with EINTR
  • sd-bus: Handle EINTR return from bus_poll() (bsc#1215241)
  • core: Replace slice dependencies as they get added (bsc#1214668)


SUSE-CU-2024:302-1

Container Advisory IDSUSE-CU-2024:302-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.11
Container Release13.11
The following patches have been included in this update:

SUSE-CU-2024:273-1

Container Advisory IDSUSE-CU-2024:273-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.8
Container Release13.8
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:163-1
ReleasedFri Jan 19 05:47:04 2024
SummaryRecommended update for google-guice
Typerecommended
Severitymoderate
References
Description:

This update for google-guice fixes the following issues:

  • google-guice was updated from version 4.1 to 5.1.0: * Changes of version 4.2: + Added Java 9 and JPMS support + Multibindings are now in the Guice core artifact. The multibindings artifact is empty to prevent confusion during upgrading and will be removed in a later release. + Improved the performance of guice provisioning (by about 20%) by changing the way errors are reported. Guice will no longer report multiple errors during provisioning (Guice still reports multiple errors during injector creation). + Improved error messages for a missing binding. + AbstractModule.configure() is non-abstract to allow modules with only @Provides/@ProvidesIntoSet/... methods. + Added a CheckedProviders class. + Changed the way Singletons work to not rely on ThreadLocals nor WeakReferences. + Added MapBinderBinding.getEntries(Iterable). + Deprecated ProvisionListener.ProvisionInvocation .getDependencyChain(). + Ensure that Struts interceptors are populated even if they are created after the injector (Fixes #1081, #1075). + Added support for multibindings with annotations in the Guice DaggerMethodScanner. * Changes of version 4.2.1: + Added Java 10 support (updated cglib & asm). + Minor updates to the testlib extension. * Changes of version 4.2.2: + Added Java 11 support (updated cglib & asm) * Changes of version 4.2.3: + Added Java 14 support (updated asm). + Added Injector.getElements API, to expose all Element SPI types from the Injector. + Added Injector.getAllMembersInjectorInjectionPoints API, to expose injection points created by arbitrary members injection. + Added getAlternateKeys to Multibinder SPI types (MultibinderBinding, MapBinderBinding, OptionalBinderBinding), to explicitly list the other keys these bindings are available as. + Scan for (and bind) @Provides-like methods in a consistent ordering, rather than relying on the non-deterministic Class.getDeclaredMembers ordering. + Updated DaggerAdapter to work with newer dagger code. + Fixed a subtle bug with eager singleton evaluation. + Updated @RequestScope's scope annotation to the JSR330 @Scope, so it can be reused by non-Guice DI systems. + Clarified the error message when an injectable constructor is missing. + Added deprecated overloads to various Modules methods, to make it clearer when calling them is unnecessary. + Added factory methods to Modules for common Binder configuration methods, to make it easier to configure them. * Changes of version 5.0.1: + Added Java 15 support (updated asm and bug fixes). + Removed cglib as a core dependency. + Improved error messages. + Improved support for using Guice with Kotlin. + Added a mechanism to restrict who can bind types or annotations, to allow library authors to control their bindings. + Removed no-aop build variant. + Fixed 'illegal reflective access' warnings. * Changes of version 5.1.0: + Added support for Java 17.
  • Generate the ant build system using the maven pom files.


SUSE-CU-2024:262-1

Container Advisory IDSUSE-CU-2024:262-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-13.7
Container Release13.7
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:136-1
ReleasedThu Jan 18 09:53:47 2024
SummarySecurity update for pam
Typesecurity
Severitymoderate
References1217000,1218475,CVE-2024-22365
Description:

This update for pam fixes the following issues:

  • CVE-2024-22365: Fixed a local denial of service during PAM login due to a missing check during path manipulation (bsc#1218475).
  • Check localtime_r() return value to fix crashing (bsc#1217000)


Advisory IDSUSE-SU-2024:140-1
ReleasedThu Jan 18 11:34:58 2024
SummarySecurity update for libssh
Typesecurity
Severityimportant
References1211188,1211190,1218126,1218186,1218209,CVE-2023-1667,CVE-2023-2283,CVE-2023-48795,CVE-2023-6004,CVE-2023-6918
Description:

This update for libssh fixes the following issues:
Security fixes:
- CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209) - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126) - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186) - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188) - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)
Other fixes:

  • Update to version 0.9.8 - Allow @ in usernames when parsing from URI composes

  • Update to version 0.9.7 - Fix several memory leaks in GSSAPI handling code


SUSE-CU-2024:232-1

Container Advisory IDSUSE-CU-2024:232-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-12.5
Container Release12.5
The following patches have been included in this update:

SUSE-CU-2024:202-1

Container Advisory IDSUSE-CU-2024:202-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-12.2
Container Release12.2
The following patches have been included in this update:

SUSE-CU-2024:178-1

Container Advisory IDSUSE-CU-2024:178-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-11.16
Container Release11.16
The following patches have been included in this update:

SUSE-CU-2024:115-1

Container Advisory IDSUSE-CU-2024:115-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-11.14
Container Release11.14
The following patches have been included in this update:
Advisory IDSUSE-SU-2024:70-1
ReleasedTue Jan 9 18:29:39 2024
SummarySecurity update for tar
Typesecurity
Severitylow
References1217969,CVE-2023-39804
Description:

This update for tar fixes the following issues:

  • CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969).


SUSE-CU-2024:114-1

Container Advisory IDSUSE-CU-2024:114-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-11.11
Container Release11.11
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:62-1
ReleasedMon Jan 8 11:44:47 2024
SummaryRecommended update for libxcrypt
Typerecommended
Severitymoderate
References1215496
Description:

This update for libxcrypt fixes the following issues:

  • fix variable name for datamember [bsc#1215496]
  • added patches fix https://github.com/besser82/libxcrypt/commit/b212d601549a0fc84cbbcaf21b931f903787d7e2


SUSE-CU-2024:53-1

Container Advisory IDSUSE-CU-2024:53-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-11.5
Container Release11.5
The following patches have been included in this update:
Advisory IDSUSE-RU-2024:26-1
ReleasedThu Jan 4 11:15:24 2024
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1214980
Description:

This update for mozilla-nss fixes the following issues:
Mozilla NSS was updated to NSS 3.90.1

  • regenerate NameConstraints test certificates.
  • add OSXSAVE and XCR0 tests to AVX2 detection.


SUSE-CU-2024:52-1

Container Advisory IDSUSE-CU-2024:52-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-11.2
Container Release11.2
The following patches have been included in this update:

SUSE-CU-2023:4327-1

Container Advisory IDSUSE-CU-2023:4327-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.128
Container Release10.128
The following patches have been included in this update:

SUSE-CU-2023:4282-1

Container Advisory IDSUSE-CU-2023:4282-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.124
Container Release10.124
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4962-1
ReleasedFri Dec 22 13:45:06 2023
SummaryRecommended update for curl
Typerecommended
Severityimportant
References1216987
Description:

This update for curl fixes the following issues:

  • libssh: Implement SFTP packet size limit (bsc#1216987)

This update also ships curl to the INSTALLER channel.


SUSE-CU-2023:4214-1

Container Advisory IDSUSE-CU-2023:4214-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.122
Container Release10.122
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:4891-1
ReleasedMon Dec 18 16:31:49 2023
SummarySecurity update for ncurses
Typesecurity
Severitymoderate
References1201384,1218014,CVE-2023-50495
Description:

This update for ncurses fixes the following issues:

  • CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014)
  • Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384)


SUSE-CU-2023:4154-1

Container Advisory IDSUSE-CU-2023:4154-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.120
Container Release10.120
The following patches have been included in this update:

SUSE-CU-2023:4092-1

Container Advisory IDSUSE-CU-2023:4092-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.111
Container Release10.111
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4700-1
ReleasedMon Dec 11 07:03:27 2023
SummaryRecommended update for p11-kit
Typerecommended
Severitymoderate
References
Description:

This update for p11-kit fixes the following issues:

  • Ensure that programs using can be compiled with CRYPTOKI_GNU. Fixes GnuTLS builds (jsc#PED-6705).


Advisory IDSUSE-RU-2023:4716-1
ReleasedMon Dec 11 18:38:23 2023
SummaryRecommended update for git
Typerecommended
Severitymoderate
References1216501
Description:

This update for git fixes the following issues:

  • Add rule for /etc/gitconfig in gitweb.cgi apparmor profile (bsc#1216501).
  • gitweb.cgi AppArmor profile - make the profile a named profile - add local/include to make custom additions easier


Advisory IDSUSE-RU-2023:4723-1
ReleasedTue Dec 12 09:57:51 2023
SummaryRecommended update for libtirpc
Typerecommended
Severitymoderate
References1216862
Description:

This update for libtirpc fixes the following issue:

  • fix sed parsing in specfile (bsc#1216862)


SUSE-CU-2023:4030-1

Container Advisory IDSUSE-CU-2023:4030-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.101
Container Release10.101
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:4659-1
ReleasedWed Dec 6 13:04:57 2023
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1217573,1217574,CVE-2023-46218,CVE-2023-46219
Description:

This update for curl fixes the following issues:

  • CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573).
  • CVE-2023-46219: HSTS long file name clears contents (bsc#1217574).


Advisory IDSUSE-RU-2023:4671-1
ReleasedWed Dec 6 14:33:41 2023
SummaryRecommended update for man
Typerecommended
Severitymoderate
References
Description:


This update of man fixes the following problem:

  • The 'man' commands is delivered to SUSE Linux Enterprise Micro to allow browsing man pages.


SUSE-CU-2023:3993-1

Container Advisory IDSUSE-CU-2023:3993-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.95
Container Release10.95
The following patches have been included in this update:

SUSE-CU-2023:3960-1

Container Advisory IDSUSE-CU-2023:3960-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.92
Container Release10.92
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4617-1
ReleasedThu Nov 30 09:37:04 2023
SummaryRecommended update for javapackages-tools
Typerecommended
Severitymoderate
References
Description:

This update for javapackages-tools fixes the following issues:

  • Add requirement for `python-xml` as it is needed by some scripts
  • Ensure reproducibility of built binaries
  • Minor bug fixes


Advisory IDSUSE-SU-2023:4619-1
ReleasedThu Nov 30 10:13:52 2023
SummarySecurity update for sqlite3
Typesecurity
Severityimportant
References1210660,CVE-2023-2137
Description:

This update for sqlite3 fixes the following issues:

  • CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660).


SUSE-CU-2023:3908-1

Container Advisory IDSUSE-CU-2023:3908-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.88
Container Release10.88
The following patches have been included in this update:

SUSE-CU-2023:3872-1

Container Advisory IDSUSE-CU-2023:3872-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.85
Container Release10.85
The following patches have been included in this update:

SUSE-CU-2023:3830-1

Container Advisory IDSUSE-CU-2023:3830-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.84
Container Release10.84
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:4504-1
ReleasedTue Nov 21 13:27:50 2023
SummarySecurity update for libxml2
Typesecurity
Severitymoderate
References1216129,CVE-2023-45322
Description:

This update for libxml2 fixes the following issues:

  • CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).


Advisory IDSUSE-SU-2023:4518-1
ReleasedTue Nov 21 17:35:30 2023
SummarySecurity update for openssl-1_1
Typesecurity
Severityimportant
References1216922,CVE-2023-5678
Description:

This update for openssl-1_1 fixes the following issues:

  • CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).


Advisory IDSUSE-SU-2023:4527-1
ReleasedWed Nov 22 14:38:50 2023
SummarySecurity update for maven, maven-resolver, sbt, xmvn
Typesecurity
Severitymoderate
References1162112,1216529,CVE-2023-46122
Description:

This update for maven, maven-resolver, sbt, xmvn fixes the following issues:

  • CVE-2023-46122: Fixed an arbitrary file write when extracting a crafted zip file with sbt (bsc#1216529).
  • Upgraded maven to version 3.9.4
  • Upgraded maven-resolver to version 1.9.15.


SUSE-CU-2023:3787-1

Container Advisory IDSUSE-CU-2023:3787-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.77
Container Release10.77
The following patches have been included in this update:

SUSE-CU-2023:3746-1

Container Advisory IDSUSE-CU-2023:3746-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.75
Container Release10.75
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4450-1
ReleasedWed Nov 15 10:55:20 2023
SummaryRecommended update for crypto-policies
Typerecommended
Severitymoderate
References1209998
Description:

This update for crypto-policies fixes the following issues:
- Enable setting the kernel FIPS mode with the fips-mode-setup and fips-finish-install commands (jsc#PED-5041) - Adapt fips-mode-setup to use the pbl command from the perl-Bootloader package instead of grubby and add a note for transactional systems - Ship the man pages for fips-mode-setup and fips-finish-install - Make the supported versions change in the update-crypto-policies(8) man page persistent (bsc#1209998)


Advisory IDSUSE-SU-2023:4458-1
ReleasedThu Nov 16 14:38:48 2023
SummarySecurity update for gcc13
Typesecurity
Severityimportant
References1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,1215427,1216664,CVE-2023-4039
Description:

This update for gcc13 fixes the following issues:
This update ship the GCC 13.2 compiler suite and its base libraries.
The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories.
To use gcc13 compilers use:

  • install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
  • override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out
https://gcc.gnu.org/gcc-13/changes.html

Detailed changes:

  • CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052)

  • Work around third party app crash during C++ standard library initialization. [bsc#1216664]
  • Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
  • Bump included newlib to version 4.3.0.
  • Update to GCC trunk head (r13-5254-g05b9868b182bb9)
  • Redo floatn fixinclude pick-up to simply keep what is there.
  • Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

  • Also handle -static-pie in the default-PIE specs
  • Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101]
  • Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427]
  • Add new x86-related intrinsics (amxcomplexintrin.h).
  • RISC-V: Add support for inlining subword atomic operations
  • Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver.
  • Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC.
  • Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing.
  • Bump included newlib to version 4.3.0.
  • Also package libhwasan_preinit.o on aarch64.
  • Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite.
  • Package libhwasan_preinit.o on x86_64.
  • Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]
  • Enable PRU flavour for gcc13
  • update floatn fixinclude pickup to check each header separately (bsc#1206480)
  • Redo floatn fixinclude pick-up to simply keep what is there.
  • Bump libgo SONAME to libgo22.
  • Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers.
  • Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15.
  • Depend on at least LLVM 13 for GCN cross compiler.
  • Update embedded newlib to version 4.2.0
  • Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build.


SUSE-CU-2023:3664-1

Container Advisory IDSUSE-CU-2023:3664-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.65
Container Release10.65
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4310-1
ReleasedTue Oct 31 14:10:47 2023
SummaryRecommended update for libtirpc
Typerecommended
Severitymoderate
References1196647
Description:

This Update for libtirpc to 1.3.4, fixing the following issues: Update to 1.3.4 (bsc#1199467)
* binddynport.c honor ip_local_reserved_ports - replaces: binddynport-honor-ip_local_reserved_ports.patch * gss-api: expose gss major/minor error in authgss_refresh() * rpcb_clnt.c: Eliminate double frees in delete_cache() * rpcb_clnt.c: memory leak in destroy_addr * portmapper: allow TCP-only portmapper * getnetconfigent: avoid potential DoS issue by removing unnecessary sleep * clnt_raw.c: fix a possible null pointer dereference * bindresvport.c: fix a potential resource leakage
Update to 1.3.3:

  • Fix DoS vulnerability in libtirpc - replaces: 0001-Fix-DoS-vulnerability-in-libtirpc.patch
  • _rpc_dtablesize: use portable system call
  • libtirpc: Fix use-after-free accessing the error number
  • Fix potential memory leak of parms.r_addr - replaces 0001-fix-parms.r_addr-memory-leak.patch
  • rpcb_clnt.c add mechanism to try v2 protocol first - preplaces: 0001-rpcb_clnt.c-config-to-try-protocolversion-2-first.patch
  • Eliminate deadlocks in connects with an MT environment
  • clnt_dg_freeres() uncleared set active state may deadlock
  • thread safe clnt destruction
  • SUNRPC: mutexed access blacklist_read state variable
  • SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c

Update to 1.3.2:
  • Replace the final SunRPC licenses with BSD licenses
  • blacklist: Add a few more well known ports
  • libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS

Update to 1.3.1:
  • Remove AUTH_DES interfaces from auth_des.h The unsupported AUTH_DES authentication has be compiled out since commit d918e41d889 (Wed Oct 9 2019) replaced by API routines that return errors.
  • svc_dg: Free xp_netid during destroy
  • Fix memory management issues of fd locks
  • libtirpc: replace array with list for per-fd locks
  • __svc_vc_dodestroy: fix double free of xp_ltaddr.buf
  • __rpc_dtbsize: rlim_cur instead of rlim_max
  • pkg-config: use the correct replacements for libdir/includedir


SUSE-CU-2023:3601-1

Container Advisory IDSUSE-CU-2023:3601-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.57
Container Release10.57
The following patches have been included in this update:

SUSE-CU-2023:3568-1

Container Advisory IDSUSE-CU-2023:3568-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.55
Container Release10.55
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:4162-1
ReleasedMon Oct 23 15:33:03 2023
SummarySecurity update for gcc13
Typesecurity
Severityimportant
References1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039
Description:

This update for gcc13 fixes the following issues:
This update ship the GCC 13.2 compiler suite and its base libraries.
The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories.
To use gcc13 compilers use:

  • install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
  • override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out
https://gcc.gnu.org/gcc-13/changes.html

Detailed changes:

  • CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052)

  • Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

  • Also handle -static-pie in the default-PIE specs
  • Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101]
  • Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427]
  • Add new x86-related intrinsics (amxcomplexintrin.h).
  • RISC-V: Add support for inlining subword atomic operations
  • Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver.
  • Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC.
  • Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing.
  • Bump included newlib to version 4.3.0.
  • Also package libhwasan_preinit.o on aarch64.
  • Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite.
  • Package libhwasan_preinit.o on x86_64.
  • Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]
  • Enable PRU flavour for gcc13
  • update floatn fixinclude pickup to check each header separately (bsc#1206480)
  • Redo floatn fixinclude pick-up to simply keep what is there.
  • Bump libgo SONAME to libgo22.
  • Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers.
  • Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15.
  • Depend on at least LLVM 13 for GCN cross compiler.
  • Update embedded newlib to version 4.2.0
  • Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build.


Advisory IDSUSE-SU-2023:4198-1
ReleasedWed Oct 25 11:58:43 2023
SummarySecurity update for java-11-openjdk
Typesecurity
Severityimportant
References1214790,1216374,CVE-2023-22081
Description:

This update for java-11-openjdk fixes the following issues:

  • Upgraded to JDK 11.0.21+9 (October 2023 CPU):

- CVE-2023-22081: Fixed a partial denial of service issue that could be triggered via HTTPS (bsc#1216374).
Please visit the Oracle Release Notes page for the full changelog:
https://www.oracle.com/java/technologies/javase/11all-relnotes.html


Advisory IDSUSE-SU-2023:4200-1
ReleasedWed Oct 25 12:04:29 2023
SummarySecurity update for nghttp2
Typesecurity
Severityimportant
References1216123,1216174,CVE-2023-44487
Description:

This update for nghttp2 fixes the following issues:

  • CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)


Advisory IDSUSE-SU-2023:4215-1
ReleasedThu Oct 26 12:19:25 2023
SummarySecurity update for zlib
Typesecurity
Severitymoderate
References1216378,CVE-2023-45853
Description:

This update for zlib fixes the following issues:

  • CVE-2023-45853: Fixed an integer overflow that would lead to a buffer overflow in the minizip subcomponent (bsc#1216378).


SUSE-CU-2023:3514-1

Container Advisory IDSUSE-CU-2023:3514-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.45
Container Release10.45
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4105-1
ReleasedWed Oct 18 08:15:40 2023
SummaryRecommended update for openssl-1_1
Typerecommended
Severitymoderate
References1215215
Description:

This update for openssl-1_1 fixes the following issues:

  • Displays 'fips' in the version string (bsc#1215215)


Advisory IDSUSE-SU-2023:4110-1
ReleasedWed Oct 18 12:35:26 2023
SummarySecurity update for glibc
Typesecurity
Severityimportant
References1215286,1215891,CVE-2023-4813
Description:

This update for glibc fixes the following issues:
Security issue fixed:

  • CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)

Also a regression from a previous update was fixed:
  • elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)


Advisory IDSUSE-RU-2023:4143-1
ReleasedFri Oct 20 11:53:59 2023
SummaryRecommended update for brltty, harfbuzz, libcdr, libmspub, libreoffice, libzmf, tepl, vte
Typerecommended
Severitymoderate
References
Description:


This update provides rebuilds of various packages against the newer icu73 to support GB18030-2023.
This set contains libreoffice, various libraries used by libreoffice and GNOME, and brltty.


Advisory IDSUSE-RU-2023:4153-1
ReleasedFri Oct 20 19:27:58 2023
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1215313
Description:

This update for systemd fixes the following issues:

  • Fix mismatch of nss-resolve version in Package Hub (no source code changes)


Advisory IDSUSE-RU-2023:4154-1
ReleasedFri Oct 20 19:33:25 2023
SummaryRecommended update for aaa_base
Typerecommended
Severitymoderate
References1107342,1215434
Description:

This update for aaa_base fixes the following issues:

  • Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342)


SUSE-CU-2023:3436-1

Container Advisory IDSUSE-CU-2023:3436-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.26
Container Release10.26
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:4073-1
ReleasedFri Oct 13 11:40:26 2023
SummaryRecommended update for rpm
Typerecommended
Severitylow
References
Description:

This update for rpm fixes the following issue:

  • Enables build for all python modules (jsc#PED-68, jsc#PED-1988)


SUSE-CU-2023:3398-1

Container Advisory IDSUSE-CU-2023:3398-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.21
Container Release10.21
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:4024-1
ReleasedTue Oct 10 13:24:40 2023
SummarySecurity update for shadow
Typesecurity
Severitylow
References1214806,CVE-2023-4641
Description:

This update for shadow fixes the following issues:

  • CVE-2023-4641: Fixed potential password leak (bsc#1214806).


Advisory IDSUSE-SU-2023:4044-1
ReleasedWed Oct 11 09:01:14 2023
SummarySecurity update for curl
Typesecurity
Severityimportant
References1215888,1215889,CVE-2023-38545,CVE-2023-38546
Description:

This update for curl fixes the following issues:

  • CVE-2023-38545: Fixed a heap buffer overflow in SOCKS5. (bsc#1215888)
  • CVE-2023-38546: Fixed a cookie injection with none file. (bsc#1215889)


SUSE-CU-2023:3330-1

Container Advisory IDSUSE-CU-2023:3330-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.15
Container Release10.15
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3994-1
ReleasedFri Oct 6 13:44:15 2023
SummaryRecommended update for git
Typerecommended
Severitymoderate
References1215533
Description:

This update for git fixes the following issues:

  • Downgrade openssh dependency to recommends (bsc#1215533)


Advisory IDSUSE-SU-2023:3997-1
ReleasedFri Oct 6 14:13:56 2023
SummarySecurity update for nghttp2
Typesecurity
Severityimportant
References1215713,CVE-2023-35945
Description:

This update for nghttp2 fixes the following issues:

  • CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).


SUSE-CU-2023:3291-1

Container Advisory IDSUSE-CU-2023:3291-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.13
Container Release10.13
The following patches have been included in this update:

SUSE-CU-2023:3253-1

Container Advisory IDSUSE-CU-2023:3253-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.9
Container Release10.9
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:3954-1
ReleasedTue Oct 3 20:09:47 2023
SummarySecurity update for libeconf
Typesecurity
Severityimportant
References1211078,CVE-2023-22652,CVE-2023-30078,CVE-2023-30079,CVE-2023-32181
Description:

This update for libeconf fixes the following issues:
Update to version 0.5.2.

  • CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).
  • CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)


Advisory IDSUSE-SU-2023:3963-1
ReleasedWed Oct 4 09:24:32 2023
SummarySecurity update for libX11
Typesecurity
Severitymoderate
References1215683,1215684,1215685,CVE-2023-43785,CVE-2023-43786,CVE-2023-43787
Description:

This update for libX11 fixes the following issues:

  • CVE-2023-43786: Fixed stack exhaustion from infinite recursion in PutSubImage() (bsc#1215684).
  • CVE-2023-43787: Fixed integer overflow in XCreateImage() leading to a heap overflow (bsc#1215685).
  • CVE-2023-43785: Fixed out-of-bounds memory access in _XkbReadKeySyms() (bsc#1215683).


SUSE-CU-2023:3223-1

Container Advisory IDSUSE-CU-2023:3223-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-10.4
Container Release10.4
The following patches have been included in this update:

SUSE-CU-2023:3181-1

Container Advisory IDSUSE-CU-2023:3181-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-9.8
Container Release9.8
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3814-1
ReleasedWed Sep 27 18:08:17 2023
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1211829,1212819,1212910
Description:

This update for glibc fixes the following issues:

  • nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)
  • Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)
  • elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)
  • elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)
  • ld.so: Always use MAP_COPY to map the first segment (BZ #30452)
  • add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)


Advisory IDSUSE-SU-2023:3823-1
ReleasedWed Sep 27 18:42:38 2023
SummarySecurity update for curl
Typesecurity
Severityimportant
References1215026,CVE-2023-38039
Description:

This update for curl fixes the following issues:

  • CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)


SUSE-CU-2023:3143-1

Container Advisory IDSUSE-CU-2023:3143-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-9.3
Container Release9.3
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3780-1
ReleasedTue Sep 26 10:58:21 2023
SummaryRecommended update hidapi
Typerecommended
Severitymoderate
References1214535
Description:


This update for hidapi ships the missing libhidapi-raw0 library to SLE and Leap Micro 5.3 and 5.4.


SUSE-CU-2023:3134-1

Container Advisory IDSUSE-CU-2023:3134-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-9.2
Container Release9.2
The following patches have been included in this update:

SUSE-CU-2023:3049-1

Container Advisory IDSUSE-CU-2023:3049-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.103
Container Release8.103
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3641-1
ReleasedMon Sep 18 15:02:47 2023
SummaryRecommended update for java-11-openjdk
Typerecommended
Severityimportant
References
Description:

This update for java-11-openjdk fixes the following issues:

  • Fix a regression where the validation would reject valid zip64 (zip with 64-bit offset extensions)


Advisory IDSUSE-SU-2023:3661-1
ReleasedMon Sep 18 21:44:09 2023
SummarySecurity update for gcc12
Typesecurity
Severityimportant
References1214052,CVE-2023-4039
Description:

This update for gcc12 fixes the following issues:

  • CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).


Advisory IDSUSE-SU-2023:3666-1
ReleasedMon Sep 18 21:52:18 2023
SummarySecurity update for libxml2
Typesecurity
Severityimportant
References1214768,CVE-2023-39615
Description:

This update for libxml2 fixes the following issues:

  • CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768).


SUSE-CU-2023:2989-1

Container Advisory IDSUSE-CU-2023:2989-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.95
Container Release8.95
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3611-1
ReleasedFri Sep 15 09:28:36 2023
SummaryRecommended update for sysuser-tools
Typerecommended
Severitymoderate
References1195391,1205161,1207778,1213240,1214140
Description:

This update for sysuser-tools fixes the following issues:

  • Update to version 3.2
  • Always create a system group of the same name as the system user (bsc#1205161, bsc#1207778, bsc#1213240)
  • Add 'quilt setup' friendly hint to %sysusers_requires usage
  • Use append so if a pre file already exists it isn't overridden
  • Invoke bash for bash scripts (bsc#1195391)
  • Remove all systemd requires not supported on SLE15 (bsc#1214140)


SUSE-CU-2023:2950-1

Container Advisory IDSUSE-CU-2023:2950-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.93
Container Release8.93
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3577-1
ReleasedMon Sep 11 15:04:01 2023
SummaryRecommended update for crypto-policies
Typerecommended
Severitylow
References1209998
Description:

This update for crypto-policies fixes the following issues:

  • Update update-crypto-policies(8) man pages and README.SUSE to mention the supported back-end policies. (bsc#1209998)


SUSE-CU-2023:2909-1

Container Advisory IDSUSE-CU-2023:2909-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.87
Container Release8.87
The following patches have been included in this update:

SUSE-CU-2023:2838-1

Container Advisory IDSUSE-CU-2023:2838-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.83
Container Release8.83
The following patches have been included in this update:

SUSE-CU-2023:2778-1

Container Advisory IDSUSE-CU-2023:2778-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.82
Container Release8.82
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3410-1
ReleasedThu Aug 24 06:56:32 2023
SummaryRecommended update for audit
Typerecommended
Severitymoderate
References1201519,1204844
Description:

This update for audit fixes the following issues:

  • Create symbolic link from /sbin/audisp-syslog to /usr/sbin/audisp-syslog (bsc#1201519)
  • Fix rules not loaded when restarting auditd.service (bsc#1204844)


Advisory IDSUSE-RU-2023:3451-1
ReleasedMon Aug 28 12:15:22 2023
SummaryRecommended update for systemd
Typerecommended
Severitymoderate
References1186606,1194609,1208194,1209741,1210702,1211576,1212434,1213185,1213575,1213873
Description:

This update for systemd fixes the following issues:

  • Fix reboot and shutdown issues by getting only active MD arrays (bsc#1211576, bsc#1212434, bsc#1213575)
  • Decrease devlink priority for iso disks (bsc#1213185)
  • Do not ignore mount point paths longer than 255 characters (bsc#1208194)
  • Refuse hibernation if there's no possible way to resume (bsc#1186606)
  • Update 'korean' and 'arabic' keyboard layouts (bsc#1210702)
  • Drop some entries no longer needed by YaST (bsc#1194609)
  • The 'systemd --user' instances get their own session keyring instead of the user default one (bsc#1209741)
  • Dynamically allocate receive buffer to handle large amount of mounts (bsc#1213873)


Advisory IDSUSE-SU-2023:3461-1
ReleasedMon Aug 28 17:25:09 2023
SummarySecurity update for freetype2
Typesecurity
Severitymoderate
References1210419,CVE-2023-2004
Description:

This update for freetype2 fixes the following issues:

  • CVE-2023-2004: Fixed integer overflow in tt_hvadvance_adjust (bsc#1210419).


SUSE-CU-2023:2741-1

Container Advisory IDSUSE-CU-2023:2741-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.63
Container Release8.63
The following patches have been included in this update:

SUSE-CU-2023:2740-1

Container Advisory IDSUSE-CU-2023:2740-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.61
Container Release8.61
The following patches have been included in this update:
Advisory IDSUSE-feature-2023:3319-1
ReleasedTue Aug 15 10:45:11 2023
SummaryFeature update for Maven
Typefeature
Severitymoderate
References1211198
Description:

This update for aopalliance, beust-jcommander, maven, maven-install-plugin, maven-resolver, maven-wagon, plexus-utils, sbt and xmvn fixes the following issues:
aopalliance:

  • Include in SUSE Linux Enterprise 15 Service Pack 5: Dependency needed by Maven (no source changes)
beust-jcommander:
  • Version update from 1.71 to 1.82 (jsc#SLE-23217): * Add a test for Parameter order usage * Add a test for Path converter * Add automatic module name to manifest * Add check if Boolean parameter is default null, then do not flip value * Add testing modules * Add format tests for DefaultUsageFormatter, UnixStyleUsageFormatter * Add testing for UnixStyleUsageFormatter * Add unix-style formatter, allow DefaultUsageFormatter to be extended easier * Allow generics of type and in parameters * Allow main parameters to be a single field. * Allow System.out to be replaced by something else (f.e. System.err) * Allow UsageFormatter to be set in JCommander Builder * Change UsageFormatter into an interface * Clean up DefaultUsageFormatter * Create MyDelegate.java * Create UsageFormatter (preliminary) * Enable usage() ordering for DynamicParameter * Encapsulate MainParameter. * Encode user input to massage error message * Expose more of the UsageFormatter implementations * Fields annotated with @ParametersDelegate are now allowed to be final. * Fixed bug when parsing arguments is ignoring case sensitivity option * Fix error message when failing to convert a Path * Fix locale-related issues in usage formatter tests * Get boolean/Boolean getter with 'is' prefix * Implement Environment Variable Default Provider * Make console configurable by JCommander.Builder * Make UsageFormatter abstract, Create DefaultUsageFormatter * Only one DefaultConverterFactory * Remove String.join usage - resolves #381 * Remove the generic in IStringConverterFactory * Restrict access to JCommander.Options again * Support arity for main parameters. * Update DefaultParameterizedParser.java * Update IParameterizedParser.java * Update JCommander.java * usage() hides 'Comments:' header when only hidden commands exist * Use Builder API as constructor is deprecated * Use get default getter approach if is method is not found * Upgrade needed by new code in xmvn 4.2.0

maven:
  • Version update from 3.8.6 to 3.9.2 (jsc#SLE-23217): * Fix interpolated properties in originalModel in an active profile. * Fix java.lang.NullPointerException at org.apache.maven.repository.internal.DefaultModelCache.newInstance (DefaultModelCache.java:37) * Issue a warning if plugin depends on maven-compat * Add more information when using `-Dmaven.repo.local.recordReverseTree=true` * Improvement and extension of plugin validation * Don't fingerprint Sigstore signatures (like GPG) * Print suppressed exceptions when a mojo fails * Upgrade animal-sniffer from 1.21 to 1.23 * Fix issue with Maven CLI not working (bsc#1211198) * Maven Wagon upgrade * Minimum Java version to use with Maven 3.9.0 is raised to Java 8. * With Java 8, upgrade of several key dependencies became possible as well. * Several backports from Maven 4.x line. * Cutting ties with Maven 2 backward compatibility, preparing grounds for Maven 4. * The Maven Resolver transport has changed from Wagon to “native HTTP”, see Resolver Transport guide. * Maven 2.x was auto-injecting an ancient version of plexus-utils dependency into the plugin classpath, and Maven 3.x continued doing this to preserve backward compatibility. Starting with Maven 3.9, it does not happen anymore. This change may lead to plugin breakage. The fix for affected plugin maintainers is to explicitly declare a dependency on plexus-utils. The workaround for affected plugin users is to add this dependency to plugin dependencies until issue is fixed by the affected plugin maintainer. * Mojos are prevented to boostrap new instance of RepositorySystem (for example by using deprecated ServiceLocator), they should reuse RepositorySystem instance provided by Maven instead. See MNG-7471. * Each line in .mvn/maven.config is now interpreted as a single argument. That is, if the file contains multiple arguments, these must now be placed on separate lines, see MNG-7684. * General performance and other fixes

maven-install-plugin:
  • Version upgrade from 3.0.0 to 3.1.1 (jsc#SLE-23217): * Use proper repositorySystemSession * Upgrade Parent to 39 * Add parameter to lax project validation * installAtEnd when module does not use maven-install-plugin * Don't use metadata from main artifact to fetch pom.xml * Install all artifacts in one request * Require Java 8 * Cleanup IT tests * Upgrade Parent to 37 * Bump mockito-core from 2.28.2 to 4.8.1 * Generated POM is not installed if original POM exists * Remove a lot of checksum related dead code and commented out tests * Create GitHub Actions * Use shared GH Actions * Update plugin (requires Maven 3.2.5+) * Upgrade maven-plugin parent to 36 * Install At End feature (no extension) * Streamline the plugin by

maven-resolver:
  • Version upgrade from 1.7.3 to 1.9.12 (jsc#SLE-23217): * Bug fixes: + Fix unreliable TCP and retries on upload + Fix ConflictResolver STANDARD verbosity + Fix duplicate METADATA_DOWNLOADING event being sent + Disable checksum by default for .sigstore in addition to .asc + Fix conflict resolution in verbose mode is sensitive to version ordering + Fix SslConfig httpSecurityMode change is not detected + Fix Preemptive Auth broken when default ports used + Fix regression suddenly seeing I/O errors under windows aborting the build + Fix static name mapper unusable with file-lock factory + Fix 'IllegalArgumentException: Comparison method violates its general contract!' + Fix DF collector enters endless loop when collecting org.webjars.npm:musquette:1.1.1 + Fix javax.inject should be provided or optional + Evaluate blocked repositories also when retrieving metadata + Fix PrefixesRemoteRepositoryFilterSource aborts the build while it should not + Fix Artifact file permission + FileProcessor.write( File, InputStream ) is defunct + Fix documented and used param names mismatch + Fix JapiCmp configuration and document it + m-deploy-p will create hashes for hashes + Fix discrepancy between produced and recognized checksums + Resolver checksum calculation should be driven by layout + When no remote checksums provided by layout, transfer inevitably fails/warns + Fix usage of descriptors map in DataPool prevents gargabe collection * New features: + Make aether.checksums.algorithms settable per remote repository + Lock factory provides lock states on failure + Support parallel artifact/metadata uploads + Support parallel deploy + Chained LRM + Support forcing specific repositories for artifacts + Apply artifact checksum verification for any resolved artifact + Introduce Remote Repository Filter feature + Introduce trusted checksums source + Resolver post-processor + Introduce RepositorySystem shutdown hooks + Make it possible to resolve .asc on a 'fail' respository. * Dependency upgrades: + Remove Guava (is unused) + Upgrade Parent to 39 + Update dependencies, align with Maven + Update parent POM to 37, remove plugin version overrides, update bnd + Upgrade invoker, install, deploy, require maven 3.8.4+ + Upgrade Redisson to 3.17.5 + Update Hazelcast to 5.1.1 in named-locks-hazelcast module

maven-wagon:
  • Version upgrade from 3.2.0 to 3.5.3 (jsc#SLE-23217): * Bug fixes: + Fix Maven deploy fails with 401 Unauthorized when using £ in password + Default connect timeout not set when no HttpMethodConfiguration is available + Maven transfer speed of large artifacts is slow due to unsuitable buffer strategy + Explicitly register only supported auth schemes + Switch to modern-day encoding (UTF-8) of auth credentials + HttpWagon TTL not set + Upgrade HttpCore to 4.4.11 + Upgrade HttpClient to 4.5.7 + Upgrade Commons Net to 3.6 + Upgrade JSoup to 1.11.3 + Uprade JSch to 0.1.55 + Replace Commons Codec with Plexus Utils + Upgrade Plexus Classworlds to 2.6.0 + Tests with checkin rely on global Git config + Use java.nio.file.Path for URI construction of file:// URI in tests + Skip parsing of user info for file:// URLs + Integer overflow prevents optimal buffer size selection for large artifacts + Upgrade Plexus Interactivity to 1.0 + Upgrade Plexus Utils to 3.2.0 + Upgrade JSoup to 1.12.1 + Upgrade HttpClient to 4.5.9 + SSH connection failure because 'preferredAuthentications' option is ignored if password isn't set + Provide request retry strategy on transient client and server side errors + Fail to deploy on Sonatype OSS since Maven 3.5.4 + Inconsistent encoding behavior for repository URLs with spaces + Use RedirectStrategy from HttpClient rather than a custom approach + Rename RequestEntityImplementation to WagonHttpEntity + EntityUtils.consumeQuietly() never called on non-2xx status codes + Retry handler docs are possibly wrong + Upgrade HttpCore to 4.4.13 + Upgrade HttpClient to 4.5.11 + Handle SC_UNAUTHORIZED and SC_PROXY_AUTHENTICATION_REQUIRED in all methods + Improve and unify exception messages by status code types throughout HTTP providers + Upgrade HttpClient to 4.5.12 + HttpMethodConfiguration#copy() performs a shallow copy only + Update parent POM + Handle 404 and 410 consistently in HTTP-based Wagon providers + Transfer event is not restarted when request is redirected + Fix Wagon failing when compiled on Java 9+ and run on Java 8 due to JDK API breakage + Remove non-existent cache header + Fix http.route.default-proxy config property never passes protocol and port of proxy server + Add configuration property 'http.protocol.handle-content-compression' + Add configuration property 'http.protocol.handle-uri-normalization' + Fix self-assignment and set class field + [Regression] Preserve trailing slash in encoded URL + Upgrade HttpCore to 4.4.14 + Upgrade HttpClient to 4.5.13 + Upgrade transitive Commons Codec to 1.15 * Improvements: + Properly handle authentication scenarios with MKCOL * Deprecations: + Remove shading of JSoup + Deprecate Wagon FTP Provider + Deprecate Wagon HTTP Lightweight Provider + Deprecate Wagon SSH Provider + Deprecate Wagon WebDAV Provider + Remove HTTP file listing with JSoup * Dependency upgrades: + Upgrade SLF4J to 1.7.32 + Upgrade JUnit to 4.13.2 + Upgrade Plexus Interactivity to 1.1 + Upgrade HttpCore to 4.4.15 + Upgrade and clean up dependencies

plexus-utils:
  • Version update from 3.4.0 to 3.5.0 (jsc#SLE-23217): * Don't throw IOException when none is required * Always preserve dominant node value (even if empty) * Don't overwrite blank (but non-empty) dominant values during mergeXpp3Dom * Deprecate isEmpty(String) and isNotEmpty(String) in favour of same named * isEmpty(String) must not return false for whitespace-only values * Get rid maven-plugin-testing-harness from dependency * Provides a CachingOuptutStream and a CachingWriter * Use (already) precalculated value * MXParser fixes * Fix last modified time not being updated on linux * Fix regression and deprecate: FileUtils.fileAppend should create file * Fix some testing XML files checkout with incorrect eol * Fixed regressions: #163 and #194 * Don't ignore valid SCM files * Fix regression causingencoding error when parsing a ISO-8859-1 xml

sbt:
  • Fix build against maven 3.9.2 (jsc#SLE-23217)

xmvn:
  • Version update from 4.0.0 to 4.2.0 (jsc#SLE-23217): * Make XMvn Resolver log to XMvn Logger * Make XMvn Subst log to XMvn Logger * Depend on junit-jupiter-api instead of junit-jupiter * Suppress deprecation warnings in MavenExtensionTest * Remove XMvn Connector dependency on Plexus Utils * Remove XMvn MOJO dependency on Plexus Utils * Port XMvn MOJO from Xpp3Dom to StAX * Update Maven to version 3.9.1 * Don't pass duplicate --patch-module to javadoc * Make Javadoc MOJO respect ignoreJPMS configuration flag * Propagate javadoc output througt Logger * Remove dependency on Plexus Classworlds * Remove unneeded managed dependency on maven-invoker * Use ServiceLocator to find Logger * Use parametrized logging feature * Use XMvn Logger instead of Plexus Logger * Get rid of Slf4jLoggerAdapter * Drop support for Gossip logger * Move XMvn Logger to API module * Ignore JPMS when all modules are automatic * Refactor Javadoc MOJO * Make Javadoc not fail when no sources are found * Add an integration test for javadoc generation with module-info.java but no sources * Add an integration test for javadoc generation with Automatic-Module-Name * Make Javadoc MOJO work in case one of JPMS modules has no sources * Prioritize certain XMvn components over Maven components * Port XMvn MOJO to JSR-330 * Refactor XMvnMojoExecutionConfigurator * Make builddep MOJO compatible with Maven 4 * Port to JSR-330 * Get rid of ModelProcessor * Refactor XMvnModelValidator * Refactor XMvnToolchainManager * Convert lambda to method reference * Improve Javadoc MOJO JPMS support * Add a test case for JPMS javadoc generation with remote dependencies * Add a test case for JPMS multimodule javadoc generation * Exclude src/test/resources-filtered/** from RAT * Fix scope of xmvn-mojo dependency on plexus-utils * `--module-path` not allowed with release=8 * Mimic maven-javadoc-plugin for -source and --release * testJavadocJPMS needs a modular java * Let modello generate source 8 * Add a jdk9+ profile to assure that we are jdk8 compatible * Revert 'Use new Collection methods added in Java 9' * Revert 'Update compiler source/target to JDK 11' * Restore possibility to build with Java 8 * Simple implementation of toolchains https://github.com/fedora-java/xmvn/issues/142 * Port to Modello 2.0.0


Advisory IDSUSE-SU-2023:3325-1
ReleasedWed Aug 16 08:26:08 2023
SummarySecurity update for krb5
Typesecurity
Severityimportant
References1214054,CVE-2023-36054
Description:

This update for krb5 fixes the following issues:

  • CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)


Advisory IDSUSE-SU-2023:3327-1
ReleasedWed Aug 16 08:45:25 2023
SummarySecurity update for pcre2
Typesecurity
Severitymoderate
References1213514,CVE-2022-41409
Description:

This update for pcre2 fixes the following issues:
- CVE-2022-41409: Fixed integer overflow vulnerability in pcre2test that allows attackers to cause a denial of service via negative input (bsc#1213514).


SUSE-CU-2023:2671-1

Container Advisory IDSUSE-CU-2023:2671-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.56
Container Release8.56
The following patches have been included in this update:

SUSE-CU-2023:2641-1

Container Advisory IDSUSE-CU-2023:2641-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.54
Container Release8.54
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:3285-1
ReleasedFri Aug 11 10:30:38 2023
SummaryRecommended update for shadow
Typerecommended
Severitymoderate
References1206627,1213189
Description:

This update for shadow fixes the following issues:

  • Prevent lock files from remaining after power interruptions (bsc#1213189)
  • Add --prefix support to passwd, chpasswd and chage (bsc#1206627)


Advisory IDSUSE-SU-2023:3287-1
ReleasedFri Aug 11 12:27:11 2023
SummarySecurity update for java-11-openjdk
Typesecurity
Severityimportant
References1207922,1213473,1213474,1213475,1213479,1213481,1213482,CVE-2023-22006,CVE-2023-22036,CVE-2023-22041,CVE-2023-22044,CVE-2023-22045,CVE-2023-22049,CVE-2023-25193
Description:

This update for java-11-openjdk fixes the following issues:
Updated to jdk-11.0.20+8 (July 2023 CPU):
- CVE-2023-22006: Fixed vulnerability in the network component (bsc#1213473). - CVE-2023-22036: Fixed vulnerability in the utility component (bsc#1213474). - CVE-2023-22041: Fixed vulnerability in the hotspot component (bsc#1213475). - CVE-2023-22044: Fixed vulnerability in the hotspot component (bsc#1213479). - CVE-2023-22045: Fixed vulnerability in the hotspot component (bsc#1213481). - CVE-2023-22049: Fixed vulnerability in the libraries component (bsc#1213482). - CVE-2023-25193: Fixed vulnerability in the embedded harfbuzz module (bsc#1207922).
- JDK-8298676: Enhanced Look and Feel - JDK-8300285: Enhance TLS data handling - JDK-8300596: Enhance Jar Signature validation - JDK-8301998, JDK-8302084: Update HarfBuzz to 7.0.1 - JDK-8302475: Enhance HTTP client file downloading - JDK-8302483: Enhance ZIP performance - JDK-8303376: Better launching of JDI - JDK-8304468: Better array usages - JDK-8305312: Enhanced path handling - JDK-8308682: Enhance AES performance
Bugfixes:
- JDK-8171426: java/lang/ProcessBuilder/Basic.java failed with Stream closed - JDK-8178806: Better exception logging in crypto code - JDK-8187522: test/sun/net/ftp/FtpURLConnectionLeak.java timed out - JDK-8209167: Use CLDR's time zone mappings for Windows - JDK-8209546: Make sun/security/tools/keytool/autotest.sh to support macosx - JDK-8209880: tzdb.dat is not reproducibly built - JDK-8213531: Test javax/swing/border/TestTitledBorderLeak.java fails - JDK-8214459: NSS source should be removed - JDK-8214807: Improve handling of very old class files - JDK-8215015: [TESTBUG] remove unneeded -Xfuture option from tests - JDK-8215575: C2 crash: assert(get_instanceKlass()->is_loaded()) failed: must be at least loaded - JDK-8220093: Change to GCC 8.2 for building on Linux at Oracle - JDK-8227257: javax/swing/JFileChooser/4847375/bug4847375.java fails with AssertionError - JDK-8232853: AuthenticationFilter.Cache::remove may throw ConcurrentModificationException - JDK-8243936: NonWriteable system properties are actually writeable - JDK-8246383: NullPointerException in JceSecurity.getVerificationResult when using Entrust provider - JDK-8248701: On Windows generated modules-deps.gmk can contain backslash-r (CR) characters - JDK-8257856: Make ClassFileVersionsTest.java robust to JDK version updates - JDK-8259530: Generated docs contain MIT/GPL-licenced works without reproducing the licence - JDK-8263420: Incorrect function name in NSAccessibilityStaticText native peer implementation - JDK-8264290: Create implementation for NSAccessibilityComponentGroup protocol peer - JDK-8264304: Create implementation for NSAccessibilityToolbar protocol peer - JDK-8265486: ProblemList javax/sound/midi/Sequencer/ /Recording.java on macosx-aarch64 - JDK-8268558: [TESTBUG] Case 2 in TestP11KeyFactoryGetRSAKeySpec is skipped - JDK-8269746: C2: assert(!in->is_CFG()) failed: CFG Node with no controlling input? - JDK-8274864: Remove Amman/Cairo hacks in ZoneInfoFile - JDK-8275233: Incorrect line number reported in exception stack trace thrown from a lambda expression - JDK-8275721: Name of UTC timezone in a locale changes depending on previous code - JDK-8275735: [linux] Remove deprecated Metrics api (kernel memory limit) - JDK-8276880: Remove java/lang/RuntimeTests/exec/ExecWithDir as unnecessary - JDK-8277775: Fixup bugids in RemoveDropTargetCrashTest.java - add 4357905 - JDK-8278434: timeouts in test java/time/test/java/time/format/ /TestZoneTextPrinterParser.java - JDK-8280703: CipherCore.doFinal(...) causes potentially massive byte[] allocations during decryption - JDK-8282077: PKCS11 provider C_sign() impl should handle CKR_BUFFER_TOO_SMALL error - JDK-8282201: Consider removal of expiry check in VerifyCACerts.java test - JDK-8282467: add extra diagnostics for JDK-8268184 - JDK-8282600: SSLSocketImpl should not use user_canceled workaround when not necessary - JDK-8283059: Uninitialized warning in check_code.c with GCC 11.2 - JDK-8285497: Add system property for Java SE specification maintenance version - JDK-8286398: Address possibly lossy conversions in jdk.internal.le - JDK-8287007: [cgroups] Consistently use stringStream throughout parsing code - JDK-8287246: DSAKeyValue should check for missing params instead of relying on KeyFactory provider - JDK-8287876: The recently de-problemlisted TestTitledBorderLeak test is unstable - JDK-8287897: Augment src/jdk.internal.le/share/legal/jline.md with information on 4th party dependencies - JDK-8289301: P11Cipher should not throw out of bounds exception during padding - JDK-8289735: UTIL_LOOKUP_PROGS fails on pathes with space - JDK-8291226: Create Test Cases to cover scenarios for JDK-8278067 - JDK-8291637: HttpClient default keep alive timeout not followed if server sends invalid value - JDK-8291638: Keep-Alive timeout of 0 should close connection immediately - JDK-8292206: TestCgroupMetrics.java fails as getMemoryUsage() is lower than expected - JDK-8293232: Fix race condition in pkcs11 SessionManager - JDK-8293815: P11PSSSignature.engineUpdate should not print debug messages during normal operation - JDK-8294548: Problem list SA core file tests on macosx-x64 due to JDK-8294316 - JDK-8294906: Memory leak in PKCS11 NSS TLS server - JDK-8295974: jni_FatalError and Xcheck:jni warnings should print the native stack when there are no Java frames - JDK-8296934: Write a test to verify whether Undecorated Frame can be iconified or not - JDK-8297000: [jib] Add more friendly warning for proxy issues - JDK-8297450: ScaledTextFieldBorderTest.java fails when run with -show parameter - JDK-8298887: On the latest macOS+XCode the Robot API may report wrong colors - JDK-8299259: C2: Div/Mod nodes without zero check could be split through iv phi of loop resulting in SIGFPE - JDK-8300079: SIGSEGV in LibraryCallKit::inline_string_copy due to constant NULL src argument - JDK-8300205: Swing test bug8078268 make latch timeout configurable - JDK-8300490: Spaces in name of MacOS Code Signing Identity are not correctly handled after JDK-8293550 - JDK-8301119: Support for GB18030-2022 - JDK-8301170: perfMemory_windows.cpp add free_security_attr to early returns - JDK-8301401: Allow additional characters for GB18030-2022 support - JDK-8302151: BMPImageReader throws an exception reading BMP images - JDK-8302791: Add specific ClassLoader object to Proxy IllegalArgumentException message - JDK-8303102: jcmd: ManagementAgent.status truncates the text longer than O_BUFLEN - JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return - JDK-8303432: Bump update version for OpenJDK: jdk-11.0.20 - JDK-8303440: The 'ZonedDateTime.parse' may not accept the 'UTC+XX' zone id - JDK-8303465: KeyStore of type KeychainStore, provider Apple does not show all trusted certificates - JDK-8303476: Add the runtime version in the release file of a JDK image - JDK-8303482: Update LCMS to 2.15 - JDK-8303564: C2: 'Bad graph detected in build_loop_late' after a CMove is wrongly split thru phi - JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs CFRelease call in early potential CHECK_NULL return - JDK-8303822: gtestMain should give more helpful output - JDK-8303861: Error handling step timeouts should never be blocked by OnError and others - JDK-8303937: Corrupted heap dumps due to missing retries for os::write() - JDK-8304134: jib bootstrapper fails to quote filename when checking download filetype - JDK-8304291: [AIX] Broken build after JDK-8301998 - JDK-8304295: harfbuzz build fails with GCC 7 after JDK-8301998 - JDK-8304350: Font.getStringBounds calculates wrong width for TextAttribute.TRACKING other than 0.0 - JDK-8304760: Add 2 Microsoft TLS roots - JDK-8305113: (tz) Update Timezone Data to 2023c - JDK-8305400: ISO 4217 Amendment 175 Update - JDK-8305528: [11u] Backport of JDK-8259530 breaks build with JDK10 bootstrap VM - JDK-8305682: Update the javadoc in the Character class to state support for GB 18030-2022 Implementation Level 2 - JDK-8305711: Arm: C2 always enters slowpath for monitorexit - JDK-8305721: add `make compile-commands` artifacts to .gitignore - JDK-8305975: Add TWCA Global Root CA - JDK-8306543: GHA: MSVC installation is failing - JDK-8306658: GHA: MSVC installation could be optional since it might already be pre-installed - JDK-8306664: GHA: Update MSVC version to latest stepping - JDK-8306768: CodeCache Analytics reports wrong threshold - JDK-8306976: UTIL_REQUIRE_SPECIAL warning on grep - JDK-8307134: Add GTS root CAs - JDK-8307811: [TEST] compilation of TimeoutInErrorHandlingTest fails after backport of JDK-8303861 - JDK-8308006: Missing NMT memory tagging in CMS - JDK-8308884: [17u/11u] Backout JDK-8297951 - JDK-8309476: [11u] tools/jmod/hashes/HashesOrderTest.java fails intermittently - JDK-8311465: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.20


SUSE-CU-2023:2606-1

Container Advisory IDSUSE-CU-2023:2606-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.50
Container Release8.50
The following patches have been included in this update:

SUSE-CU-2023:2557-1

Container Advisory IDSUSE-CU-2023:2557-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.48
Container Release8.48
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:3242-1
ReleasedTue Aug 8 18:19:40 2023
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1213853,CVE-2023-3817
Description:

This update for openssl-1_1 fixes the following issues:

  • CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)


SUSE-CU-2023:2503-1

Container Advisory IDSUSE-CU-2023:2503-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.43
Container Release8.43
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:3090-1
ReleasedTue Aug 1 10:24:13 2023
SummarySecurity update for guava
Typesecurity
Severitymoderate
References1179926,1212401,CVE-2020-8908,CVE-2023-2976
Description:

This update for guava fixes the following issues:
Upgrade to guava 32.0.1:

  • CVE-2020-8908: Fixed predictable temporary files and directories used in FileBackedOutputStream (bsc#1179926).
  • CVE-2023-2976: Fixed a temp directory creation vulnerability (bsc#1212401).


Advisory IDSUSE-RU-2023:3102-1
ReleasedTue Aug 1 14:11:53 2023
SummaryRecommended update for openssl-1_1
Typerecommended
Severitymoderate
References1213517
Description:

This update for openssl-1_1 fixes the following issues:

  • Dont pass zero length input to EVP_Cipher (bsc#1213517)


SUSE-CU-2023:2467-1

Container Advisory IDSUSE-CU-2023:2467-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.36
Container Release8.36
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:2965-1
ReleasedTue Jul 25 12:30:22 2023
SummarySecurity update for openssl-1_1
Typesecurity
Severitymoderate
References1213487,CVE-2023-3446
Description:

This update for openssl-1_1 fixes the following issues:

  • CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).


Advisory IDSUSE-RU-2023:2966-1
ReleasedTue Jul 25 14:26:14 2023
SummaryRecommended update for libxml2
Typerecommended
Severitymoderate
References
Description:

This update for libxml2 fixes the following issues:

  • Build also for modern python version (jsc#PED-68)


SUSE-CU-2023:2416-1

Container Advisory IDSUSE-CU-2023:2416-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.31
Container Release8.31
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:2945-1
ReleasedMon Jul 24 09:37:30 2023
SummarySecurity update for openssh
Typesecurity
Severityimportant
References1186673,1209536,1213004,1213008,1213504,CVE-2023-38408
Description:

This update for openssh fixes the following issues:

  • CVE-2023-38408: Fixed a condition where specific libaries loaded via ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code execution via a forwarded agent socket if those libraries were present on the victim's system and if the agent was forwarded to an attacker-controlled system. [bsc#1213504, CVE-2023-38408]

  • Close the right filedescriptor and also close fdh in read_hmac to avoid file descriptor leaks. [bsc#1209536]

  • Attempts to mitigate instances of secrets lingering in memory after a session exits. [bsc#1186673, bsc#1213004, bsc#1213008]


SUSE-CU-2023:2397-1

Container Advisory IDSUSE-CU-2023:2397-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.29
Container Release8.29
The following patches have been included in this update:
Advisory IDSUSE-RU-2023:2827-1
ReleasedFri Jul 14 11:27:47 2023
SummaryRecommended update for libxml2
Typerecommended
Severitymoderate
References
Description:

This update for libxml2 fixes the following issues:

  • Build also for modern python version (jsc#PED-68)


Advisory IDSUSE-RU-2023:2847-1
ReleasedMon Jul 17 08:40:42 2023
SummaryRecommended update for audit
Typerecommended
Severitymoderate
References1210004
Description:

This update for audit fixes the following issues:

  • Check for AF_UNIX unnamed sockets (bsc#1210004)
  • Enable livepatching on main library on x86_64


Advisory IDSUSE-RU-2023:2855-1
ReleasedMon Jul 17 16:35:21 2023
SummaryRecommended update for openldap2
Typerecommended
Severitymoderate
References1212260
Description:

This update for openldap2 fixes the following issues:

  • libldap2 crashes on ldap_sasl_bind_s (bsc#1212260)


Advisory IDSUSE-RU-2023:2856-1
ReleasedMon Jul 17 16:38:29 2023
SummaryRecommended update for publicsuffix
Typerecommended
Severitymoderate
References
Description:

This update for publicsuffix fixes the following issues:

  • Update to version 20230607


Advisory IDSUSE-SU-2023:2882-1
ReleasedWed Jul 19 11:49:39 2023
SummarySecurity update for perl
Typesecurity
Severityimportant
References1210999,CVE-2023-31484
Description:

This update for perl fixes the following issues:

- CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999).


Advisory IDSUSE-RU-2023:2885-1
ReleasedWed Jul 19 16:58:43 2023
SummaryRecommended update for glibc
Typerecommended
Severitymoderate
References1208721,1209229,1211828
Description:

This update for glibc fixes the following issues:

  • getlogin_r: fix missing fallback if loginuid is unset (bsc#1209229, BZ #30235)
  • Exclude static archives from preparation for live patching (bsc#1208721)
  • resolv_conf: release lock on allocation failure (bsc#1211828, BZ #30527)


Advisory IDSUSE-SU-2023:2891-1
ReleasedWed Jul 19 21:14:33 2023
SummarySecurity update for curl
Typesecurity
Severitymoderate
References1213237,CVE-2023-32001
Description:

This update for curl fixes the following issues:

  • CVE-2023-32001: Fixed TOCTOU race condition (bsc#1213237).


Advisory IDSUSE-RU-2023:2922-1
ReleasedThu Jul 20 18:34:03 2023
SummaryRecommended update for libfido2
Typerecommended
Severitymoderate
References
Description:

This update for libfido2 fixes the following issues:

  • Use openssl 1.1 still on SUSE Linux Enterprise 15 to avoid pulling unneeded openssl-3 dependency. (jsc#PED-4521)


SUSE-CU-2023:2279-1

Container Advisory IDSUSE-CU-2023:2279-1
Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-8.6
Container Release8.6
The following patches have been included in this update:
Advisory IDSUSE-SU-2023:2620-1
ReleasedFri Jun 23 13:41:36 2023
SummarySecurity update for openssl-3
Typesecurity
Severitymoderate
References1210714,1211430,CVE-2023-1255,CVE-2023-2650
Description:

This update for openssl-3 fixes the following issues:

  • CVE-2023-1255: Fixed input buffer over-read in AES-XTS implementation on 64 bit ARM (bsc#1210714).
  • CVE-2023-2650: Fixed possible DoS translating ASN.1 object identifiers (bsc#1211430).


Advisory IDSUSE-RU-2023:2811-1
ReleasedWed Jul 12 11:56:18 2023
SummaryRecommended update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt
Typerecommended
Severitymoderate
References
Description:

This update for libfido2, python-fido2, yubikey-manager, yubikey-manager-qt fixes the following issues:
This update provides a feature update to the FIDO2 stack.
Changes in libfido2:

  • Version 1.13.0 (2023-02-20)

* New API calls:
+ fido_assert_empty_allow_list; + fido_cred_empty_exclude_list.
* fido2-token: fix issue when listing large blobs.
  • Version 1.12.0 (2022-09-22)

* Support for COSE_ES384. * Improved support for FIDO 2.1 authenticators.
* New API calls:
+ es384_pk_free; + es384_pk_from_EC_KEY; + es384_pk_from_EVP_PKEY; + es384_pk_from_ptr; + es384_pk_new; + es384_pk_to_EVP_PKEY; + fido_cbor_info_certs_len; + fido_cbor_info_certs_name_ptr; + fido_cbor_info_certs_value_ptr; + fido_cbor_info_maxrpid_minpinlen; + fido_cbor_info_minpinlen; + fido_cbor_info_new_pin_required; + fido_cbor_info_rk_remaining; + fido_cbor_info_uv_attempts; + fido_cbor_info_uv_modality.
* Documentation and reliability fixes.
  • Version 1.11.0 (2022-05-03)

* Experimental PCSC support; enable with -DUSE_PCSC. * Improved OpenSSL 3.0 compatibility. * Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. * winhello: advertise 'uv' instead of 'clientPin'. * winhello: support hmac-secret in fido_dev_get_assert(). * New API calls:
+ fido_cbor_info_maxlargeblob.
* Documentation and reliability fixes. * Separate build and regress targets.
  • Version 1.10.0 (2022-01-17)

* bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. * New API calls:
- fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. * Cygwin and NetBSD build fixes. * Documentation and reliability fixes. * Support for TPM 2.0 attestation of COSE_ES256 credentials.
  • Version 1.9.0 (2021-10-27)

* Enabled NFC support on Linux. * Support for FIDO 2.1 'minPinLength' extension. * Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. * Support for TPM 2.0 attestation. * Support for device timeouts; see fido_dev_set_timeout(). * New API calls:
- es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY.
* Reliability and portability fixes. * Better handling of HID devices without identification strings; gh#381.
  • Update to version 1.8.0:

* Better support for FIDO 2.1 authenticators. * Support for attestation format 'none'. * New API calls:
- fido_assert_set_clientdata; - fido_cbor_info_algorithm_cose; - fido_cbor_info_algorithm_count; - fido_cbor_info_algorithm_type; - fido_cbor_info_transports_len; - fido_cbor_info_transports_ptr; - fido_cred_set_clientdata; - fido_cred_set_id; - fido_credman_set_dev_rk; - fido_dev_is_winhello.
* fido2-token: new -Sc option to update a resident credential. * Documentation and reliability fixes. * HID access serialisation on Linux.
  • Update to version 1.7.0:

* hid_win: detect devices with vendor or product IDs > 0x7fff * Support for FIDO 2.1 authenticator configuration. * Support for FIDO 2.1 UV token permissions. * Support for FIDO 2.1 'credBlobs' and 'largeBlobs' extensions. * New API calls * New fido_init flag to disable fido_dev_open’s U2F fallback * Experimental NFC support on Linux.
  • Enabled hidapi again, issues related to hidapi are fixed upstream

  • Update to version 1.6.0:

* Documentation and reliability fixes.
* New API calls:
+ fido_cred_authdata_raw_len; + fido_cred_authdata_raw_ptr; + fido_cred_sigcount; + fido_dev_get_uv_retry_count; + fido_dev_supports_credman. * Hardened Windows build. * Native FreeBSD and NetBSD support. * Use CTAP2 canonical CBOR when combining hmac-secret and credProtect.
  • Create a udev subpackage and ship the udev rule.

Changes in python-fido2:
  • update to 0.9.3:

* Don't fail device discovery when hidraw doesn't support HIDIOCGRAWUNIQ * Support the latest Windows webauthn.h API (included in Windows 11). * Add product name and serial number to HidDescriptors. * Remove the need for the uhid-freebsd dependency on FreeBSD.
  • Update to version 0.9.1

* Add new CTAP error codes and improve handling of unknown codes. * Client: API changes to better support extensions. * Client.make_credential now returns a AuthenticatorAttestationResponse, which holds the AttestationObject and ClientData, as well as any client extension results for the credential. * Client.get_assertion now returns an AssertionSelection object, which is used to select between multiple assertions * Renames: The CTAP1 and CTAP2 classes have been renamed to Ctap1 and Ctap2, respectively. * ClientPin: The ClientPin API has been restructured to support multiple PIN protocols, UV tokens, and token permissions. * CTAP 2.1 PRE: Several new features have been added for CTAP 2.1 * HID: The platform specific HID code has been revamped
  • Version 0.8.1 (released 2019-11-25)

* Bugfix: WindowsClient.make_credential error when resident key requirement is unspecified.
  • Version 0.8.0 (released 2019-11-25)

* New fido2.webauthn classes modeled after the W3C WebAuthn spec introduced. * CTAP2 send_cbor/make_credential/get_assertion and U2fClient request/authenticate timeout arguments replaced with event used to cancel a request. * Fido2Client:
- make_credential/get_assertion now take WebAuthn options objects. - timeout is now provided in ms in WebAuthn options objects. Event based cancelation also available by passing an Event.
* Fido2Server:
- ATTESTATION, USER_VERIFICATION, and AUTHENTICATOR_ATTACHMENT enums have been replaced with fido2.webauthn classes. - RelyingParty has been replaced with PublicKeyCredentialRpEntity, and name is no longer optional. - Options returned by register_begin/authenticate_begin now omit unspecified values if they are optional, instead of filling in default values. - Fido2Server.allowed_algorithms now contains a list of PublicKeyCredentialParameters instead of algorithm identifiers. - Fido2Server.timeout is now in ms and of type int.
* Support native WebAuthn API on Windows through WindowsClient.
  • Version 0.7.2 (released 2019-10-24)

* Support for the TPM attestation format. * Allow passing custom challenges to register/authenticate in Fido2Server. * Bugfix: CTAP2 CANCEL command response handling fixed. * Bugfix: Fido2Client fix handling of empty allow_list. * Bugfix: Fix typo in CTAP2.get_assertions() causing it to fail.
  • Version 0.7.1 (released 2019-09-20)

* Enforce canonical CBOR on Authenticator responses by default. * PCSC: Support extended APDUs. * Server: Verify that UP flag is set. * U2FFido2Server: Implement AppID exclusion extension. * U2FFido2Server: Allow custom U2F facet verification. * Bugfix: U2FFido2Server.authenticate_complete now returns the result.
  • Version 0.7.0 (released 2019-06-17)

* Add support for NFC devices using PCSC. * Add support for the hmac-secret Authenticator extension. * Honor max credential ID length and number of credentials to Authenticator. * Add close() method to CTAP devices to explicitly release their resources.
  • Version 0.6.0 (released 2019-05-10)

* Don't fail if CTAP2 Info contains unknown fields. * Replace cbor loads/dumps functions with encode/decode/decode_from. * Server: Add support for AuthenticatorAttachment. * Server: Add support for more key algorithms. * Client: Expose CTAP2 Info object as Fido2Client.info.
Changes in yubikey-manager:
  • Update to version 4.0.9 (released 2022-06-17)

* Dependency: Add support for python-fido2 1.x * Fix: Drop stated support for Click 6 as features from 7 are being used.
  • Update to version 4.0.8 (released 2022-01-31)

* Bugfix: Fix error message for invalid modhex when programing a YubiOTP credential. * Bugfix: Fix issue with displaying a Steam credential when it is the only account. * Bugfix: Prevent installation of files in site-packages root. * Bugfix: Fix cleanup logic in PIV for protected management key. * Add support for token identifier when programming slot-based HOTP. * Add support for programming NDEF in text mode. * Dependency: Add support for Cryptography ⇐ 38.
  • version update to 4.0.7

** Bugfix release: Fix broken naming for 'YubiKey 4', and a small OATH issue with touch Steam credentials.
  • version 4.0.6 (released 2021-09-08)

** Improve handling of YubiKey device reboots. ** More consistently mask PIN/password input in prompts. ** Support switching mode over CCID for YubiKey Edge. ** Run pkill from PATH instead of fixed location.
  • version 4.0.5 (released 2021-07-16)

** Bugfix: Fix PIV feature detection for some YubiKey NEO versions. ** Bugfix: Fix argument short form for --period when adding TOTP credentials. ** Bugfix: More strict validation for some arguments, resulting in better error messages. ** Bugfix: Correctly handle TOTP credentials using period != 30 AND touch_required. ** Bugfix: Fix prompting for access code in the otp settings command (now uses '-A -').
  • Update to version 4.0.3

* Add support for fido reset over NFC. * Bugfix: The --touch argument to piv change-management-key was ignored. * Bugfix: Don’t prompt for password when importing PIV key/cert if file is invalid. * Bugfix: Fix setting touch-eject/auto-eject for YubiKey 4 and NEO. * Bugfix: Detect PKCS#12 format when outer sequence uses indefinite length. * Dependency: Add support for Click 8.
  • Update to version 4.0.2

* Update device names * Add read_info output to the --diagnose command, and show exception types. * Bugfix: Fix read_info for YubiKey Plus. * Add support for YK5-based FIPS YubiKeys. * Bugfix: Fix OTP device enumeration on Win32. * Drop reliance on libusb and libykpersonalize. * Support the 'fido' and 'otp' subcommands over NFC * New 'ykman --diagnose' command to aid in troubleshooting. * New 'ykman apdu' command for sending raw APDUs over the smart card interface. * New 'yubikit' package added for custom development and advanced scripting. * OpenPGP: Add support for KDF enabled YubiKeys. * Static password: Add support for FR, IT, UK and BEPO keyboard layouts.
  • Update to 3.1.1

* Add support for YubiKey 5C NFC * OpenPGP: set-touch now performs compatibility checks before prompting for PIN * OpenPGP: Improve error messages and documentation for set-touch * PIV: read-object command no longer adds a trailing newline * CLI: Hint at missing permissions when opening a device fails * Linux: Improve error handling when pcscd is not running * Windows: Improve how .DLL files are loaded, thanks to Marius Gabriel Mihai for reporting this! * Bugfix: set-touch now accepts the cached-fixed option * Bugfix: Fix crash in OtpController.prepare_upload_key() error parsing * Bugfix: Fix crash in piv info command when a certificate slot contains an invalid certificate * Library: PivController.read_certificate(slot) now wraps certificate parsing exceptions in new exception type InvalidCertificate * Library: PivController.list_certificates() now returns None for slots containing invalid certificate, instead of raising an exception
  • Version 3.1.0 (released 2019-08-20)

* Add support for YubiKey 5Ci * OpenPGP: the info command now prints OpenPGP specification version as well * OpenPGP: Update support for attestation to match OpenPGP v3.4 * PIV: Use UTC time for self-signed certificates * OTP: Static password now supports the Norman keyboard layout
  • Version 3.0.0 (released 2019-06-24)

* Add support for new YubiKey Preview and lightning form factor * FIDO: Support for credential management * OpenPGP: Support for OpenPGP attestation, cardholder certificates and cached touch policies * OTP: Add flag for using numeric keypad when sending digits
  • Version 2.1.1 (released 2019-05-28)

* OTP: Add initial support for uploading Yubico OTP credentials to YubiCloud * Don’t automatically select the U2F applet on YubiKey NEO, it might be blocked by the OS * ChalResp: Always pad challenge correctly * Bugfix: Don’t crash with older versions of cryptography * Bugfix: Password was always prompted in OATH command, even if sent as argument
Changes in yubikey-manager-qt:
  • update to 1.2.5:

* Compatibility update for ykman 5.0.1. * Update to Python 3.11. * Update product images.
  • Update to version 1.2.4 (released 2021-10-26)

* Update device names and images. * PIV: Fix import of certificate.
  • Update to version 1.2.3

* Improved error handling when using Security Key Series devices. * PIV: Fix generation of certificate in slot 9c.
  • Update to version 1.2.2

* Fix detection of YubiKey Plus * Compatibility update for yubikey-manager 4.0 * Bugfix: Device caching with multiple devices * Drop dependencies on libusb and libykpers. * Add additional product names and images
  • update to 1.1.5

* Add support for YubiKey 5C NFC
  • Update to version 1.1.4

* OTP: Add option to upload YubiOTP credential to YubiCloud * Linux: Show hint about pcscd service if opening device fails * Bugfix: Signal handling now compatible with Python 3.8
  • Version 1.1.3 (released 2019-08-20)

* Add suppport for YubiKey 5Ci * PIV: Use UTC time for self-signed certificates
  • Version 1.1.2 (released 2019-06-24)

* Add support for new YubiKey Preview * PIV: The popup for the management key now have a 'Use default' option * Windows: Fix issue with importing PIV certificates * Bugfix: generate static password now works correctly


Advisory IDSUSE-RU-2023:2814-1
ReleasedWed Jul 12 22:05:25 2023
SummaryRecommended update for mozilla-nss
Typerecommended
Severitymoderate
References1185116,1202118
Description:

This update for mozilla-nss fixes the following issues:
mozilla-nss was updated to NSS 3.90:

  • Add a constant time select function
  • Updating an old dbm with lots of certs with keys to sql results in a database that is slow to access.
  • output early build errors by default
  • Update the technical constraints for KamuSM
  • Add BJCA Global Root CA1 and CA2 root certificates
  • Enable default UBSan Checks
  • Add explicit handling of zero length records
  • Tidy up DTLS ACK Error Handling Path
  • Refactor zero length record tests
  • Fix compiler warning via correct assert
  • run linux tests on nss-t/t-linux-xlarge-gcp
  • In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator
  • Fix reading raw negative numbers
  • Repairing unreachable code in clang built with gyp
  • Integrate Vale Curve25519
  • Removing unused flags for Hacl*
  • Adding a better error message
  • Update HACL* till 51a72a953a4ee6f91e63b2816ae5c4e62edf35d6
  • Fall back to the softokn when writing certificate trust
  • FIPS-104-3 requires we restart post programmatically
  • cmd/ecperf: fix dangling pointer warning on gcc 13
  • Update ACVP dockerfile for compatibility with debian package changes
  • Add a CI task for tracking ECCKiila code status, update whitespace in ECCKiila files
  • Removed deprecated sprintf function and replaced with snprintf
  • fix rst warnings in nss doc
  • Fix incorrect pygment style
  • Change GYP directive to apply across platforms
  • Add libsmime3 abi-check exception for NSS_CMSSignerInfo_GetDigestAlgTag

  • Merge the libfreebl3-hmac and libsoftokn3-hmac packages into the respective libraries. (bsc#1185116)

update to NSS 3.89.1
  • Update the technical constraints for KamuSM.
  • Add BJCA Global Root CA1 and CA2 root certificates.

update to NSS 3.89
  • revert freebl/softoken RSA_MIN_MODULUS_BITS increase
  • PR_STATIC_ASSERT is cursed
  • Need to add policy control to keys lengths for signatures
  • Fix unreachable code warning in fuzz builds
  • Fix various compiler warnings in NSS
  • Enable various compiler warnings for clang builds
  • set PORT error after sftk_HMACCmp failure
  • Need to add policy control to keys lengths for signatures
  • remove data length assertion in sec_PKCS7Decrypt
  • Make high tag number assertion failure an error
  • CKM_SHA384_KEY_DERIVATION correction maximum key length from 284 to 384
  • Tolerate certificate_authorities xtn in ClientHello
  • Fix build failure on Windows
  • migrate Win 2012 tasks to Azure
  • fix title length in doc
  • Add interop tests for HRR and PSK to GREASE suite
  • Add presence/absence tests for TLS GREASE
  • Correct addition of GREASE value to ALPN xtn
  • CH extension permutation
  • TLS GREASE (RFC8701)
  • improve handling of unknown PKCS#12 safe bag types
  • use a different treeherder symbol for each docker image build task
  • remove nested table in rst doc
  • Export NSS_CMSSignerInfo_GetDigestAlgTag
  • build failure while implicitly casting SECStatus to PRUInt32

update to NSS 3.88.1
  • improve handling of unknown PKCS#12 safe bag types

update to NSS 3.88
  • remove nested table in rst doc
  • Export NSS_CMSSignerInfo_GetDigestAlgTag.
  • build failure while implicitly casting SECStatus to PRUInt32
  • Add check for ClientHello SID max length
  • Added EarlyData ALPN test support to BoGo shim
  • ECH client - Discard resumption TLS < 1.3 Session(IDs|Tickets) if ECH configs are setup
  • On HRR skip PSK incompatible with negotiated ciphersuites hash algorithm
  • ECH client: Send ech_required alert on server negotiating TLS 1.2. Fixed misleading Gtest, enabled corresponding BoGo test
  • Added Bogo ECH rejection test support
  • Added ECH 0Rtt support to BoGo shim
  • RSA OAEP Wycheproof JSON
  • RSA decrypt Wycheproof JSON
  • ECDSA Wycheproof JSON
  • ECDH Wycheproof JSON
  • PKCS#1v1.5 wycheproof json
  • Use X25519 wycheproof json
  • Move scripts to python3
  • Properly link FuzzingEngine for oss-fuzz.
  • Extending RSA-PSS bltest test coverage (Adding SHA-256 and SHA-384)
  • NSS needs to move off of DSA for integrity checks
  • Add initial testing with ACVP vector sets using acvp-rust
  • Don't clone libFuzzer, rely on clang instead

update to NSS 3.87
  • NULL password encoding incorrect
  • Fix rng stub signature for fuzzing builds
  • Updating the compiler parsing for build
  • Modification of supported compilers
  • tstclnt crashes when accessing gnutls server without a user cert in the database.
  • Add configuration option to enable source-based coverage sanitizer
  • Update ECCKiila generated files.
  • Add support for the LoongArch 64-bit architecture
  • add checks for zero-length RSA modulus to avoid memory errors and failed assertions later
  • Additional zero-length RSA modulus checks

update to NSS 3.86
  • conscious language removal in NSS
  • Set nssckbi version number to 2.60
  • Set CKA_NSS_SERVER_DISTRUST_AFTER and CKA_NSS_EMAIL_DISTRUST_AFTER for 3 TrustCor Root Certificates
  • Remove Staat der Nederlanden EV Root CA from NSS
  • Remove EC-ACC root cert from NSS
  • Remove SwissSign Platinum CA - G2 from NSS
  • Remove Network Solutions Certificate Authority
  • compress docker image artifact with zstd
  • Migrate nss from AWS to GCP
  • Enable static builds in the CI
  • Removing SAW docker from the NSS build system
  • Initialising variables in the rsa blinding code
  • Implementation of the double-signing of the message for ECDSA
  • Adding exponent blinding for RSA.

update to NSS 3.85
  • Modification of the primes.c and dhe-params.c in order to have better looking tables
  • Update zlib in NSS to 1.2.13
  • Skip building modutil and shlibsign when building in Firefox
  • Use __STDC_VERSION__ rather than __STDC__ as a guard
  • Remove redundant variable definitions in lowhashtest
  • Add note about python executable to build instructions.

update to NSS 3.84
  • Bump minimum NSPR version to 4.35
  • Add a flag to disable building libnssckbi.

update to NSS 3.83
  • Remove set-but-unused variables from SEC_PKCS12DecoderValidateBags
  • Set nssckbi version number to 2.58
  • Add two SECOM root certificates to NSS
  • Add two DigitalSign root certificates to NSS
  • Remove Camerfirma Global Chambersign Root from NSS
  • Added bug reference and description to disabled UnsolicitedServerNameAck bogo ECH test
  • Removed skipping of ECH on equality of private and public server name
  • Added comment and bug reference to ECHRandomHRRExtension bogo test
  • Added Bogo shim client HRR test support. Fixed overwriting of CHInner.random on HRR
  • Added check for server only sending ECH extension
with retry configs in EncryptedExtensions and if not accepting ECH. Changed config setting behavior to skip configs with unsupported mandatory extensions instead of failing
  • Added ECH client support to BoGo shim. Changed
  • CHInner creation to skip TLS 1.2 only extensions to comply with BoGo
  • Added ECH server support to BoGo shim. Fixed NSS ECH server accept_confirmation bugs
  • Update BoGo tests to recent BoringSSL version
  • Bump minimum NSPR version to 4.34.1

  • update to NSS 3.82
    • check for null template in sec_asn1{d,e}_push_state
    • QuickDER: Forbid NULL tags with non-zero length
    • Initialize local variables in TlsConnectTestBase::ConnectAndCheckCipherSuite
    • Cast the result of GetProcAddress
    • pk11wrap: Tighten certificate lookup based on PKCS #11 URI.

    update to NSS 3.81
    • Enable aarch64 hardware crypto support on OpenBSD
    • make NSS_SecureMemcmp 0/1 valued
    • Add no_application_protocol alert handler and test client error code is set
    • Gracefully handle null nickname in CERT_GetCertNicknameWithValidity
    • required for Firefox 104

    • raised NSPR requirement to 4.34.1

    • changing some Requires from (pre) to generic as (pre) is not sufficient (bsc#1202118)

    update to NSS 3.80
    • Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
    • Add support for asynchronous client auth hooks.
    • nss-policy-check: make unknown keyword check optional.
    • GatherBuffer: Reduced plaintext buffer allocations
    by allocating it on initialization. Replaced redundant code with assert. Debug builds: Added buffer freeing/allocation for each record.
  • Mark 3.79 as an ESR release.
  • Bump nssckbi version number for June.
  • Remove Hellenic Academic 2011 Root.
  • Add E-Tugra Roots.
  • Add Certainly Roots.
  • Add DigitCert Roots.
  • Protect SFTKSlot needLogin with slotLock.
  • Compare signature and signatureAlgorithm fields in legacy certificate verifier.
  • Uninitialized value in cert_VerifyCertChainOld.
  • Unchecked return code in sec_DecodeSigAlg.
  • Uninitialized value in cert_ComputeCertType.
  • Avoid data race on primary password change.
  • Replace ppc64 dcbzl intrinisic.
  • Allow LDFLAGS override in makefile builds.

  • SUSE-CU-2023:2252-1

    Container Advisory IDSUSE-CU-2023:2252-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-7.12
    Container Release7.12
    The following patches have been included in this update:
    Advisory IDSUSE-RU-2023:2788-1
    ReleasedThu Jul 6 11:51:02 2023
    SummaryRecommended update for mozilla-nspr, mozilla-nss
    Typerecommended
    Severitymoderate
    References1185116,1202118
    Description:

    This update for mozilla-nspr, mozilla-nss fixes the following issues:
    mozilla-nspr was updated to version 4.35

    • fixes for building with clang
    • use the number of online processors for the PR_GetNumberOfProcessors() API on some platforms
    • fix build on mips+musl libc
    • Add support for the LoongArch 64-bit architecture

    mozilla-nss was update to NSS 3.90:
    • clang-format lib/freebl/stubs.c
    • Add a constant time select function
    • Updating an old dbm with lots of certs with keys to sql results in a database that is slow to access.
    • output early build errors by default
    • Update the technical constraints for KamuSM
    • Add BJCA Global Root CA1 and CA2 root certificates
    • Enable default UBSan Checks
    • Add explicit handling of zero length records
    • Tidy up DTLS ACK Error Handling Path
    • Refactor zero length record tests
    • Fix compiler warning via correct assert
    • run linux tests on nss-t/t-linux-xlarge-gcp
    • In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator
    • Fix reading raw negative numbers
    • Repairing unreachable code in clang built with gyp
    • Integrate Vale Curve25519
    • Removing unused flags for Hacl*
    • Adding a better error message
    • Update HACL* till 51a72a953a4ee6f91e63b2816ae5c4e62edf35d6
    • Fall back to the softokn when writing certificate trust
    • FIPS-104-3 requires we restart post programmatically
    • cmd/ecperf: fix dangling pointer warning on gcc 13
    • Update ACVP dockerfile for compatibility with debian package changes
    • Add a CI task for tracking ECCKiila code status, update whitespace in ECCKiila files
    • Removed deprecated sprintf function and replaced with snprintf
    • fix rst warnings in nss doc
    • Fix incorrect pygment style
    • Change GYP directive to apply across platforms
    • Add libsmime3 abi-check exception for NSS_CMSSignerInfo_GetDigestAlgTag

    • Merge the libfreebl3-hmac and libsoftokn3-hmac packages into the respective libraries. (bsc#1185116)

    update to NSS 3.89.1
    • Update the technical constraints for KamuSM.
    • Add BJCA Global Root CA1 and CA2 root certificates.

    update to NSS 3.89
    • revert freebl/softoken RSA_MIN_MODULUS_BITS increase
    • PR_STATIC_ASSERT is cursed
    • Need to add policy control to keys lengths for signatures
    • Fix unreachable code warning in fuzz builds
    • Fix various compiler warnings in NSS
    • Enable various compiler warnings for clang builds
    • set PORT error after sftk_HMACCmp failure
    • Need to add policy control to keys lengths for signatures
    • remove data length assertion in sec_PKCS7Decrypt
    • Make high tag number assertion failure an error
    • CKM_SHA384_KEY_DERIVATION correction maximum key length from 284 to 384
    • Tolerate certificate_authorities xtn in ClientHello
    • Fix build failure on Windows
    • migrate Win 2012 tasks to Azure
    • fix title length in doc
    • Add interop tests for HRR and PSK to GREASE suite
    • Add presence/absence tests for TLS GREASE
    • Correct addition of GREASE value to ALPN xtn
    • CH extension permutation
    • TLS GREASE (RFC8701)
    • improve handling of unknown PKCS#12 safe bag types
    • use a different treeherder symbol for each docker image build task
    • remove nested table in rst doc
    • Export NSS_CMSSignerInfo_GetDigestAlgTag
    • build failure while implicitly casting SECStatus to PRUInt32

    update to NSS 3.88.1
    • improve handling of unknown PKCS#12 safe bag types

    update to NSS 3.88
    • remove nested table in rst doc
    • Export NSS_CMSSignerInfo_GetDigestAlgTag.
    • build failure while implicitly casting SECStatus to PRUInt32
    • Add check for ClientHello SID max length
    • Added EarlyData ALPN test support to BoGo shim
    • ECH client - Discard resumption TLS < 1.3 Session(IDs|Tickets) if ECH configs are setup
    • On HRR skip PSK incompatible with negotiated ciphersuites hash algorithm
    • ECH client: Send ech_required alert on server negotiating TLS 1.2. Fixed misleading Gtest, enabled corresponding BoGo test
    • Added Bogo ECH rejection test support
    • Added ECH 0Rtt support to BoGo shim
    • RSA OAEP Wycheproof JSON
    • RSA decrypt Wycheproof JSON
    • ECDSA Wycheproof JSON
    • ECDH Wycheproof JSON
    • PKCS#1v1.5 wycheproof json
    • Use X25519 wycheproof json
    • Move scripts to python3
    • Properly link FuzzingEngine for oss-fuzz.
    • Extending RSA-PSS bltest test coverage (Adding SHA-256 and SHA-384)
    • NSS needs to move off of DSA for integrity checks
    • Add initial testing with ACVP vector sets using acvp-rust
    • Don't clone libFuzzer, rely on clang instead

    update to NSS 3.87
    • NULL password encoding incorrect
    • Fix rng stub signature for fuzzing builds
    • Updating the compiler parsing for build
    • Modification of supported compilers
    • tstclnt crashes when accessing gnutls server without a user cert in the database.
    • Add configuration option to enable source-based coverage sanitizer
    • Update ECCKiila generated files.
    • Add support for the LoongArch 64-bit architecture
    • add checks for zero-length RSA modulus to avoid memory errors and failed assertions later
    • Additional zero-length RSA modulus checks

    update to NSS 3.86
    • conscious language removal in NSS
    • Set nssckbi version number to 2.60
    • Set CKA_NSS_SERVER_DISTRUST_AFTER and CKA_NSS_EMAIL_DISTRUST_AFTER for 3 TrustCor Root Certificates
    • Remove Staat der Nederlanden EV Root CA from NSS
    • Remove EC-ACC root cert from NSS
    • Remove SwissSign Platinum CA - G2 from NSS
    • Remove Network Solutions Certificate Authority
    • compress docker image artifact with zstd
    • Migrate nss from AWS to GCP
    • Enable static builds in the CI
    • Removing SAW docker from the NSS build system
    • Initialising variables in the rsa blinding code
    • Implementation of the double-signing of the message for ECDSA
    • Adding exponent blinding for RSA.

    update to NSS 3.85
    • Modification of the primes.c and dhe-params.c in order to have better looking tables
    • Update zlib in NSS to 1.2.13
    • Skip building modutil and shlibsign when building in Firefox
    • Mark _nss_version_c unused on clang-cl
    • bmo#1795668 - Remove redundant variable definitions in lowhashtest
    • Add note about python executable to build instructions.

    update to NSS 3.84
    • Bump minimum NSPR version to 4.35
    • Add a flag to disable building libnssckbi.

    update to NSS 3.83
    • Remove set-but-unused variables from SEC_PKCS12DecoderValidateBags
    • Set nssckbi version number to 2.58
    • Add two SECOM root certificates to NSS
    • Add two DigitalSign root certificates to NSS
    • Remove Camerfirma Global Chambersign Root from NSS
    • Added bug reference and description to disabled UnsolicitedServerNameAck bogo ECH test
    • Removed skipping of ECH on equality of private and public server name
    • Added comment and bug reference to ECHRandomHRRExtension bogo test
    • Added Bogo shim client HRR test support. Fixed overwriting of CHInner.random on HRR
    • Added check for server only sending ECH extension with retry configs in EncryptedExtensions and if not accepting ECH. Changed config setting behavior to skip configs with unsupported mandatory extensions instead of failing
    • Added ECH client support to BoGo shim. Changed CHInner creation to skip TLS 1.2 only extensions to comply with BoGo
    • Added ECH server support to BoGo shim. Fixed NSS ECH server accept_confirmation bugs
    • Update BoGo tests to recent BoringSSL version
    • Bump minimum NSPR version to 4.34.1

    update to NSS 3.82
    • check for null template in sec_asn1{d,e}_push_state
    • QuickDER: Forbid NULL tags with non-zero length
    • Initialize local variables in TlsConnectTestBase::ConnectAndCheckCipherSuite
    • Cast the result of GetProcAddress
    • pk11wrap: Tighten certificate lookup based on PKCS #11 URI.

    update to NSS 3.81
    • Enable aarch64 hardware crypto support on OpenBSD
    • make NSS_SecureMemcmp 0/1 valued
    • Add no_application_protocol alert handler and test client error code is set
    • Gracefully handle null nickname in CERT_GetCertNicknameWithValidity
    • required for Firefox 104

    • raised NSPR requirement to 4.34.1

    • changing some Requires from (pre) to generic as (pre) is not sufficient (bsc#1202118)

    update to NSS 3.80
    • Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
    • Add support for asynchronous client auth hooks.
    • nss-policy-check: make unknown keyword check optional.
    • GatherBuffer: Reduced plaintext buffer allocations
    by allocating it on initialization. Replaced redundant code with assert. Debug builds: Added buffer freeing/allocation for each record.
  • Mark 3.79 as an ESR release.
  • Bump nssckbi version number for June.
  • Remove Hellenic Academic 2011 Root.
  • Add E-Tugra Roots.
  • Add Certainly Roots.
  • Add DigitCert Roots.
  • Protect SFTKSlot needLogin with slotLock.
  • Compare signature and signatureAlgorithm fields in legacy certificate verifier.
  • Uninitialized value in cert_VerifyCertChainOld.
  • Unchecked return code in sec_DecodeSigAlg.
  • Uninitialized value in cert_ComputeCertType.
  • Avoid data race on primary password change.
  • Replace ppc64 dcbzl intrinisic.
  • Allow LDFLAGS override in makefile builds.

  • SUSE-CU-2023:2230-1

    Container Advisory IDSUSE-CU-2023:2230-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-7.9
    Container Release7.9
    The following patches have been included in this update:
    Advisory IDSUSE-SU-2023:2765-1
    ReleasedMon Jul 3 20:28:14 2023
    SummarySecurity update for libcap
    Typesecurity
    Severitymoderate
    References1211418,1211419,CVE-2023-2602,CVE-2023-2603
    Description:

    This update for libcap fixes the following issues:

    • CVE-2023-2602: Fixed improper memory release in libcap/psx/psx.c:__wrap_pthread_create() (bsc#1211418).
    • CVE-2023-2603: Fixed an integer overflow or wraparound in libcap/cap_alloc.c:_libcap_strdup() (bsc#1211419).


    SUSE-CU-2023:2175-1

    Container Advisory IDSUSE-CU-2023:2175-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-7.2
    Container Release7.2
    The following patches have been included in this update:

    SUSE-CU-2023:2149-1

    Container Advisory IDSUSE-CU-2023:2149-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.16
    Container Release6.16
    The following patches have been included in this update:

    SUSE-CU-2023:2127-1

    Container Advisory IDSUSE-CU-2023:2127-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.14
    Container Release6.14
    The following patches have been included in this update:
    Advisory ID29171
    ReleasedTue Jun 20 12:29:00 2023
    SummarySecurity update for openssl-1_1
    Typesecurity
    Severityimportant
    References1201627,1207534,1211430,CVE-2022-4304,CVE-2023-2650
    Description:

    This update for openssl-1_1 fixes the following issues:

    • CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
    • CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption. The previous fix for this timing side channel turned out to cause a severe 2-3x performance regression in the typical use case (bsc#1207534).

    • Update further expiring certificates that affect tests (bsc#1201627)


    Advisory IDSUSE-RU-2023:2625-1
    ReleasedFri Jun 23 17:16:11 2023
    SummaryRecommended update for gcc12
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for gcc12 fixes the following issues:

    • Update to GCC 12.3 release, 0c61aa720e62f1baf0bfd178e283, git1204

    * includes regression and other bug fixes
    • Speed up builds with --enable-link-serialization.

    • Update embedded newlib to version 4.2.0


    SUSE-CU-2023:2092-1

    Container Advisory IDSUSE-CU-2023:2092-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.9
    Container Release6.9
    The following patches have been included in this update:
    Advisory IDSUSE-SU-2023:2614-1
    ReleasedThu Jun 22 14:02:30 2023
    SummarySecurity update for libX11
    Typesecurity
    Severityimportant
    References1212102,CVE-2023-3138
    Description:

    This update for libX11 fixes the following issues:

    • CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102).


    SUSE-CU-2023:2073-1

    Container Advisory IDSUSE-CU-2023:2073-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.7
    Container Release6.7
    The following patches have been included in this update:

    SUSE-CU-2023:2024-1

    Container Advisory IDSUSE-CU-2023:2024-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.5
    Container Release6.5
    The following patches have been included in this update:

    SUSE-CU-2023:1976-1

    Container Advisory IDSUSE-CU-2023:1976-1
    Container Tagsbci/openjdk-devel:11 , bci/openjdk-devel:11-6.2
    Container Release6.2
    The following patches have been included in this update:
    Advisory IDSUSE-RU-2018:1332-1
    ReleasedTue Jul 17 09:01:19 2018
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1073299,1093392
    Description:

    This update for timezone provides the following fixes:

    • North Korea switches back from +0830 to +09 on 2018-05-05.
    • Ireland's standard time is in the summer, with negative DST offset to standard time used in Winter. (bsc#1073299)
    • yast2-country is no longer setting TIMEZONE in /etc/sysconfig/clock and is calling systemd timedatectl instead. Do not set /etc/localtime on timezone package updates to avoid setting an incorrect timezone. (bsc#1093392)


    Advisory IDSUSE-SU-2018:1462-1
    ReleasedTue Jul 31 14:04:41 2018
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1101645,1101651,1101655,1101656,CVE-2018-2940,CVE-2018-2952,CVE-2018-2972,CVE-2018-2973
    Description:

    This java-11-openjdk update to version jdk-11+24 fixes the following issues:
    Security issues fixed:

    • CVE-2018-2940: Fix unspecified vulnerability in subcomponent Libraries (bsc#1101645).
    • CVE-2018-2952: Fix unspecified vulnerability in subcomponent Concurrency (bsc#1101651).
    • CVE-2018-2972: Fix unspecified vulnerability in subcomponent Security (bsc#1101655).
    • CVE-2018-2973: Fix unspecified vulnerability in subcomponent JSSE (bsc#1101656).


    Advisory IDSUSE-SU-2018:2082-1
    ReleasedSun Sep 30 14:06:27 2018
    SummarySecurity update for libX11
    Typesecurity
    Severitymoderate
    References1102062,1102068,1102073,CVE-2018-14598,CVE-2018-14599,CVE-2018-14600
    Description:

    This update for libX11 fixes the following security issues:

    • CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact (bsc#1102062)
    • CVE-2018-14600: The function XListExtensions interpreted a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution (bsc#1102068)
    • CVE-2018-14598: A malicious server could have sent a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault) (bsc#1102073)


    Advisory IDSUSE-RU-2018:2298-1
    ReleasedWed Oct 17 17:02:57 2018
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References1111162,1112142,1112143,1112144,1112145,1112146,1112147,1112148,1112149,CVE-2018-3136,CVE-2018-3139,CVE-2018-3149,CVE-2018-3150,CVE-2018-3157,CVE-2018-3169,CVE-2018-3180,CVE-2018-3183
    Description:

    This update for java-11-openjdk fixes the following issues:
    Update to upstream tag jdk-11.0.1+13 (Oracle October 2018 CPU)
    Security fixes:

    • S8202936, CVE-2018-3183, bsc#1112148: Improve script engine support
    • S8199226, CVE-2018-3169, bsc#1112146: Improve field accesses
    • S8199177, CVE-2018-3149, bsc#1112144: Enhance JNDI lookups
    • S8202613, CVE-2018-3180, bsc#1112147: Improve TLS connections stability
    • S8208209, CVE-2018-3180, bsc#1112147: Improve TLS connection stability again
    • S8199172, CVE-2018-3150, bsc#1112145: Improve jar attribute checks
    • S8200648, CVE-2018-3157, bsc#1112149: Make midi code more sound
    • S8194534, CVE-2018-3136, bsc#1112142: Manifest better support
    • S8208754, CVE-2018-3136, bsc#1112142: The fix for JDK-8194534 needs updates
    • S8196902, CVE-2018-3139, bsc#1112143: Better HTTP Redirection

    Security-In-Depth fixes:
    • S8194546: Choosier FileManagers
    • S8195874: Improve jar specification adherence
    • S8196897: Improve PRNG support
    • S8197881: Better StringBuilder support
    • S8201756: Improve cipher inputs
    • S8203654: Improve cypher state updates
    • S8204497: Better formatting of decimals
    • S8200666: Improve LDAP support
    • S8199110: Address Internet Addresses

    Update to upstream tag jdk-11+28 (OpenJDK 11 rc1)
    • S8207317: SSLEngine negotiation fail exception behavior changed from fail-fast to fail-lazy
    • S8207838: AArch64: Float registers incorrectly restored in JNI call
    • S8209637: [s390x] Interpreter doesn't call result handler after native calls
    • S8209670: CompilerThread releasing code buffer in destructor is unsafe
    • S8209735: Disable avx512 by default
    • S8209806: API docs should be updated to refer to javase11
    • Report version without the '-internal' postfix

    • Don't build against gdk making the accessibility depend on a particular version of gtk.

    Update to upstream tag jdk-11+27
    • S8031761: [TESTBUG] Add a regression test for JDK-8026328
    • S8151259: [TESTBUG] nsk/jvmti/RedefineClasses/redefclass030 fails with 'unexpected values of outer fields of the class' when running with -Xcomp
    • S8164639: Configure PKCS11 tests to use user-supplied NSS libraries
    • S8189667: Desktop#moveToTrash expects incorrect '<>' FilePermission
    • S8194949: [Graal] gc/TestNUMAPageSize.java fail with OOM in -Xcomp
    • S8195156: [Graal] serviceability/jvmti/GetModulesInfo/ /JvmtiGetAllModulesTest.java fails with Graal in Xcomp mode
    • S8199081: [Testbug] compiler/linkage/LinkageErrors.java fails if run twice
    • S8201394: Update java.se module summary to reflect removal of java.se.ee module
    • S8204931: Colors with alpha are painted incorrectly on Linux
    • S8204966: [TESTBUG] hotspot/test/compiler/whitebox/ /IsMethodCompilableTest.java test fails with -XX:CompileThreshold=1
    • S8205608: Fix 'frames()' in ThreadReferenceImpl.c to prevent quadratic runtime behavior
    • S8205687: TimeoutHandler generates huge core files
    • S8206176: Remove the temporary tls13VN field
    • S8206258: [Test Error] sun/security/pkcs11 tests fail if NSS libs not found
    • S8206965: java/util/TimeZone/Bug8149452.java failed on de_DE and ja_JP locale.
    • S8207009: TLS 1.3 half-close and synchronization issues
    • S8207046: arm32 vm crash: C1 arm32 platform functions parameters type mismatch
    • S8207139: NMT is not enabled on Windows 2016/10
    • S8207237: SSLSocket#setEnabledCipherSuites is accepting empty string
    • S8207355: C1 compilation hangs in ComputeLinearScanOrder::compute_dominator
    • S8207746: C2: Lucene crashes on AVX512 instruction
    • S8207765: HeapMonitorTest.java intermittent failure
    • S8207944: java.lang.ClassFormatError: Extra bytes at the end of class file test' possibly violation of JVMS 4.7.1
    • S8207948: JDK 11 L10n resource file update msg drop 10
    • S8207966: HttpClient response without content-length does not return body
    • S8208125: Cannot input text into JOptionPane Text Input Dialog
    • S8208164: (str) improve specification of String::lines
    • S8208166: Still unable to use custom SSLEngine with default TrustManagerFactory after JDK-8207029
    • S8208189: ProblemList compiler/graalunit/JttThreadsTest.java
    • S8208205: ProblemList tests that fail due to 'Error attaching to process: Can't create thread_db agent!'
    • S8208226: ProblemList com/sun/jdi/BasicJDWPConnectionTest.java
    • S8208251: serviceability/jvmti/HeapMonitor/MyPackage/ /HeapMonitorGCCMSTest.java fails intermittently on Linux-X64
    • S8208305: ProblemList compiler/jvmci/compilerToVM/GetFlagValueTest.java
    • S8208347: ProblemList compiler/cpuflags/TestAESIntrinsicsOnSupportedConfig.java
    • S8208353: Upgrade JDK 11 to libpng 1.6.35
    • S8208358: update bug ids mentioned in tests
    • S8208370: fix typo in ReservedStack tests' @requires
    • S8208391: Differentiate response and connect timeouts in HTTP Client API
    • S8208466: Fix potential memory leak in harfbuzz shaping.
    • S8208496: New Test to verify concurrent behavior of TLS.
    • S8208521: ProblemList more tests that fail due to 'Error attaching to process: Can't create thread_db agent!'
    • S8208640: [a11y] [macos] Unable to navigate between Radiobuttons in Radio group using keyboard.
    • S8208663: JDK 11 L10n resource file update msg drop 20
    • S8208676: Missing NULL check and resource leak in NetworkPerformanceInterface::NetworkPerformance::network_utilization
    • S8208691: Tighten up jdk.includeInExceptions security property
    • S8209011: [TESTBUG] AArch64: sun/security/pkcs11/Secmod/ /TestNssDbSqlite.java fails in aarch64 platforms
    • S8209029: ProblemList tests that fail due to 'Error attaching to process: Can't create thread_db agent!' in jdk-11+25 testing
    • S8209149: [TESTBUG] runtime/RedefineTests/ /RedefineRunningMethods.java needs a longer timeout
    • S8209451: Please change jdk 11 milestone to FCS
    • S8209452: VerifyCACerts.java failed with 'At least one cacert test failed'
    • S8209506: Add Google Trust Services GlobalSign root certificates
    • S8209537: Two security tests failed after JDK-8164639 due to dependency was missed


    Advisory IDSUSE-RU-2018:2307-1
    ReleasedThu Oct 18 14:42:54 2018
    SummaryRecommended update for libxcb
    Typerecommended
    Severitymoderate
    References1101560
    Description:

    This update for libxcb provides the following fix:

    • Fix some IO errors when using KWin in combination with the NVIDIA driver. (bsc#1101560)


    Advisory IDSUSE-RU-2018:2463-1
    ReleasedThu Oct 25 14:48:34 2018
    SummaryRecommended update for timezone, timezone-java
    Typerecommended
    Severitymoderate
    References1104700,1112310
    Description:


    This update for timezone, timezone-java fixes the following issues:
    The timezone database was updated to 2018f:

    • Volgograd moves from +03 to +04 on 2018-10-28.
    • Fiji ends DST 2019-01-13, not 2019-01-20.
    • Most of Chile changes DST dates, effective 2019-04-06 (bsc#1104700)
    • Corrections to past timestamps of DST transitions
    • Use 'PST' and 'PDT' for Philippine time
    • minor code changes to zic handling of the TZif format
    • documentation updates

    Other bugfixes:
    • Fixed a zic problem with the 1948-1951 DST transition in Japan (bsc#1112310)


    Advisory IDSUSE-RU-2018:2550-1
    ReleasedWed Oct 31 16:16:56 2018
    SummaryRecommended update for timezone, timezone-java
    Typerecommended
    Severitymoderate
    References1113554
    Description:

    This update provides the latest time zone definitions (2018g), including the following change:

    • Morocco switched from +00/+01 to permanent +01 effective 2018-10-28 (bsc#1113554)


    Advisory IDSUSE-RU-2018:2569-1
    ReleasedFri Nov 2 19:00:18 2018
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1110700
    Description:

    This update for pam fixes the following issues:

    • Remove limits for nproc from /etc/security/limits.conf (bsc#1110700)


    Advisory IDSUSE-RU-2018:2607-1
    ReleasedWed Nov 7 15:42:48 2018
    SummaryOptional update for gcc8
    Typerecommended
    Severitylow
    References1084812,1084842,1087550,1094222,1102564
    Description:


    The GNU Compiler GCC 8 is being added to the Development Tools Module by this update.
    The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other gcc derived libraries for the Basesystem module of SUSE Linux Enterprise 15.
    Various optimizers have been improved in GCC 8, several of bugs fixed, quite some new warnings added and the error pin-pointing and fix-suggestions have been greatly improved.
    The GNU Compiler page for GCC 8 contains a summary of all the changes that have happened:
    https://gcc.gnu.org/gcc-8/changes.html
    Also changes needed or common pitfalls when porting software are described on:
    https://gcc.gnu.org/gcc-8/porting_to.html


    Advisory IDSUSE-RU-2018:2625-1
    ReleasedMon Nov 12 08:58:25 2018
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References1113734
    Description:

    This update for java-11-openjdk fixes the following issues:
    Merge into the JDK following modules from github.com/javaee:

    • com.sum.xml.fastinfoset
    • org.jvnet.staxex
    • com.sun.istack.runtime
    • com.sun.xml.txw2
    • com.sun.xml.bind

    This provides a default implementation of JAXB-API that existed in JDK before Java 11 and that some applications depend on.


    Advisory IDSUSE-SU-2018:2825-1
    ReleasedMon Dec 3 15:35:02 2018
    SummarySecurity update for pam
    Typesecurity
    Severityimportant
    References1115640,CVE-2018-17953
    Description:

    This update for pam fixes the following issue:
    Security issue fixed:

    • CVE-2018-17953: Fixed IP address and subnet handling of pam_access.so that was not honoured correctly when a single host was specified (bsc#1115640).


    Advisory IDSUSE-SU-2018:2861-1
    ReleasedThu Dec 6 14:32:01 2018
    SummarySecurity update for ncurses
    Typesecurity
    Severityimportant
    References1103320,1115929,CVE-2018-19211
    Description:

    This update for ncurses fixes the following issues:
    Security issue fixed:

    • CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).

    Non-security issue fixed:
    • Remove scree.xterm from terminfo data base as with this screen uses fallback TERM=screen (bsc#1103320).


    Advisory IDSUSE-SU-2018:3044-1
    ReleasedFri Dec 21 18:47:21 2018
    SummarySecurity update for MozillaFirefox, mozilla-nspr and mozilla-nss
    Typesecurity
    Severityimportant
    References1097410,1106873,1119069,1119105,CVE-2018-0495,CVE-2018-12384,CVE-2018-12404,CVE-2018-12405,CVE-2018-17466,CVE-2018-18492,CVE-2018-18493,CVE-2018-18494,CVE-2018-18498
    Description:

    This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:
    Issues fixed in MozillaFirefox:

    • Update to Firefox ESR 60.4 (bsc#1119105)
    • CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
    • CVE-2018-18492: Fixed a use-after-free with select element
    • CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
    • CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs
    • CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
    • CVE-2018-12405: Fixed a few memory safety bugs

    Issues fixed in mozilla-nss:
    • Update to NSS 3.40.1 (bsc#1119105)
    • CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
    • CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
    • CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
    • Fixed a decryption failure during FFDHE key exchange
    • Various security fixes in the ASN.1 code

    Issues fixed in mozilla-nspr:
    • Update mozilla-nspr to 4.20 (bsc#1119105)


    Advisory IDSUSE-RU-2019:44-1
    ReleasedTue Jan 8 13:07:32 2019
    SummaryRecommended update for acl
    Typerecommended
    Severitylow
    References953659
    Description:

    This update for acl fixes the following issues:

    • test: Add helper library to fake passwd/group files.
    • quote: Escape literal backslashes. (bsc#953659)


    Advisory IDSUSE-RU-2019:102-1
    ReleasedTue Jan 15 18:02:58 2019
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1120402
    Description:

    This update for timezone fixes the following issues:

    • Update 2018i: São Tomé and Príncipe switches from +01 to +00 on 2019-01-01. (bsc#1120402)
    • Update 2018h: Qyzylorda, Kazakhstan moved from +06 to +05 on 2018-12-21 New zone Asia/Qostanay because Qostanay, Kazakhstan didn't move Metlakatla, Alaska observes PST this winter only Guess Morocco will continue to adjust clocks around Ramadan Add predictions for Iran from 2038 through 2090


    Advisory IDSUSE-SU-2019:221-1
    ReleasedFri Feb 1 15:20:56 2019
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1120431,1122293,1122299,CVE-2018-11212,CVE-2019-2422,CVE-2019-2426
    Description:

    This update for java-11-openjdk to version 11.0.2+7 fixes the following issues:
    Security issues fixed:

    • CVE-2019-2422: Better FileChannel transfer performance (bsc#1122293)
    • CVE-2019-2426: Improve web server connections
    • CVE-2018-11212: Improve JPEG processing (bsc#1122299)
    • Better route routing
    • Better interface enumeration
    • Better interface lists
    • Improve BigDecimal support
    • Improve robot support
    • Better icon support
    • Choose printer defaults
    • Proper allocation handling
    • Initial class initialization
    • More reliable p11 transactions
    • Improve NIO stability
    • Better loading of classloader classes
    • Strengthen Windows Access Bridge Support
    • Improved data set handling
    • Improved LSA authentication
    • Libsunmscapi improved interactions

    Non-security issues fix:
    • Do not resolve by default the added JavaEE modules (bsc#1120431)
    • ~2.5% regression on compression benchmark starting with 12-b11
    • java.net.http.HttpClient hangs on 204 reply without Content-length 0
    • Add additional TeliaSonera root certificate
    • Add more ld preloading related info to hs_error file on Linux
    • Add test to exercise server-side client hello processing
    • AES encrypt performance regression in jdk11b11
    • AIX: ProcessBuilder: Piping between created processes does not work.
    • AIX: Some class library files are missing the Classpath exception
    • AppCDS crashes for some uses with JRuby
    • Automate vtable/itable stub size calculation
    • BarrierSetC1::generate_referent_check() confuses register allocator
    • Better HTTP Redirection
    • Catastrophic size_t underflow in BitMap::*_large methods
    • Clip.isRunning() may return true after Clip.stop() was called
    • Compiler thread creation should be bounded by available space in memory and Code Cache
    • com.sun.net.httpserver.HttpServer returns Content-length header for 204 response code
    • Default mask register for avx512 instructions
    • Delayed starting of debugging via jcmd
    • Disable all DES cipher suites
    • Disable anon and NULL cipher suites
    • Disable unsupported GCs for Zero
    • Epsilon alignment adjustments can overflow max TLAB size
    • Epsilon elastic TLAB sizing may cause misalignment
    • HotSpot update for vm_version.cpp to recognise updated VS2017
    • HttpClient does not retrieve files with large sizes over HTTP/1.1
    • IIOException 'tEXt chunk length is not proper' on opening png file
    • Improve TLS connection stability again
    • InitialDirContext ctor sometimes throws NPE if the server has sent a disconnection
    • Inspect stack during error reporting
    • Instead of circle rendered in appl window, but ellipse is produced JEditor Pane
    • Introduce diagnostic flag to abort VM on failed JIT compilation
    • Invalid assert(HeapBaseMinAddress > 0) in ReservedHeapSpace::initialize_compressed_heap
    • jar has issues with UNC-path arguments for the jar -C parameter [windows]
    • java.net.http HTTP client should allow specifying Origin and Referer headers
    • java.nio.file.Files.writeString writes garbled UTF-16 instead of UTF-8
    • JDK 11.0.1 l10n resource file update
    • JDWP Transport Listener: dt_socket thread crash
    • JVMTI ResourceExhausted should not be posted in CompilerThread
    • LDAPS communication failure with jdk 1.8.0_181
    • linux: Poor StrictMath performance due to non-optimized compilation
    • Missing synchronization when reading counters for live threads and peak thread count
    • NPE in SupportedGroupsExtension
    • OpenDataException thrown when constructing CompositeData for StackTraceElement
    • Parent class loader may not have a referred ClassLoaderData instance when obtained in Klass::class_in_module_of_loader
    • Populate handlers while holding streamHandlerLock
    • ppc64: Enable POWER9 CPU detection
    • print_location is not reliable enough (printing register info)
    • Reconsider default option for ClassPathURLCheck change done in JDK-8195874
    • Register to register spill may use AVX 512 move instruction on unsupported platform.
    • s390: Use of shift operators not covered by cpp standard
    • serviceability/sa/TestUniverse.java#id0 intermittently fails with assert(get_instanceKlass()->is_loaded()) failed: must be at least loaded
    • SIGBUS in CodeHeapState::print_names()
    • SIGSEGV in MethodArityHistogram() with -XX:+CountCompiledCalls
    • Soft reference reclamation race in com.sun.xml.internal.stream.util.ThreadLocalBufferAllocator
    • Swing apps are slow if displaying from a remote source to many local displays
    • switch jtreg to 4.2b13
    • Test library OSInfo.getSolarisVersion cannot determine Solaris version
    • TestOptionsWithRanges.java is very slow
    • TestOptionsWithRanges.java of '-XX:TLABSize=2147483648' fails intermittently
    • The Japanese message of FileNotFoundException garbled
    • The 'supported_groups' extension in ServerHellos
    • ThreadInfoCompositeData.toCompositeData fails to map ThreadInfo to CompositeData
    • TimeZone.getDisplayName given Locale.US doesn't always honor the Locale.
    • TLS 1.2 Support algorithm in SunPKCS11 provider
    • TLS 1.3 handshake server name indication is missing on a session resume
    • TLS 1.3 server fails if ClientHello doesn't have pre_shared_key and psk_key_exchange_modes
    • TLS 1.3 interop problems with OpenSSL 1.1.1 when used on the client side with mutual auth
    • tz: Upgrade time-zone data to tzdata2018g
    • Undefined behaviour in ADLC
    • Update avx512 implementation
    • URLStreamHandler initialization race
    • UseCompressedOops requirement check fails fails on 32-bit system
    • windows: Update OS detection code to recognize Windows Server 2019
    • x86: assert on unbound assembler Labels used as branch targets
    • x86: jck tests for ldc2_w bytecode fail
    • x86: sharedRuntimeTrig/sharedRuntimeTrans compiled without optimization
    • '-XX:OnOutOfMemoryError' uses fork instead of vfork


    Advisory IDSUSE-SU-2019:247-1
    ReleasedWed Feb 6 07:18:45 2019
    SummarySecurity update for lua53
    Typesecurity
    Severitymoderate
    References1123043,CVE-2019-6706
    Description:

    This update for lua53 fixes the following issues:
    Security issue fixed:

    • CVE-2019-6706: Fixed a use-after-free bug in the lua_upvaluejoin function of lapi.c (bsc#1123043)


    Advisory IDSUSE-SU-2019:571-1
    ReleasedThu Mar 7 18:13:46 2019
    SummarySecurity update for file
    Typesecurity
    Severitymoderate
    References1096974,1096984,1126117,1126118,1126119,CVE-2018-10360,CVE-2019-8905,CVE-2019-8906,CVE-2019-8907
    Description:

    This update for file fixes the following issues:
    The following security vulnerabilities were addressed:

    • CVE-2018-10360: Fixed an out-of-bounds read in the function do_core_note in readelf.c, which allowed remote attackers to cause a denial of service (application crash) via a crafted ELF file (bsc#1096974)
    • CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c (bsc#1126118)
    • CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c (bsc#1126119)
    • CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c (bsc#1126117)


    Advisory IDSUSE-SU-2019:788-1
    ReleasedThu Mar 28 11:55:06 2019
    SummarySecurity update for sqlite3
    Typesecurity
    Severitymoderate
    References1119687,CVE-2018-20346
    Description:

    This update for sqlite3 to version 3.27.2 fixes the following issue:
    Security issue fixed:

    • CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).

    Release notes: https://www.sqlite.org/releaselog/3_27_2.html


    Advisory IDSUSE-RU-2019:790-1
    ReleasedThu Mar 28 12:06:17 2019
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1130557
    Description:

    This update for timezone fixes the following issues:
    timezone was updated 2019a:

    • Palestine 'springs forward' on 2019-03-30 instead of 2019-03-23
    • Metlakatla 'fell back' to rejoin Alaska Time on 2019-01-20 at 02:00
    • Israel observed DST in 1980 (08-02/09-13) and 1984 (05-05/08-25)
    • zic now has an -r option to limit the time range of output data


    Advisory IDSUSE-SU-2019:926-1
    ReleasedWed Apr 10 16:33:12 2019
    SummarySecurity update for tar
    Typesecurity
    Severitymoderate
    References1120610,1130496,CVE-2018-20482,CVE-2019-9923
    Description:

    This update for tar fixes the following issues:
    Security issues fixed:

    • CVE-2019-9923: Fixed a denial of service while parsing certain archives with malformed extended headers in pax_decode_header() (bsc#1130496).
    • CVE-2018-20482: Fixed a denial of service when the '--sparse' option mishandles file shrinkage during read access (bsc#1120610).


    Advisory IDSUSE-SU-2019:1040-1
    ReleasedThu Apr 25 17:09:21 2019
    SummarySecurity update for samba
    Typesecurity
    Severityimportant
    References1114407,1124223,1125410,1126377,1131060,1131686,CVE-2019-3880
    Description:

    This update for samba fixes the following issues:
    Security issue fixed:

    • CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).


    ldb was updated to version 1.2.4 (bsc#1125410 bsc#1131686):
    • Out of bound read in ldb_wildcard_compare
    • Hold at most 10 outstanding paged result cookies
    • Put 'results_store' into a doubly linked list
    • Refuse to build Samba against a newer minor version of ldb


    Non-security issues fixed:
    • Fixed update-apparmor-samba-profile script after apparmor switched to using named profiles (bsc#1126377).
    • Abide to the load_printers parameter in smb.conf (bsc#1124223).
    • Provide the 32bit samba winbind PAM module and its dependend 32bit libraries.


    Advisory IDSUSE-SU-2019:1052-1
    ReleasedFri Apr 26 14:33:42 2019
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1132728,1132732,CVE-2019-2602,CVE-2019-2684
    Description:

    This update for java-11-openjdk to version 11.0.3+7 fixes the following issues:
    Security issues fixed:

    • CVE-2019-2602: Fixed excessive use of CPU time in the BigDecimal implementation (bsc#1132728).
    • CVE-2019-2684: Fixed a flaw in the RMI registry implementation which could lead to selection of an incorrect skeleton class (bsc#1132732).

    Non-security issues fixed:
    • Multiple bug fixes and improvements.


    Advisory IDSUSE-SU-2019:1127-1
    ReleasedThu May 2 09:39:24 2019
    SummarySecurity update for sqlite3
    Typesecurity
    Severitymoderate
    References1130325,1130326,CVE-2019-9936,CVE-2019-9937
    Description:

    This update for sqlite3 to version 3.28.0 fixes the following issues:
    Security issues fixed:

    • CVE-2019-9936: Fixed a heap-based buffer over-read, when running fts5 prefix queries inside transaction (bsc#1130326).
    • CVE-2019-9937: Fixed a denial of service related to interleaving reads and writes in a single transaction with an fts5 virtual table (bsc#1130325).


    Advisory IDSUSE-RU-2019:1152-1
    ReleasedFri May 3 18:06:09 2019
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References1131378
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Require update-ca-certificates by the headless subpackage (bsc#1131378)
    • Removed a font rendering patch with broke related to other font changes.


    Advisory IDSUSE-SU-2019:1368-1
    ReleasedTue May 28 13:15:38 2019
    SummaryRecommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root
    Typesecurity
    Severityimportant
    References1134524,CVE-2019-5021
    Description:

    This update for sles12sp3-docker-image, sles12sp4-image, system-user-root fixes the following issues:

    • CVE-2019-5021: Include an invalidated root password by default, not an empty one (bsc#1134524)


    Advisory IDSUSE-SU-2019:1372-1
    ReleasedTue May 28 16:53:28 2019
    SummarySecurity update for libtasn1
    Typesecurity
    Severitymoderate
    References1105435,CVE-2018-1000654
    Description:

    This update for libtasn1 fixes the following issues:
    Security issue fixed:

    • CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).


    Advisory IDSUSE-SU-2019:1398-1
    ReleasedFri May 31 12:54:22 2019
    SummarySecurity update for libpng16
    Typesecurity
    Severitylow
    References1100687,1121624,1124211,CVE-2018-13785,CVE-2019-7317
    Description:

    This update for libpng16 fixes the following issues:
    Security issues fixed:

    • CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when png_image_free() was called under png_safe_execute (bsc#1124211).
    • CVE-2018-13785: Fixed a wrong calculation of row_factor in the png_check_chunk_length function in pngrutil.c, which could haved triggered and integer overflow and result in an divide-by-zero while processing a crafted PNG file, leading to a denial of service (bsc#1100687)


    Advisory IDSUSE-RU-2019:1631-1
    ReleasedFri Jun 21 11:17:21 2019
    SummaryRecommended update for xz
    Typerecommended
    Severitylow
    References1135709
    Description:

    This update for xz fixes the following issues:
    Add SUSE-Public-Domain licence as some parts of xz utils (liblzma, xz, xzdec, lzmadec, documentation, translated messages, tests, debug, extra directory) are in public domain licence [bsc#1135709]


    Advisory IDSUSE-RU-2019:1807-1
    ReleasedWed Jul 10 13:13:21 2019
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References1137264
    Description:


    This update ships the OpenJDK LTS version 11 in the java-11-openjdk packages. (FATE#326347 bsc#1137264)


    Advisory IDSUSE-RU-2019:1815-1
    ReleasedThu Jul 11 07:47:55 2019
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1140016
    Description:

    This update for timezone fixes the following issues:

    • Timezone update 2019b. (bsc#1140016): - Brazil no longer observes DST. - 'zic -b slim' outputs smaller TZif files. - Palestine's 2019 spring-forward transition was on 03-29, not 03-30. - Add info about the Crimea situation.


    Advisory IDSUSE-SU-2019:2002-1
    ReleasedMon Jul 29 13:00:27 2019
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1115375,1140461,1141780,1141781,1141782,1141783,1141784,1141785,1141787,1141788,1141789,CVE-2019-2745,CVE-2019-2762,CVE-2019-2766,CVE-2019-2769,CVE-2019-2786,CVE-2019-2816,CVE-2019-2818,CVE-2019-2821,CVE-2019-7317
    Description:

    This update for java-11-openjdk to version jdk-11.0.4+11 fixes the following issues:
    Security issues fixed:

    • CVE-2019-2745: Improved ECC Implementation (bsc#1141784).
    • CVE-2019-2762: Exceptional throw cases (bsc#1141782).
    • CVE-2019-2766: Improve file protocol handling (bsc#1141789).
    • CVE-2019-2769: Better copies of CopiesList (bsc#1141783).
    • CVE-2019-2786: More limited privilege usage (bsc#1141787).
    • CVE-2019-7317: Improve PNG support options (bsc#1141780).
    • CVE-2019-2818: Better Poly1305 support (bsc#1141788).
    • CVE-2019-2816: Normalize normalization (bsc#1141785).
    • CVE-2019-2821: Improve TLS negotiation (bsc#1141781).
    • Certificate validation improvements

    Non-security issues fixed:
    • Do not fail installation when the manpages are not present (bsc#1115375)
    • Backport upstream fix for JDK-8208602: Cannot read PEM X.509 cert if there is whitespace after the header or footer (bsc#1140461)


    Advisory IDSUSE-RU-2019:2142-1
    ReleasedWed Aug 14 18:14:04 2019
    SummaryRecommended update for mozilla-nspr, mozilla-nss
    Typerecommended
    Severitymoderate
    References1141322
    Description:


    This update for mozilla-nspr, mozilla-nss fixes the following issues:
    mozilla-nss was updated to NSS 3.45 (bsc#1141322) :

    • New function in pk11pub.h: PK11_FindRawCertsWithSubject
    • The following CA certificates were Removed: CN = Certinomis - Root CA (bmo#1552374)
    • Implement Delegated Credentials (draft-ietf-tls-subcerts) (bmo#1540403) This adds a new experimental function SSL_DelegateCredential Note: In 3.45, selfserv does not yet support delegated credentials (See bmo#1548360). Note: In 3.45 the SSLChannelInfo is left unmodified, while an upcoming change in 3.46 will set SSLChannelInfo.authKeyBits to that of the delegated credential for better policy enforcement (See bmo#1563078).
    • Replace ARM32 Curve25519 implementation with one from fiat-crypto (bmo#1550579)
    • Expose a function PK11_FindRawCertsWithSubject for finding certificates with a given subject on a given slot (bmo#1552262)
    • Add IPSEC IKE support to softoken (bmo#1546229)
    • Add support for the Elbrus lcc compiler (<=1.23) (bmo#1554616)
    • Expose an external clock for SSL (bmo#1543874) This adds new experimental functions: SSL_SetTimeFunc, SSL_CreateAntiReplayContext, SSL_SetAntiReplayContext, and SSL_ReleaseAntiReplayContext. The experimental function SSL_InitAntiReplay is removed.
    • Various changes in response to the ongoing FIPS review (bmo#1546477) Note: The source package size has increased substantially due to the new FIPS test vectors. This will likely prompt follow-on work, but please accept our apologies in the meantime.

    mozilla-nspr was updated to version 4.21
    • Changed prbit.h to use builtin function on aarch64.
    • Removed Gonk/B2G references.


    Advisory IDSUSE-SU-2019:2533-1
    ReleasedThu Oct 3 15:02:50 2019
    SummarySecurity update for sqlite3
    Typesecurity
    Severitymoderate
    References1150137,CVE-2019-16168
    Description:

    This update for sqlite3 fixes the following issues:
    Security issue fixed:

    • CVE-2019-16168: Fixed improper validation of sqlite_stat1 field that could lead to denial of service (bsc#1150137).


    Advisory IDSUSE-RU-2019:2762-1
    ReleasedThu Oct 24 07:08:44 2019
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1150451
    Description:

    This update for timezone fixes the following issues:

    • Fiji observes DST from 2019-11-10 to 2020-01-12.
    • Norfolk Island starts observing Australian-style DST.


    Advisory IDSUSE-SU-2019:2997-1
    ReleasedMon Nov 18 15:16:38 2019
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1103320,1154036,1154037,CVE-2019-17594,CVE-2019-17595
    Description:

    This update for ncurses fixes the following issues:
    Security issues fixed:

    • CVE-2019-17594: Fixed a heap-based buffer over-read in the _nc_find_entry function (bsc#1154036).
    • CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037).

    Non-security issue fixed:
    • Removed screen.xterm from terminfo database (bsc#1103320).


    Advisory IDSUSE-SU-2019:2998-1
    ReleasedMon Nov 18 15:17:23 2019
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1152856,1154212,CVE-2019-2894,CVE-2019-2933,CVE-2019-2945,CVE-2019-2949,CVE-2019-2958,CVE-2019-2962,CVE-2019-2964,CVE-2019-2973,CVE-2019-2975,CVE-2019-2977,CVE-2019-2978,CVE-2019-2981,CVE-2019-2983,CVE-2019-2987,CVE-2019-2988,CVE-2019-2989,CVE-2019-2992,CVE-2019-2999
    Description:

    This update for java-11-openjdk to version jdk-11.0.5-10 fixes the following issues:
    Security issues fixed (October 2019 CPU bsc#1154212):

    • CVE-2019-2933: Windows file handling redux
    • CVE-2019-2945: Better socket support
    • CVE-2019-2949: Better Kerberos ccache handling
    • CVE-2019-2958: Build Better Processes
    • CVE-2019-2964: Better support for patterns
    • CVE-2019-2962: Better Glyph Images
    • CVE-2019-2973: Better pattern compilation
    • CVE-2019-2975: Unexpected exception in jjs
    • CVE-2019-2978: Improved handling of jar files
    • CVE-2019-2977: Improve String index handling
    • CVE-2019-2981: Better Path supports
    • CVE-2019-2983: Better serial attributes
    • CVE-2019-2987: Better rendering of native glyphs
    • CVE-2019-2988: Better Graphics2D drawing
    • CVE-2019-2989: Improve TLS connection support
    • CVE-2019-2992: Enhance font glyph mapping
    • CVE-2019-2999: Commentary on Javadoc comments
    • CVE-2019-2894: Enhance ECDSA operations (bsc#1152856).


    Advisory IDSUSE-SU-2019:3061-1
    ReleasedMon Nov 25 17:34:22 2019
    SummarySecurity update for gcc9
    Typesecurity
    Severitymoderate
    References1114592,1135254,1141897,1142649,1142654,1148517,1149145,CVE-2019-14250,CVE-2019-15847,SLE-6533,SLE-6536
    Description:



    This update includes the GNU Compiler Collection 9.
    A full changelog is provided by the GCC team on:
    https://www.gnu.org/software/gcc/gcc-9/changes.html

    The base system compiler libraries libgcc_s1, libstdc++6 and others are now built by the gcc 9 packages.
    To use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 / CXX=g++-9 during configuration for using it.

    Security issues fixed:

    • CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
    • CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)

    Non-security issues fixed:
    • Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
    • Fixed miscompilation for vector shift on s390. (bsc#1141897)


    Advisory IDSUSE-SU-2019:3086-1
    ReleasedThu Nov 28 10:02:24 2019
    SummarySecurity update for libidn2
    Typesecurity
    Severitymoderate
    References1154884,1154887,CVE-2019-12290,CVE-2019-18224
    Description:

    This update for libidn2 to version 2.2.0 fixes the following issues:

    • CVE-2019-12290: Fixed an improper round-trip check when converting A-labels to U-labels (bsc#1154884).
    • CVE-2019-18224: Fixed a heap-based buffer overflow that was caused by long domain strings (bsc#1154887).


    Advisory IDSUSE-SU-2019:3395-1
    ReleasedMon Dec 30 14:05:06 2019
    SummarySecurity update for mozilla-nspr, mozilla-nss
    Typesecurity
    Severitymoderate
    References1141322,1158527,1159819,CVE-2018-18508,CVE-2019-11745,CVE-2019-17006
    Description:

    This update for mozilla-nspr, mozilla-nss fixes the following issues:
    mozilla-nss was updated to NSS 3.47.1:
    Security issues fixed:

    • CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
    • CVE-2019-11745: EncryptUpdate should use maxout, not block size (bsc#1158527).
    • CVE-2019-11727: Fixed vulnerability sign CertificateVerify with PKCS#1 v1.5 signatures issue (bsc#1141322).

    mozilla-nspr was updated to version 4.23:
    • Whitespace in C files was cleaned up and no longer uses tab characters for indenting.


    Advisory IDSUSE-SU-2020:213-1
    ReleasedWed Jan 22 15:38:15 2020
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1160968,CVE-2020-2583,CVE-2020-2590,CVE-2020-2593,CVE-2020-2601,CVE-2020-2604,CVE-2020-2654,CVE-2020-2655
    Description:

    This update for java-11-openjdk fixes the following issues:
    Update to version jdk-11.0.6-10 (January 2020 CPU, bsc#1160968)
    Fixing these security related issues:

    • CVE-2020-2583: Unlink Set of LinkedHashSets
    • CVE-2020-2590: Improve Kerberos interop capabilities
    • CVE-2020-2593: Normalize normalization for all
    • CVE-2020-2601: Better Ticket Granting Services
    • CVE-2020-2604: Better serial filter handling
    • CVE-2020-2655: Better TLS messaging support
    • CVE-2020-2654: Improve Object Identifier Processing


    Advisory IDSUSE-RU-2020:362-1
    ReleasedFri Feb 7 11:14:20 2020
    SummaryRecommended update for libXi
    Typerecommended
    Severitymoderate
    References1153311
    Description:


    This update for libXi fixes the following issue:

    • The libXi6-32bit library on x86_64 are now shipped in the Basesystem module. (bsc#1153311)


    Advisory IDSUSE-RU-2020:525-1
    ReleasedFri Feb 28 11:49:36 2020
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1164562
    Description:

    This update for pam fixes the following issues:

    • Add libdb as build-time dependency to enable pam_userdb module. Enable pam_userdb.so (jsc#sle-7258, bsc#1164562)


    Advisory IDSUSE-RU-2020:689-1
    ReleasedFri Mar 13 17:09:01 2020
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1166510
    Description:


    This update for PAM fixes the following issue:

    • The license of libdb linked against pam_userdb is not always wanted, so we temporary disabled pam_userdb again. It will be published in a different package at a later time. (bsc#1166510)


    Advisory IDSUSE-RU-2020:917-1
    ReleasedFri Apr 3 15:02:25 2020
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1166510
    Description:

    This update for pam fixes the following issues:

    • Moved pam_userdb into a separate package pam-extra. (bsc#1166510)


    Advisory IDSUSE-SU-2020:948-1
    ReleasedWed Apr 8 07:44:21 2020
    SummarySecurity update for gmp, gnutls, libnettle
    Typesecurity
    Severitymoderate
    References1152692,1155327,1166881,1168345,CVE-2020-11501
    Description:

    This update for gmp, gnutls, libnettle fixes the following issues:
    Security issue fixed:

    • CVE-2020-11501: Fixed zero random value in DTLS client hello (bsc#1168345)

    FIPS related bugfixes:
    • FIPS: Install checksums for binary integrity verification which are required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)
    • FIPS: Fixed a cfb8 decryption issue, no longer truncate output IV if input is shorter than block size. (bsc#1166881)
    • FIPS: Added Diffie Hellman public key verification test. (bsc#1155327)


    Advisory IDSUSE-RU-2020:1226-1
    ReleasedFri May 8 10:51:05 2020
    SummaryRecommended update for gcc9
    Typerecommended
    Severitymoderate
    References1149995,1152590,1167898
    Description:

    This update for gcc9 fixes the following issues:
    This update ships the GCC 9.3 release.

    • Includes a fix for Internal compiler error when building HepMC (bsc#1167898)
    • Includes fix for binutils version parsing
    • Add libstdc++6-pp provides and conflicts to avoid file conflicts with same minor version of libstdc++6-pp from gcc10.
    • Add gcc9 autodetect -g at lto link (bsc#1149995)
    • Install go tool buildid for bootstrapping go


    Advisory IDSUSE-SU-2020:1294-1
    ReleasedMon May 18 07:38:36 2020
    SummarySecurity update for file
    Typesecurity
    Severitymoderate
    References1154661,1169512,CVE-2019-18218
    Description:

    This update for file fixes the following issues:
    Security issues fixed:

    • CVE-2019-18218: Fixed a heap-based buffer overflow in cdf_read_property_info() (bsc#1154661).

    Non-security issue fixed:
    • Fixed broken '--help' output (bsc#1169512).


    Advisory IDSUSE-RU-2020:1303-1
    ReleasedMon May 18 09:40:36 2020
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1169582
    Description:

    This update for timezone fixes the following issues:

    • timezone update 2020a. (bsc#1169582) * Morocco springs forward on 2020-05-31, not 2020-05-24. * Canada's Yukon advanced to -07 year-round on 2020-03-08. * America/Nuuk renamed from America/Godthab. * zic now supports expiration dates for leap second lists.


    Advisory IDSUSE-RU-2020:1328-1
    ReleasedMon May 18 17:16:04 2020
    SummaryRecommended update for grep
    Typerecommended
    Severitymoderate
    References1155271
    Description:

    This update for grep fixes the following issues:

    • Update testsuite expectations, no functional changes (bsc#1155271)


    Advisory IDSUSE-SU-2020:1353-1
    ReleasedWed May 20 13:02:32 2020
    SummarySecurity update for freetype2
    Typesecurity
    Severitymoderate
    References1079603,1091109,CVE-2018-6942
    Description:

    This update for freetype2 to version 2.10.1 fixes the following issues:
    Security issue fixed:

    • CVE-2018-6942: Fixed a NULL pointer dereference within ttinerp.c (bsc#1079603).

    Non-security issues fixed:
    • Update to version 2.10.1 * The bytecode hinting of OpenType variation fonts was flawed, since the data in the `CVAR' table wasn't correctly applied. * Auto-hinter support for Mongolian. * The handling of the default character in PCF fonts as introduced in version 2.10.0 was partially broken, causing premature abortion of charmap iteration for many fonts. * If `FT_Set_Named_Instance' was called with the same arguments twice in a row, the function returned an incorrect error code the second time. * Direct rendering using FT_RASTER_FLAG_DIRECT crashed (bug introduced in version 2.10.0). * Increased precision while computing OpenType font variation instances. * The flattening algorithm of cubic Bezier curves was slightly changed to make it faster. This can cause very subtle rendering changes, which aren't noticeable by the eye, however. * The auto-hinter now disables hinting if there are blue zones defined for a `style' (i.e., a certain combination of a script and its related typographic features) but the font doesn't contain any characters needed to set up at least one blue zone.
    • Add tarball signatures and freetype2.keyring

    • Update to version 2.10.0 * A bunch of new functions has been added to access and process COLR/CPAL data of OpenType fonts with color-layered glyphs. * As a GSoC 2018 project, Nikhil Ramakrishnan completely overhauled and modernized the API reference. * The logic for computing the global ascender, descender, and height of OpenType fonts has been slightly adjusted for consistency. * `TT_Set_MM_Blend' could fail if called repeatedly with the same arguments. * The precision of handling deltas in Variation Fonts has been increased.The problem did only show up with multidimensional designspaces. * New function `FT_Library_SetLcdGeometry' to set up the geometry of LCD subpixels. * FreeType now uses the `defaultChar' property of PCF fonts to set the glyph for the undefined character at glyph index 0 (as FreeType already does for all other supported font formats). As a consequence, the order of glyphs of a PCF font if accessed with FreeType can be different now compared to previous versions. This change doesn't affect PCF font access with cmaps. * `FT_Select_Charmap' has been changed to allow parameter value `FT_ENCODING_NONE', which is valid for BDF, PCF, and Windows FNT formats to access built-in cmaps that don't have a predefined `FT_Encoding' value. * A previously reserved field in the `FT_GlyphSlotRec' structure now holds the glyph index. * The usual round of fuzzer bug fixes to better reject malformed fonts. * `FT_Outline_New_Internal' and `FT_Outline_Done_Internal' have been removed.These two functions were public by oversight only and were never documented. * A new function `FT_Error_String' returns descriptions of error codes if configuration macro FT_CONFIG_OPTION_ERROR_STRINGS is defined. * `FT_Set_MM_WeightVector' and `FT_Get_MM_WeightVector' are new functions limited to Adobe MultiMaster fonts to directly set and get the weight vector.

    • Enable subpixel rendering with infinality config:

    • Re-enable freetype-config, there is just too many fallouts.

    • Update to version 2.9.1 * Type 1 fonts containing flex features were not rendered correctly (bug introduced in version 2.9). * CVE-2018-6942: Older FreeType versions can crash with certain malformed variation fonts. * Bug fix: Multiple calls to `FT_Get_MM_Var' returned garbage. * Emboldening of bitmaps didn't work correctly sometimes, showing various artifacts (bug introduced in version 2.8.1). * The auto-hinter script ranges have been updated for Unicode 11. No support for new scripts have been added, however, with the exception of Georgian Mtavruli.
    • freetype-config is now deprecated by upstream and not enabled by default.

    • Update to version 2.10.1 * The `ftmulti' demo program now supports multiple hidden axes with the same name tag. * `ftview', `ftstring', and `ftgrid' got a `-k' command line option to emulate a sequence of keystrokes at start-up. * `ftview', `ftstring', and `ftgrid' now support screen dumping to a PNG file. * The bytecode debugger, `ttdebug', now supports variation TrueType fonts; a variation font instance can be selected with the new `-d' command line option.
    • Add tarball signatures and freetype2.keyring

    • Update to version 2.10.0 * The `ftdump' demo program has new options `-c' and `-C' to display charmaps in compact and detailed format, respectively. Option `-V' has been removed. * The `ftview', `ftstring', and `ftgrid' demo programs use a new command line option `-d' to specify the program window's width, height, and color depth. * The `ftview' demo program now displays red boxes for zero-width glyphs. * `ftglyph' has limited support to display fonts with color-layered glyphs.This will be improved later on. * `ftgrid' can now display bitmap fonts also. * The `ttdebug' demo program has a new option `-f' to select a member of a TrueType collection (TTC). * Other various improvements to the demo programs.

    • Remove 'Supplements: fonts-config' to avoid accidentally pulling in Qt dependencies on some non-Qt based desktops.(bsc#1091109) fonts-config is fundamental but ft2demos seldom installs by end users. only fonts-config maintainers/debuggers may use ft2demos along to debug some issues.

    • Update to version 2.9.1 * No changelog upstream.


    Advisory IDSUSE-RU-2020:1507-1
    ReleasedFri May 29 17:23:52 2020
    SummaryRecommended update for publicsuffix
    Typerecommended
    Severitymoderate
    References1171819
    Description:

    This update for publicsuffix fixes the following issues:

    • Update from version 20180312 to version 20200506. (bsc#1171819).

    • New in version 20200506: * gTLD autopull: 2020-05-06 (#1030) * Update public_suffix_list.dat (#993) * Add shopware.store domain (#958) * Add clic2000.net to Private Section (#1010) * Add Fabrica apps domain: onfabrica.com (#999) * Add dyndns.dappnode.io (#912) * Added curv.dev to public_suffix_list.dat (#968) * Add panel.gg and daemon.panel.gg (#978) * adding sth.ac.at (#997) * Add netlify.app (#1012) * Added Wiki Link as info resource (#1011) * Add schulserver.de, update IServ GmbH contact information (#996) * Add conn.uk, copro.uk, couk.me and ukco.me domains (#963) * Remove flynnhub.com (#971) * Added graphox.us domain (#960) * Add domains for FASTVPS EESTI OU (#941) * Add platter.dev user app domains (#935) * Add playstation-cloud.com (#1006) * gTLD autopull: 2020-04-02 (#1005) * ACI prefix (#930) * Update public_suffix_list.dat (#923) * Add toolforge.org and wmcloud.org (#970) * gTLD autopull: 2020-03-29 (#1003)

    • New in version 20200326: * aero registry removal * Add Mineduc subregistry for public schools: aprendemas.cl * Update public_suffix_list.dat - Existing Section * gTLD autopull: 2020-03-15 * Add 'urown.cloud' and 'dnsupdate.info' * Remove site.builder.nu * Remove unnecessary trailing whitespace for name.fj * Update .eu IDNs to add Greek and URL for Cyrillic * Update fj entry

    • New in version 20200201: * gTLD autopull: 2020-02-01 (#952) * gTLD autopull: 2020-01-31 (#951) * Add WoltLab Cloud domains (#947) * Add qbuser.com domain (#943) * Added senseering domain (#946) * Add u.channelsdvr.net to PSL (#950) * Add discourse.team (#949) * gTLD autopull: 2020-01-06 (#942) * gTLD autopull: 2019-12-25 (#939) * Urgent removal of eq.edu.au (#924) * gTLD autopull: 2019-12-20 (#938) * gTLD autopull: 2019-12-11 (#932) * Added adobeaemcloud domains (#931) * Add Observable domain: observableusercontent.com. (#914) * Correct v.ua sorting * add v.ua (#919) * Add en-root.fr domain (#910) * add Datawire private domain (#925) * Add amsw.nl private domain to PSL (#929) * Add *.on-k3s.io (#922) * Add *.r.appspot.com to public suffix list (#920) * Added gentapps.com (#916) * Add oya.to (#908) * Add Group 53, LLC Domains (#900) * Add perspecta.cloud (#898) * Add 0e.vc to PSL (#896) * Add skygearapp.com (#892) * Update Hostbip Section (#871) * Add qcx.io and *.sys.qcx.io (#868) * Add builtwithdark.com to the public suffix list (#857) * Add_customer-oci.com (#811) * Move out old .ru reserved domains * gTLD autopull: 2019-12-02 (#928) * gTLD autopull: 2019-11-20 (#926)

    • New in version 20191115: * Add gov.scot for Scottish Government * update gTLD list to 2019-11-15 state * remove go-vip.co, go-vip.net, wpcomstaging.com

    • New in version 20191025: * gTLD list updated to 2019-10-24 state * Update .so suffix list * Add the new TLD .ss * Add xn--mgbah1a3hjkrd (موريتانيا) * Add lolipop.io * Add altervista.org * Remove zone.id from list * Add new domain to Synology dynamic dns service

    • New in version 20190808: * tools: update newgtlds.go to filter removed gTLDs (#860) * gTLD autopull: 2019-08-08 (#862) * Remove non-public nuernberg.museum nuremberg.museum domains (#859) * gTLD autopull: 2019-08-02 (#858) * Update public_suffix_list.dat (#825) * Update reference as per #855 * add nic.za * Update contact for SymfonyCloud (#854) * Add lelux.site (#849) * Add *.webhare.dev (#847) * Update Hostbip Section (#846) * Add Yandex Cloud domains (#850) * Add ASEINet domains (#844) * Update nymnom section (#771) * Add Handshake zones (#796) * Add iserv.dev for IServ GmbH (#826) * Add trycloudflare.com to Cloudflare's domains (#835) * Add shopitsite.com (#838) * Add pubtls.org (#839) * Add qualifio.com domains (#840) * Update newgtlds tooling & associated gTLD data. (#834) * Add web.app for Google (#830) * Add iobb.net (#828) * Add cloudera.site (#829)

    • New in version 20190529: * Add Balena domains (#814) * Add KingHost domains (#827) * Add dyn53.io (#820) * Add azimuth.network and arvo.network (#812) * Update .rw domains per ccTLD (#821) * Add b-data.io (#759) * Add co.bn (#789) * Add Zitcom domains (#817) * Add Carrd suffixes (#816) * Add Linode Suffixes (#810) * Add lab.ms (#807) * Add wafflecell.com (#805) * Add häkkinen.fi (#804) * Add prvcy.page (#803) * Add SRCF user domains: soc.srcf.net, user.srcf.net (#802) * Add KaasHosting (#801) * Adding cloud66.zone (#797) * Add gehirn.ne.jp and usercontent.jp for Gehirn Inc. (#795) * Add Clerk user domains (#791) * Add loginline (.app, .dev, .io, .services, .site) (#790) * Add wnext.app (#785) * Add Hostbip Registry Domains (#770) * Add glitch.me (#769) * added thingdustdata.com (#767) * Add dweb.link (#766) * Add onred.one (#764) * Add mo-siemens.io (#762) * Add Render domains (#761) * Add *.moonscale.io (#757) * Add Stackhero domain (#755) * Add voorloper.cloud (#750) * Add repl.co and repl.run (#748) * Add edugit.org (#736) * Add Hakaran domains (#733) * Add barsy.ca (#732) * Add Names.of.London Domains (#543) * Add nctu.me (#746) * Br 201904 update (#809) * Delete DOHA * Add app.banzaicloud.io (#730) * Update .TR (#741) * Add Nabu Casa (#781) * Added uk0.bigv.io under Bytemark Hosting (#745) * Add GOV.UK PaaS client domains (#765) * Add discourse.group for Civilized Discourse Construction Kit, Inc. (#768) * Add on-rancher.cloud and on-rio.io (#779) * Syncloud dynamic dns service (#727) * Add git-pages.rit.edu (#690) * Add workers.dev (#772) * Update .AM (#756) * Add go-vip.net. (#793) * Add site.builder.nu (#723) * Update .FR sectorial domains (#527) * Remove ACTIVE * Remove SPIEGEL * Remove EPOST * Remove ZIPPO * Remove BLANCO

    • New in version 20190205: * Add domains of Individual Network Berlin e.V. (#711) * Added bss.design to PSL (#685) * Add fastly-terrarium.com (#729) * Add Swisscom Application Cloud domains (#698) * Update public_suffix_list.dat with api.stdlib.com (#751) * Add regional domain for filegear.me (#713) * Remove bv.nl (#758) * Update public_suffix_list.dat

    • Link public_suffix_list.dat to effective_tld_names.dat for the purpose of httpcomponents-client

    • Do not pull in full python3, psl-make-dafsa already pulls in what it needs to generate the things

    • New in version 20181227: * Add run.app and a.run.app to the psl (#681) * Add telebit.io .app .xyz (#726) * Add Leadpages domains (#731) * Add public suffix entries for dapps.earth (#708) * Add Bytemark Hosting domains (#620) * Remove .STATOIL * linter: Expect rules to be in NFKC (#725) * Convert list data from NFKD to NFKC (#720) * Update LS (#718)

    • New in version 20181030: * Add readthedocs.io (#722) * Remove trailing whitespace from L11948 (#721) * Add krasnik.pl, leczna.pl, lubartow.pl, lublin.pl, poniatowa.pl and swidnik.pl domains to the Public Suffix List (#670) * Add instantcloud.cn by Redstar Consultants (#696) * Add Fermax and mydobiss.com domain (#706) * Add shop.th & online.th (#716) * Add siteleaf.net (#655) * Add wpcomstaging.com and go-vip.co to the PSL (#719)

    • Update to version 20181003: * Remove deleted TLDs (#710) * Added apigee.io (#712) * Add AWS ElasticBeanstalk Ningxia, CN region (#597) * Add Github PULL REQUEST TEMPLATE (#699) * Add ong.br 2nd level domain (#707)

    • Update to version 20180813: * Update .ID list (#703) * Updated .bn ccTLD. Removed wildcard. (#702) * Remove stackspace.space from PSL (#691) * Remove XPERIA (#697)

    • Update to version 20180719: * Remove .IWC * Update Kuwait's ccTLD (.kw) * Use https for www.transip.nl * Remove MEO and SAPO

    • New in version 20180523: * Remove 1password domains (#632) * Add cleverapps.io (Clever Cloud) (#634) * Remove .BOOTS * Add azurecontainer.io to Microsoft domains (#637) * Change the patchnewgtlds tool for the updated .zw domain * Add new gTLDs up to 2018-04-17 and new ccTLDs up to 2018-04-17 * cloud.muni.cz cloud subdomains (#622) * Add YunoHost DynDns domains: nohost.me & noho.st (#615) * Use a custom token for the newGTLD list (#645) * lug.org.uk (#514) * Adding xnbay.com,u2.xnbay.com,u2-local.xnbay.com to public_suffix_list.dat. (#506) * Adding customer.speedpartner.de (#585) * Adding ravendb.net subdomains (#535) * Adding own.pm (#544) * pcloud.host (#531) * Add additional Lukanet Ltd domains (#652) * Add zone.id (#575) * Add half.host (#571) * Update 香港 TLD (#568) * Add Now-DNS domains (#560) * Added blackbaudcdn.net private domain to PSL (#558) * Adding IServ GmbH domains (#552) * Add FASTVPS EESTI OU domains (#541) * nic.it - update regions and provinces (#524) * Update Futureweb OG Private Domains (#520) * add United Gameserver virtualuser domains (#600) * Add Lightmaker Property Manager, Inc domains (#604) * Update Uberspace domains (#616) * Add Datto, Inc domains * Add memset hosting domains (#625) * Add utwente.io (#626) * Add bci.dnstrace.pro (#630) * Add May First domains (#635) * Add Linki Tools domains (#636) * Update NymNom domains * Add Co & Co domains (#650) * Add new gTLDs up to 2018-05-08 (#653) * Correct linter issues (#654) * Add cnpy.gdn as private domain (#633) * Add freedesktop.org (#619) * Add Omnibond Systems (#656) * Add hasura.app to the list (#668) * Update gu ccTLD suffixes (#669)

    • New in version 20180328: * Add gwiddle.co.uk (#521) * Add ox.rs (#522) * Add myjino.ru (#512) * Add ras.ru domains (#511) * Add AWS ElasticBeanstalk Osaka, JP region (#628) * Remove trailing whitespace (#621)


    Advisory IDSUSE-SU-2020:1511-1
    ReleasedFri May 29 18:03:39 2020
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1167462,1169511,CVE-2020-2754,CVE-2020-2755,CVE-2020-2756,CVE-2020-2757,CVE-2020-2767,CVE-2020-2773,CVE-2020-2778,CVE-2020-2781,CVE-2020-2800,CVE-2020-2803,CVE-2020-2805,CVE-2020-2816,CVE-2020-2830
    Description:

    This update for java-11-openjdk fixes the following issues:
    Java was updated to jdk-11.0.7+10 (April 2020 CPU, bsc#1169511).
    Security issues fixed:

    • CVE-2020-2754: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
    • CVE-2020-2755: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
    • CVE-2020-2756: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
    • CVE-2020-2757: Fixed an object deserialization issue that could have resulted in denial of service via crafted serialized input (bsc#1169511).
    • CVE-2020-2767: Fixed an incorrect handling of certificate messages during TLS handshakes (bsc#1169511).
    • CVE-2020-2773: Fixed the incorrect handling of exceptions thrown by unmarshalKeyInfo() and unmarshalXMLSignature() (bsc#1169511).
    • CVE-2020-2778: Fixed the incorrect handling of SSLParameters in setAlgorithmConstraints(), which could have been abused to override the defined systems security policy and lead to the use of weak crypto algorithms (bsc#1169511).
    • CVE-2020-2781: Fixed the incorrect re-use of single null TLS sessions (bsc#1169511).
    • CVE-2020-2800: Fixed an HTTP header injection issue caused by mishandling of CR/LF in header values (bsc#1169511).
    • CVE-2020-2803: Fixed a boundary check and type check issue that could have led to a sandbox bypass (bsc#1169511).
    • CVE-2020-2805: Fixed a boundary check and type check issue that could have led to a sandbox bypass (bsc#1169511).
    • CVE-2020-2816: Fixed an incorrect handling of application data packets during TLS handshakes (bsc#1169511).
    • CVE-2020-2830: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).


    Advisory IDSUSE-RU-2020:1542-1
    ReleasedThu Jun 4 13:24:37 2020
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1172055
    Description:

    This update for timezone fixes the following issue:

    • zdump --version reported 'unknown' (bsc#1172055)


    Advisory IDSUSE-SU-2020:1677-1
    ReleasedThu Jun 18 18:16:39 2020
    SummarySecurity update for mozilla-nspr, mozilla-nss
    Typesecurity
    Severityimportant
    References1159819,1169746,1171978,CVE-2019-17006,CVE-2020-12399
    Description:

    This update for mozilla-nspr, mozilla-nss fixes the following issues:
    mozilla-nss was updated to version 3.53

    • CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
    • CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
    Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes
    mozilla-nspr to version 4.25


    Advisory IDSUSE-RU-2020:1852-1
    ReleasedMon Jul 6 16:50:23 2020
    SummaryRecommended update for fontforge, ghostscript-fonts, ttf-converter, xorg-x11-fonts
    Typerecommended
    Severitymoderate
    References1169444
    Description:

    This update for fontforge, ghostscript-fonts, ttf-converter, xorg-x11-fonts fixes the following issues:
    Changes in fontforge:

    • Support transforming bitmap glyphs from python. (bsc#1169444)
    • Allow python-Sphinx >= 3

    Changes in ttf-converter:
    • Update from version 1.0 to version 1.0.6: * ftdump is now shipped additionally as new dependency for ttf-converter * Standardize output when converting vector and bitmap fonts * Add more subfamilies fixes (bsc#1169444) * Add --family and --subfamily arguments to force values on those fields * Add parameters to fix glyph unicode values --fix-glyph-unicode : Try to fix unicode points and glyph names based on glyph names containing hexadecimal codes (like '$0C00', 'char12345' or 'uni004F') --replace-unicode-values: When passed 2 comma separated numbers a,b the glyph with an unicode value of a is replaced with the unicode value b. Can be used more than once.

    --shift-unicode-values: When passed 3 comma separated numbers a,b,c this shifts the unicode values of glyphs between a and b (both included) by adding c. Can be used more than once. * Add --bitmapTransform parameter to transform bitmap glyphs. (bsc#1169444) When used, all glyphs are modified with the transformation function and values passed as parameters. The parameter has three values separated by commas: fliph|flipv|rotate90cw|rotate90ccw|rotate180|skew|transmove,xoff,yoff * Add support to convert bitmap fonts (bsc#1169444) * Rename MediumItalic subfamily to Medium Italic * Show some more information when removing duplicated glyphs * Add a --force-monospaced argument instead of hardcoding font names * Convert `BoldCond` subfamily to `Bold Condensed` * Fixes for Monospaced fonts and force the Nimbus Mono L font to be Monospaced. (bsc#1169444 #c41) * Add a --version argument * Fix subfamily names so the converted font's subfamily match the original ones. (bsc#1169444 #c41)
    Changes in xorg-x11-fonts:
    • Use ttf-converter 1.0.6 to build an Italic version of cu12.pcf.gz in the converted subpackage
    • Include the subfamily in the filename of converted fonts
    • Use ttf-converter's new bitmap font support to convert Schumacher Clean and Schumacher Clean Wide (bsc#1169444 #c41)
    • Replace some unicode values in cu-pua12.pcf.gz to fix them
    • Shift some unicode values in arabic24.pcf.gz and cuarabic12.pcf.gz so glyphs don't pretend to be latin characters when they're not.
    • Don't distribute converted fonts with wrong unicode values in their glyphs. (bsc#1169444) Bitstream-Charter-*.otb, Cursor.ttf,Sun-OPEN-LOOK-*.otb, MUTT-ClearlyU-Devangari-Extra-Regular, MUTT-ClearlyU-Ligature-Wide-Regular, and MUTT-ClearlyU-Devanagari-Regular

    Changes in ghostscript-fonts:
    • Force the converted Nimbus Mono font to be monospaced. (bsc#1169444 #c41) Use the --force-monospaced argument of ttf-converter 1.0.3


    Advisory IDSUSE-RU-2020:1954-1
    ReleasedSat Jul 18 03:07:15 2020
    SummaryRecommended update for cracklib
    Typerecommended
    Severitymoderate
    References1172396
    Description:

    This update for cracklib fixes the following issues:

    • Fixed a buffer overflow when processing long words.


    Advisory IDSUSE-RU-2020:2083-1
    ReleasedThu Jul 30 10:27:59 2020
    SummaryRecommended update for diffutils
    Typerecommended
    Severitymoderate
    References1156913
    Description:

    This update for diffutils fixes the following issue:

    • Disable a sporadically failing test for ppc64 and ppc64le builds. (bsc#1156913)


    Advisory IDSUSE-SU-2020:2116-1
    ReleasedTue Aug 4 15:12:41 2020
    SummarySecurity update for libX11
    Typesecurity
    Severityimportant
    References1174628,CVE-2020-14344
    Description:

    This update for libX11 fixes the following issues:

    • Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)


    Advisory IDSUSE-SU-2020:2143-1
    ReleasedThu Aug 6 11:06:49 2020
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1174157,CVE-2020-14556,CVE-2020-14562,CVE-2020-14573,CVE-2020-14577,CVE-2020-14581,CVE-2020-14583,CVE-2020-14593,CVE-2020-14621
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157) * Security fixes: + JDK-8230613: Better ASCII conversions + JDK-8231800: Better listing of arrays + JDK-8232014: Expand DTD support + JDK-8233234: Better Zip Naming + JDK-8233239, CVE-2020-14562: Enhance TIFF support + JDK-8233255: Better Swing Buttons + JDK-8234032: Improve basic calendar services + JDK-8234042: Better factory production of certificates + JDK-8234418: Better parsing with CertificateFactory + JDK-8234836: Improve serialization handling + JDK-8236191: Enhance OID processing + JDK-8236867, CVE-2020-14573: Enhance Graal interface handling + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior + JDK-8237592, CVE-2020-14577: Enhance certificate verification + JDK-8238002, CVE-2020-14581: Better matrix operations + JDK-8238013: Enhance String writing + JDK-8238804: Enhance key handling process + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable + JDK-8238843: Enhanced font handing + JDK-8238920, CVE-2020-14583: Better Buffer support + JDK-8238925: Enhance WAV file playback + JDK-8240119, CVE-2020-14593: Less Affine Transformations + JDK-8240482: Improved WAV file playback + JDK-8241379: Update JCEKS support + JDK-8241522: Manifest improved jar headers redux + JDK-8242136, CVE-2020-14621: Better XML namespace handling * Other changes: + JDK-6933331: (d3d/ogl) java.lang.IllegalStateException: Buffers have not been created + JDK-7124307: JSpinner and changing value by mouse + JDK-8022574: remove HaltNode code after uncommon trap calls + JDK-8039082: [TEST_BUG] Test java/awt/dnd/BadSerializationTest/BadSerializationTest.java fails + JDK-8040630: Popup menus and tooltips flicker with previous popup contents when first shown + JDK-8044365: (dc) MulticastSendReceiveTests.java failing with ENOMEM when joining group (OS X 10.9) + JDK-8048215: [TESTBUG] java/lang/management/ManagementFactory/ThreadMXBeanProxy.java Expected non-null LockInfo + JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails in nightly + JDK-8080353: JShell: Better error message on attempting to add default method + JDK-8139876: Exclude hanging nsk/stress/stack from execution with deoptimization enabled + JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails with -XX:+DeoptimizeALot + JDK-8153430: jdk regression test MletParserLocaleTest, ParserInfiniteLoopTest reduce default timeout + JDK-8156207: Resource allocated BitMaps are often cleared unnecessarily + JDK-8159740: JShell: corralled declarations do not have correct source to wrapper mapping + JDK-8175984: ICC_Profile has un-needed, not-empty finalize method + JDK-8176359: Frame#setMaximizedbounds not working properly in multi screen environments + JDK-8183369: RFC unconformity of HttpURLConnection with proxy + JDK-8187078: -XX:+VerifyOops finds numerous problems when running JPRT + JDK-8189861: Refactor CacheFind + JDK-8191169: java/net/Authenticator/B4769350.java failed intermittently + JDK-8191930: [Graal] emits unparseable XML into compile log + JDK-8193879: Java debugger hangs on method invocation + JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on Windows + JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails + JDK-8198000: java/awt/List/EmptyListEventTest/EmptyListEventTest.java debug assert on Windows + JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/ /WrongParentAfterRemoveMenu.java debug assert on Windows + JDK-8198339: Test javax/swing/border/Test6981576.java is unstable + JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows, after JDK-8198801 + JDK-8203264: JNI exception pending in PlainDatagramSocketImpl.c:740 + JDK-8203672: JNI exception pending in PlainSocketImpl.c + JDK-8203673: JNI exception pending in DualStackPlainDatagramSocketImpl.c:398 + JDK-8204834: Fix confusing 'allocate' naming in OopStorage + JDK-8205399: Set node color on pinned HashMap.TreeNode deletion + JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/ /RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with handshake_failure + JDK-8206179: com/sun/management/OperatingSystemMXBean/ /GetCommittedVirtualMemorySize.java fails with Committed virtual memory size illegal value + JDK-8207334: VM times out in VM_HandshakeAllThreads::doit() with RunThese30M + JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize) doesn't work with 1GB LargePages


    Advisory IDSUSE-SU-2020:2197-1
    ReleasedTue Aug 11 13:32:49 2020
    SummarySecurity update for libX11
    Typesecurity
    Severityimportant
    References1174628,CVE-2020-14344
    Description:

    This update for libX11 fixes the following issues:

    • Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).


    Advisory IDSUSE-SU-2020:2373-1
    ReleasedFri Aug 28 12:58:51 2020
    SummarySecurity update for SUSE Manager 4.1.1
    Typesecurity
    Severitymoderate
    References1136857,1165572,1169553,1169780,1170244,1170468,1170654,1171281,1172279,1172504,1172709,1172807,1172831,1172839,1173169,1173522,1173535,1173554,1173566,1173584,1173932,1173982,1173997,1174025,1174167,1174201,1174229,1174325,1174405,1174470,1174965,1175485,1175555,1175558,1175724,1175791,678126,CVE-2020-11022
    Description:

    This consolidated update includes multiple patchinfos for SUSE Manager Server and Proxy. This patchinfo is used for the codestream release only.


    Advisory IDSUSE-SU-2020:2474-1
    ReleasedThu Sep 3 12:10:29 2020
    SummarySecurity update for libX11
    Typesecurity
    Severitymoderate
    References1175239,CVE-2020-14363
    Description:

    This update for libX11 fixes the following issues:

    • CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).


    Advisory IDSUSE-SU-2020:2947-1
    ReleasedFri Oct 16 15:23:07 2020
    SummarySecurity update for gcc10, nvptx-tools
    Typesecurity
    Severitymoderate
    References1172798,1172846,1173972,1174753,1174817,1175168,CVE-2020-13844
    Description:

    This update for gcc10, nvptx-tools fixes the following issues:
    This update provides the GCC10 compiler suite and runtime libraries.
    The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by the gcc10 variants.
    The new compiler variants are available with '-10' suffix, you can specify them via:
    CC=gcc-10 CXX=g++-10
    or similar commands.
    For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
    Changes in nvptx-tools:

    • Enable build on aarch64


    Advisory IDSUSE-RU-2020:2983-1
    ReleasedWed Oct 21 15:03:03 2020
    SummaryRecommended update for file
    Typerecommended
    Severitymoderate
    References1176123
    Description:

    This update for file fixes the following issues:

    • Fixes an issue when file displays broken 'ELF' interpreter. (bsc#1176123)


    Advisory IDSUSE-SU-2020:2995-1
    ReleasedThu Oct 22 10:03:09 2020
    SummarySecurity update for freetype2
    Typesecurity
    Severityimportant
    References1177914,CVE-2020-15999
    Description:

    This update for freetype2 fixes the following issues:

    • CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).


    Advisory IDSUSE-SU-2020:3091-1
    ReleasedThu Oct 29 16:35:37 2020
    SummarySecurity update for MozillaThunderbird and mozilla-nspr
    Typesecurity
    Severityimportant
    References1174230,1176384,1176756,1176899,1177977,CVE-2020-15673,CVE-2020-15676,CVE-2020-15677,CVE-2020-15678,CVE-2020-15683,CVE-2020-15969
    Description:

    This update for MozillaThunderbird and mozilla-nspr fixes the following issues:

    • Mozilla Thunderbird 78.4 * new: MailExtensions: browser.tabs.sendMessage API added * new: MailExtensions: messageDisplayScripts API added * changed: Yahoo and AOL mail users using password authentication will be migrated to OAuth2 * changed: MailExtensions: messageDisplay APIs extended to support multiple selected messages * changed: MailExtensions: compose.begin functions now support creating a message with attachments * fixed: Thunderbird could freeze when updating global search index * fixed: Multiple issues with handling of self-signed SSL certificates addressed * fixed: Recipient address fields in compose window could expand to fill all available space * fixed: Inserting emoji characters in message compose window caused unexpected behavior * fixed: Button to restore default folder icon color was not keyboard accessible * fixed: Various keyboard navigation fixes * fixed: Various color-related theme fixes * fixed: MailExtensions: Updating attachments with onBeforeSend.addListener() did not work MFSA 2020-47 (bsc#1177977) * CVE-2020-15969 Use-after-free in usersctp * CVE-2020-15683 Memory safety bugs fixed in Thunderbird 78.4
    • Mozilla Thunderbird 78.3.3 * OpenPGP: Improved support for encrypting with subkeys * OpenPGP message status icons were not visible in message header pane * Creating a new calendar event did not require an event title
    • Mozilla Thunderbird 78.3.2 (bsc#1176899) * OpenPGP: Improved support for encrypting with subkeys * OpenPGP: Encrypted messages with international characters were sometimes displayed incorrectly * Single-click deletion of recipient pills with middle mouse button restored * Searching an address book list did not display results * Dark mode, high contrast, and Windows theming fixes
    • Mozilla Thunderbird 78.3.1 * fix crash in nsImapProtocol::CreateNewLineFromSocket
    • Mozilla Thunderbird 78.3.0 MFSA 2020-44 (bsc#1176756) * CVE-2020-15677 Download origin spoofing via redirect * CVE-2020-15676 XSS when pasting attacker-controlled data into a contenteditable element * CVE-2020-15678 When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after- free scenario * CVE-2020-15673 Memory safety bugs fixed in Thunderbird 78.3

    • update mozilla-nspr to version 4.25.1 * The macOS platform code for shared library loading was changed to support macOS 11. * Dependency needed for the MozillaThunderbird udpate


    Advisory IDSUSE-RU-2020:3099-1
    ReleasedThu Oct 29 19:33:41 2020
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:

    • timezone update 2020b (bsc#1177460) * Revised predictions for Morocco's changes starting in 2023. * Canada's Yukon changes to -07 on 2020-11-01, not 2020-03-08. * Macquarie Island has stayed in sync with Tasmania since 2011. * Casey, Antarctica is at +08 in winter and +11 in summer. * zic no longer supports -y, nor the TYPE field of Rules.


    Advisory IDSUSE-RU-2020:3123-1
    ReleasedTue Nov 3 09:48:13 2020
    SummaryRecommended update for timezone
    Typerecommended
    Severityimportant
    References1177460,1178346,1178350,1178353
    Description:

    This update for timezone fixes the following issues:

    • Generate 'fat' timezone files (was default before 2020b). (bsc#1178346, bsc#1178350, bsc#1178353)
    • Palestine ends DST earlier than predicted, on 2020-10-24. (bsc#1177460)
    • Fiji starts DST later than usual, on 2020-12-20. (bsc#1177460)


    Advisory IDSUSE-SU-2020:3359-1
    ReleasedTue Nov 17 13:18:30 2020
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1177943,CVE-2020-14779,CVE-2020-14781,CVE-2020-14782,CVE-2020-14792,CVE-2020-14796,CVE-2020-14797,CVE-2020-14798,CVE-2020-14803
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Update to upstream tag jdk-11.0.9-11 (October 2020 CPU, bsc#1177943) * New features + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector * Security fixes + JDK-8233624: Enhance JNI linkage + JDK-8236196: Improve string pooling + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts + JDK-8237995, CVE-2020-14782: Enhance certificate processing + JDK-8240124: Better VM Interning + JDK-8241114, CVE-2020-14792: Better range handling + JDK-8242680, CVE-2020-14796: Improved URI Support + JDK-8242685, CVE-2020-14797: Better Path Validation + JDK-8242695, CVE-2020-14798: Enhanced buffer support + JDK-8243302: Advanced class supports + JDK-8244136, CVE-2020-14803: Improved Buffer supports + JDK-8244479: Further constrain certificates + JDK-8244955: Additional Fix for JDK-8240124 + JDK-8245407: Enhance zoning of times + JDK-8245412: Better class definitions + JDK-8245417: Improve certificate chain handling + JDK-8248574: Improve jpeg processing + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit + JDK-8253019: Enhanced JPEG decoding * Other changes + JDK-6532025: GIF reader throws misleading exception with truncated images + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/ /PDialogTest.java needs update by removing an infinite loop + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/ /Test8017492.java fails + JDK-8062947: Fix exception message to correctly represent LDAP connection failure + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/ /CloseServerSocket.java fails intermittently with Address already in use + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed due to timeout on DeadServerNoTimeoutTest is incorrect + JDK-8160768: Add capability to custom resolve host/domain names within the default JNDI LDAP provider + JDK-8172404: Tools should warn if weak algorithms are used before restricting them + JDK-8193367: Annotated type variable bounds crash javac + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java fails intermittently: Connection reset + JDK-8203026: java.rmi.NoSuchObjectException: no such object in table + JDK-8203281: [Windows] JComboBox change in ui when editor.setBorder() is called + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to resolve_wk_klass + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and JdbExprTest.sh fail due to timeout + JDK-8203928: [Test] Convert non-JDB scaffolding serviceability shell script tests to java + JDK-8204963: javax.swing.border.TitledBorder has a memory leak + JDK-8204994: SA might fail to attach to process with 'Windbg Error: WaitForEvent failed' + JDK-8205534: Remove SymbolTable dependency from serviceability agent + JDK-8206309: Tier1 SA tests fail + JDK-8208281: java/nio/channels/ /AsynchronousSocketChannel/Basic.java timed out + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java version - step1 + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh is incorrect + JDK-8209342: Problemlist SA tests on Solaris due to Error attaching to process: Can't create thread_db agent! + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java should be marked as headful + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with timeout + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java version - step2 + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with ZGC + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ /ap10t001/TestDescription.java failed with ObjectFree: GetCurrentThreadCpuTimerInfo returned unexpected error code + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java version - step3 + JDK-8210527: JShell: NullPointerException in jdk.jshell.Eval.translateExceptionStack + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related tests + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails with waitForPrompt timed out after 60 seconds + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should clarify which output is the pending reply after a timeout + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java version - step4 + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java fails to find ThreadLocalObject + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh test + JDK-8211694: JShell: Redeclared variable should be reset + JDK-8212200: assert when shared java.lang.Object is redefined by JVMTI agent + JDK-8212629: [TEST] wrong breakpoint in test/jdk/com/sun/jdi/DeferredStepTest + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57) - unexpected. lastLine=52, minLine=52, maxLine=55 + JDK-8212807: tools/jar/multiRelease/Basic.java times out + JDK-8213182: Minimal VM build failure after JDK-8212200 (assert when shared java.lang.Object is redefined by JVMTI agent) + JDK-8213214: Set -Djava.io.tmpdir= when running tests + JDK-8213275: ReplaceCriticalClasses.java fails with jdk.internal.vm.PostVMInitHook not found + JDK-8213574: Deadlock in string table expansion when dumping lots of CDS classes + JDK-8213703: LambdaConversionException: Invalid receiver type not a subtype of implementation type interface + JDK-8214074: Ghash optimization using AVX instructions + JDK-8214491: Upgrade to JLine 3.9.0 + JDK-8214797: TestJmapCoreMetaspace.java timed out + JDK-8215243: JShell tests failing intermitently with 'Problem cleaning up the following threads:' + JDK-8215244: jdk/jshell/ToolBasicTest.java testHistoryReference failed + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash optimization using AVX instructions) + JDK-8215438: jshell tool: Ctrl-D causes EOF + JDK-8216021: RunTest.gmk might set concurrency level to 1 on Windows + JDK-8216974: HttpConnection not returned to the pool after 204 response + JDK-8218948: SimpleDateFormat :: format - Zone Names are not reflected correctly during run time + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is too small on new Skylake CPUs + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs instead of aliased B&W glyphs + JDK-8221658: aarch64: add necessary predicate for ubfx patterns + JDK-8221759: Crash when completing 'java.io.File.path' + JDK-8221918: runtime/SharedArchiveFile/serviceability/ /ReplaceCriticalClasses.java fails: Shared archive not found + JDK-8222074: Enhance auto vectorization for x86 + JDK-8222079: Don't use memset to initialize fields decode_env constructor in disassembler.cpp + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely on hostname command + JDK-8223688: JShell: crash on the instantiation of raw anonymous class + JDK-8223777: In posix_spawn mode, failing to exec() jspawnhelper does not result in an error + JDK-8223940: Private key not supported by chosen signature algorithm + JDK-8224184: jshell got IOException at exiting with AIX + JDK-8224234: compiler/codegen/TestCharVect2.java fails in test_mulc + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws NullPointerException + JDK-8225625: AES Electronic Codebook (ECB) encryption and decryption optimization using AVX512 + VAES instructions + JDK-8226536: Catch OOM from deopt that fails rematerializing objects + JDK-8226575: OperatingSystemMXBean should be made container aware + JDK-8226697: Several tests which need the @key headful keyword are missing it. + JDK-8226809: Circular reference in printed stack trace is not correctly indented & ambiguous + JDK-8227059: sun/security/tools/keytool/ /DefaultSignatureAlgorithm.java timed out + JDK-8227269: Slow class loading when running with JDWP + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java fails due to 'exitValue = 6' + JDK-8228448: Jconsole can't connect to itself + JDK-8228967: Trust/Key store and SSL context utilities for tests + JDK-8229378: jdwp library loader in linker_md.c quietly truncates on buffer overflow + JDK-8229815: Upgrade Jline to 3.12.1 + JDK-8230000: some httpclients testng tests run zero test + JDK-8230002: javax/xml/jaxp/unittest/transform/ /SecureProcessingTest.java runs zero test + JDK-8230010: Remove jdk8037819/BasicTest1.java + JDK-8230094: CCE in createXMLEventWriter(Result) over an arbitrary XMLStreamWriter + JDK-8230402: Allocation of compile task fails with assert: 'Leaking compilation tasks?' + JDK-8230767: FlightRecorderListener returns null recording + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to test/jdk/java/util/zip/EntryCount64k.java + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes() can be quicker for self thread + JDK-8231586: enlarge encoding space for OopMapValue offsets + JDK-8231953: Wrong assumption in assertion in oop::register_oop + JDK-8231968: getCurrentThreadAllocatedBytes default implementation s/b getThreadAllocatedBytes + JDK-8232083: Minimal VM is broken after JDK-8231586 + JDK-8232161: Align some one-way conversion in MS950 charset with Windows + JDK-8232855: jshell missing word in /help help + JDK-8233027: OopMapSet::all_do does oms.next() twice during iteration + JDK-8233228: Disable weak named curves by default in TLS, CertPath, and Signed JAR + JDK-8233386: Initialize NULL fields for unused decorations + JDK-8233452: java.math.BigDecimal.sqrt() with RoundingMode.FLOOR results in incorrect result + JDK-8233686: XML transformer uses excessive amount of memory + JDK-8233741: AES Countermode (AES-CTR) optimization using AVX512 + VAES instructions + JDK-8233829: javac cannot find non-ASCII module name under non-UTF8 environment + JDK-8233958: Memory retention due to HttpsURLConnection finalizer that serves no purpose + JDK-8234011: (zipfs) Memory leak in ZipFileSystem.releaseDeflater() + JDK-8234058: runtime/CompressedOops/ /CompressedClassPointers.java fails with 'Narrow klass base: 0x0000000000000000' missing from stdout/stderr + JDK-8234149: Several regression tests do not dispose Frame at end + JDK-8234347: 'Turkey' meta time zone does not generate composed localized names + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/ /bug6980209.java fails in linux nightly + JDK-8234535: Cross compilation fails due to missing CFLAGS for the BUILD_CC + JDK-8234541: C1 emits an empty message when it inlines successfully + JDK-8234687: change javap reporting on unknown attributes + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK 11 + JDK-8236548: Localized time zone name inconsistency between English and other locales + JDK-8236617: jtreg test containers/docker/ /TestMemoryAwareness.java fails after 8226575 + JDK-8237182: Update copyright header for shenandoah and epsilon files + JDK-8237888: security/infra/java/security/cert/ /CertPathValidator/certification/LuxTrustCA.java fails when checking validity interval + JDK-8237977: Further update javax/net/ssl/compatibility/Compatibility.java + JDK-8238270: java.net HTTP/2 client does not decrease stream count when receives 204 response + JDK-8238284: [macos] Zero VM build fails due to an obvious typo + JDK-8238380: java.base/unix/native/libjava/childproc.c 'multiple definition' link errors with GCC10 + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c 'multiple definition' link errors with GCC10 + JDK-8238388: libj2gss/NativeFunc.o 'multiple definition' link errors with GCC10 + JDK-8238448: RSASSA-PSS signature verification fail when using certain odd key sizes + JDK-8238710: LingeredApp doesn't log stdout/stderr if exits with non-zero code + JDK-8239083: C1 assert(known_holder == NULL || (known_holder->is_instance_klass() && (!known_holder->is_interface() || ((ciInstanceKlass*)known_holder)->has_nonstatic_concrete_methods())), 'should be non-static concrete method'); + JDK-8239385: KerberosTicket client name refers wrongly to sAMAccountName in AD + JDK-8240169: javadoc fails to link to non-modular api docs + JDK-8240295: hs_err elapsed time in seconds is not accurate enough + JDK-8240360: NativeLibraryEvent has wrong library name on Linux + JDK-8240676: Meet not symmetric failure when running lucene on jdk8 + JDK-8241007: Shenandoah: remove ShenandoahCriticalControlThreadPriority support + JDK-8241065: Shenandoah: remove leftover code after JDK-8231086 + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is failing on 32bit Windows + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier: java.lang.NullPointerException + JDK-8241138: http.nonProxyHosts=* causes StringIndexOutOfBoundsException in DefaultProxySelector + JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java fails with OOME + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure + JDK-8241750: x86_32 build failure after JDK-8227269 + JDK-8242184: CRL generation error with RSASSA-PSS + JDK-8242283: Can't start JVM when java home path includes non-ASCII character + JDK-8242556: Cannot load RSASSA-PSS public key with non-null params from byte array + JDK-8243029: Rewrite javax/net/ssl/compatibility/ /Compatibility.java with a flexible interop test framework + JDK-8243138: Enhance BaseLdapServer to support starttls extended request + JDK-8243320: Add SSL root certificates to Oracle Root CA program + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA program + JDK-8243389: enhance os::pd_print_cpu_info on linux + JDK-8243453: java --describe-module failed with non-ASCII module name under non-UTF8 environment + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp + JDK-8243489: Thread CPU Load event may contain wrong data for CPU time under certain conditions + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on HiDPI screens (Windows) + JDK-8244087: 2020-04-24 public suffix list update + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest release 1.8.26 + JDK-8244164: AArch64: jaotc generates incorrect code for compressed OOPs with non-zero heap base + JDK-8244196: adjust output in os_linux + JDK-8244225: stringop-overflow warning on strncpy call from compile_the_world_in + JDK-8244287: JFR: Methods samples have line number 0 + JDK-8244703: 'platform encoding not initialized' exceptions with debugger, JNI + JDK-8244719: CTW: C2 compilation fails with 'assert(!VerifyHashTableKeys || _hash_lock == 0) failed: remove node from hash table before modifying it' + JDK-8244729: Shenandoah: remove resolve paths from SBSA::generate_shenandoah_lrb + JDK-8244763: Update --release 8 symbol information after JSR 337 MR3 + JDK-8244818: Java2D Queue Flusher crash while moving application window to external monitor + JDK-8245151: jarsigner should not raise duplicate warnings on verification + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9 + JDK-8245714: 'Bad graph detected in build_loop_late' when loads are pinned on loop limit check uncommon branch + JDK-8245801: StressRecompilation triggers assert 'redundunt OSR recompilation detected. memory leak in CodeCache!' + JDK-8245832: JDK build make-static-libs should build all JDK libraries + JDK-8245880: Shenandoah: check class unloading flag early in concurrent code root scan + JDK-8245981: Upgrade to jQuery 3.5.1 + JDK-8246027: Minimal fastdebug build broken after JDK-8245801 + JDK-8246094: [macos] Sound Recording and playback is not working + JDK-8246153: TestEliminateArrayCopy fails with -XX:+StressReflectiveCode + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest fails with AssertionError + JDK-8246203: Segmentation fault in verification due to stack overflow with -XX:+VerifyIterativeGVN + JDK-8246330: Add TLS Tests for Legacy ECDSA curves + JDK-8246453: TestClone crashes with 'all collected exceptions must come from the same place' + JDK-8247246: Add explicit ResolvedJavaType.link and expose presence of default methods + JDK-8247350: [aarch64] assert(false) failed: wrong size of mach node + JDK-8247502: PhaseStringOpts crashes while optimising effectively dead code + JDK-8247615: Initialize the bytes left for the heap sampler + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV in SBC2Support::pin_and_expand + JDK-8247874: Replacement in VersionProps.java.template not working when --with-vendor-bug-url contains '&' + JDK-8247979: aarch64: missing side effect of killing flags for clearArray_reg_reg + JDK-8248214: Add paddings for TaskQueueSuper to reduce false-sharing cache contention + JDK-8248219: aarch64: missing memory barrier in fast_storefield and fast_accessfield + JDK-8248348: Regression caused by the update to BCEL 6.0 + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to jtreg 5.1 + JDK-8248495: [macos] zerovm is broken due to libffi headers location + JDK-8248851: CMS: Missing memory fences between free chunk check and klass read + JDK-8248987: AOT's Linker.java seems to eagerly fail-fast on Windows + JDK-8249159: Downport test rework for SSLSocketTemplate from 8224650 + JDK-8249215: JFrame::setVisible crashed with -Dfile.encoding=UTF-8 on Japanese Windows. + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is not highlighted in GTKLookAndFeel + JDK-8249255: Build fails if source code in cygwin home dir + JDK-8249277: TestVerifyIterativeGVN.java is failing with timeout in OpenJDK 11 + JDK-8249278: Revert JDK-8226253 which breaks the spec of AccessibleState.SHOWING for JList + JDK-8249560: Shenandoah: Fix racy GC request handling + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should account for corner cases + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when requesting TGS Kerberos tickets + JDK-8250609: C2 crash in IfNode::fold_compares + JDK-8250627: Use -XX:+/-UseContainerSupport for enabling/disabling Java container metrics + JDK-8250755: Better cleanup for jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java + JDK-8250787: Provider.put no longer registering aliases in FIPS env + JDK-8250826: jhsdb does not work with coredump which comes from Substrate VM + JDK-8250827: Shenandoah: needs to reset/finish StringTable's dead count before/after parallel walk + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check the bounds + JDK-8251117: Cannot check P11Key size in P11Cipher and P11AEADCipher + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java test failure + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with I-U + JDK-8251469: Better cleanup for test/jdk/javax/imageio/SetOutput.java + JDK-8251487: Shenandoah: missing detail timing tracking for final mark cleaning phase + JDK-8252120: compiler/oracle/TestCompileCommand.java misspells 'occured' + JDK-8252157: JDK-8231209 11u backport breaks jmm binary compatibility + JDK-8252258: [11u] JDK-8242154 changes the default vendor + JDK-8252804: [test] Fix 'ReleaseDeflater.java' test after downport of 8234011 + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10) in JDK 11 + JDK-8253283: [11u] Test build/translations/ /VerifyTranslations.java failing after JDK-8252258 + JDK-8253813: Backout JDK-8244287 from 11u: it causes several crashes + Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)' introduced in jdk 11.0.9


    Advisory IDSUSE-RU-2020:3462-1
    ReleasedFri Nov 20 13:14:35 2020
    SummaryRecommended update for pam and sudo
    Typerecommended
    Severitymoderate
    References1174593,1177858,1178727
    Description:

    This update for pam and sudo fixes the following issue:
    pam:

    • pam_xauth: do not *free* a string which has been successfully passed to *putenv*. (bsc#1177858)
    • Initialize the local variable *daysleft* to avoid a misleading warning for password expire days. (bsc#1178727)
    • Run /usr/bin/xauth using the old user's and group's identifiers. (bsc#1174593)

    sudo:
    • Fix a problem with pam_xauth which checks effective and real uids to get the real identity of the user. (bsc#1174593)


    Advisory IDSUSE-RU-2020:3620-1
    ReleasedThu Dec 3 17:03:55 2020
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for pam fixes the following issues:

    • Check if the password is part of the username. (jsc#SLE-16719, jsc#SLE-16720) - Check whether the password contains a substring of of the user's name of at least `` characters length in some form. This is enabled by the new parameter `usersubstr=`


    Advisory IDSUSE-RU-2020:3772-1
    ReleasedMon Dec 14 11:11:29 2020
    SummaryRecommended update for hamcrest
    Typerecommended
    Severitymoderate
    References1174544
    Description:

    This update for hamcrest fixes the following issue:

    • Add obsoletes in the core API to solve conflicts during updates. (bsc#1174544)


    Advisory IDSUSE-RU-2020:3791-1
    ReleasedMon Dec 14 17:39:19 2020
    SummaryRecommended update for gzip
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for gzip fixes the following issue:

    • Enable `DFLTCC` (Deflate Conversion Call) compression for s390x for levels 1-6 to `CFLAGS`. (jsc#SLE-13775) Enable by adding `-DDFLTCC_LEVEL_MASK=0x7e` to `CFLAGS`.


    Advisory IDSUSE-RU-2020:3942-1
    ReleasedTue Dec 29 12:22:01 2020
    SummaryRecommended update for libidn2
    Typerecommended
    Severitymoderate
    References1180138
    Description:

    This update for libidn2 fixes the following issues:

    • The library is actually dual licensed, GPL-2.0-or-later or LGPL-3.0-or-later, adjusted the RPM license tags (bsc#1180138)


    Advisory IDSUSE-RU-2021:65-1
    ReleasedMon Jan 11 15:11:49 2021
    SummaryRecommended update for hamcrest
    Typerecommended
    Severitylow
    References1120493,1179994
    Description:

    This update for hamcrest fixes the following issues:

    • Make hamcrest build reproducibly. (bsc#1120493)
    • Fix typo in hamcrest-core description. (bsc#1179994)


    Advisory IDSUSE-RU-2021:179-1
    ReleasedWed Jan 20 13:38:51 2021
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:

    • timezone update 2020f (bsc#1177460) * 'make rearguard_tarballs' no longer generates a bad rearguard.zi, fixing a 2020e bug.

    • timezone update 2020e (bsc#1177460) * Volgograd switches to Moscow time on 2020-12-27 at 02:00.

    • timezone update 2020f (bsc#1177460) * 'make rearguard_tarballs' no longer generates a bad rearguard.zi, fixing a 2020e bug.

    • timezone update 2020e (bsc#1177460) * Volgograd switches to Moscow time on 2020-12-27 at 02:00.


    Advisory IDSUSE-RU-2021:220-1
    ReleasedTue Jan 26 14:00:51 2021
    SummaryRecommended update for keyutils
    Typerecommended
    Severitymoderate
    References1180603
    Description:

    This update for keyutils fixes the following issues:

    • Adjust the library license to be LPGL-2.1+ only (the tools are GPL2+, the library is just LGPL-2.1+) (bsc#1180603)


    Advisory IDSUSE-RU-2021:293-1
    ReleasedWed Feb 3 12:52:34 2021
    SummaryRecommended update for gmp
    Typerecommended
    Severitymoderate
    References1180603
    Description:

    This update for gmp fixes the following issues:

    • correct license statements of packages (library itself is no GPL-3.0) (bsc#1180603)


    Advisory IDSUSE-RU-2021:301-1
    ReleasedThu Feb 4 08:46:27 2021
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:

    • timezone update 2021a (bsc#1177460) * South Sudan changes from +03 to +02 on 2021-02-01 at 00:00.

    • timezone update 2021a (bsc#1177460) * South Sudan changes from +03 to +02 on 2021-02-01 at 00:00.


    Advisory IDSUSE-OU-2021:339-1
    ReleasedMon Feb 8 13:16:07 2021
    SummaryOptional update for pam
    Typeoptional
    Severitylow
    References
    Description:

    This update for pam fixes the following issues:

    • Added rpm macros for this package, so that other packages can make use of it

    This patch is optional to be installed - it doesn't fix any bugs.


    Advisory IDSUSE-SU-2021:352-1
    ReleasedTue Feb 9 15:02:05 2021
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1181239
    Description:

    This update for java-11-openjdk fixes the following issues:
    java-11-openjdk was upgraded to include January 2021 CPU (bsc#1181239)

    • Enable Sheandoah GC for x86_64 (jsc#ECO-3171)


    Advisory IDSUSE-RU-2021:761-1
    ReleasedWed Mar 10 12:26:54 2021
    SummaryRecommended update for libX11
    Typerecommended
    Severitymoderate
    References1181963
    Description:

    This update for libX11 fixes the following issues:
    - Fixes a race condition in 'libX11' that causes various applications to crash randomly. (bsc#1181963)


    Advisory IDSUSE-RU-2021:924-1
    ReleasedTue Mar 23 10:00:49 2021
    SummaryRecommended update for filesystem
    Typerecommended
    Severitymoderate
    References1078466,1146705,1175519,1178775,1180020,1180083,1180596,1181011,1181831,1183094
    Description:

    This update for filesystem the following issues:

    • Remove duplicate line due to merge error
    • Add fix for 'mesa' creating cache with perm 0700. (bsc#1181011)
    • Fixed an issue causing failure during installation/upgrade a failure. (rh#1548403) (bsc#1146705)
    • Allows to override config to add cleanup options of '/var/tmp'. (bsc#1078466)
    • Create config to cleanup '/tmp' regular required with 'tmpfs'. (bsc#1175519)

    This update for systemd fixes the following issues:
    • Fix for a possible memory leak. (bsc#1180020)
    • Fix for a case when to a bind mounted directory results inactive mount units. (#7811) (bsc#1180596)
    • Fixed an issue when starting a container conflicts with another one. (bsc#1178775)
    • Drop most of the tmpfiles that deal with generic paths and avoid warnings. (bsc#1078466, bsc#1181831)
    • Don't use shell redirections when calling a rpm macro. (bsc#1183094)
    • 'systemd' requires 'aaa_base' >= 13.2. (bsc#1180083)


    Advisory IDSUSE-SU-2021:930-1
    ReleasedWed Mar 24 12:09:23 2021
    SummarySecurity update for nghttp2
    Typesecurity
    Severityimportant
    References1172442,1181358,CVE-2020-11080
    Description:

    This update for nghttp2 fixes the following issues:

    • CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358)


    Advisory IDSUSE-SU-2021:974-1
    ReleasedMon Mar 29 19:31:27 2021
    SummarySecurity update for tar
    Typesecurity
    Severitylow
    References1181131,CVE-2021-20193
    Description:

    This update for tar fixes the following issues:
    CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)


    Advisory IDSUSE-SU-2021:1007-1
    ReleasedThu Apr 1 17:47:20 2021
    SummarySecurity update for MozillaFirefox
    Typesecurity
    Severityimportant
    References1183942,CVE-2021-23981,CVE-2021-23982,CVE-2021-23984,CVE-2021-23987
    Description:

    This update for MozillaFirefox fixes the following issues:

    • Firefox was updated to 78.9.0 ESR (MFSA 2021-11, bsc#1183942) * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage * CVE-2021-23984: Malicious extensions could have spoofed popup information * CVE-2021-23987: Memory safety bugs


    Advisory IDSUSE-RU-2021:1018-1
    ReleasedTue Apr 6 14:29:13 2021
    SummaryRecommended update for gzip
    Typerecommended
    Severitymoderate
    References1180713
    Description:

    This update for gzip fixes the following issues:

    • Fixes an issue when 'gzexe' counts the lines to skip wrong. (bsc#1180713)


    Advisory IDSUSE-SU-2021:1282-1
    ReleasedTue Apr 20 14:47:17 2021
    SummarySecurity update for apache-commons-io
    Typesecurity
    Severitymoderate
    References1184755,CVE-2021-29425
    Description:

    This update for apache-commons-io fixes the following issues:

    • CVE-2021-29425: Limited path traversal when invoking the method FileNameUtils.normalize with an improper input string (bsc#1184755)


    Advisory IDSUSE-RU-2021:1289-1
    ReleasedWed Apr 21 14:02:46 2021
    SummaryRecommended update for gzip
    Typerecommended
    Severitymoderate
    References1177047
    Description:

    This update for gzip fixes the following issues:

    • Fixed a potential segfault when zlib acceleration is enabled (bsc#1177047)


    Advisory IDSUSE-SU-2021:1409-1
    ReleasedWed Apr 28 16:32:50 2021
    SummarySecurity update for giflib
    Typesecurity
    Severitylow
    References1184123
    Description:

    This update for giflib fixes the following issues:

    • Enable Position Independent Code and inherit CFLAGS from the build system (bsc#1184123).


    Advisory IDSUSE-SU-2021:1554-1
    ReleasedTue May 11 09:43:41 2021
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1184606,1185055,1185056,CVE-2021-2161,CVE-2021-2163
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Update to upstream tag jdk-11.0.11+9 (April 2021 CPU) * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055) * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)
    • moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto with just java-11-openjdk-headless installed (bsc#1184606).


    Advisory IDSUSE-RU-2021:1563-1
    ReleasedTue May 11 11:16:00 2021
    SummaryRecommended update for maven
    Typerecommended
    Severitymoderate
    References1184022
    Description:

    This update for systemtap fixes the following issues:

    • Releasing maven for SLE-15 SP1 and SP2. (bsc#1184022)


    Advisory IDSUSE-RU-2021:1643-1
    ReleasedWed May 19 13:51:48 2021
    SummaryRecommended update for pam
    Typerecommended
    Severityimportant
    References1181443,1184358,1185562
    Description:

    This update for pam fixes the following issues:

    • Fixed a bug, where the 'unlimited'/'-1' value was not interpreted correctly (bsc#1181443)
    • Fixed a bug, where pam_access interpreted the keyword 'LOCAL' incorrectly, leading to an attempt to resolve it as a hostname (bsc#1184358)
    • In the 32-bit compatibility package for 64-bit architectures, require 'systemd-32bit' to be also installed as it contains pam_systemd.so for 32 bit applications. (bsc#1185562)


    Advisory IDSUSE-SU-2021:1765-1
    ReleasedWed May 26 12:36:38 2021
    SummarySecurity update for libX11
    Typesecurity
    Severitymoderate
    References1182506,CVE-2021-31535
    Description:

    This update for libX11 fixes the following issues:

    • CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).


    Advisory IDSUSE-RU-2021:1861-1
    ReleasedFri Jun 4 09:59:40 2021
    SummaryRecommended update for gcc10
    Typerecommended
    Severitymoderate
    References1029961,1106014,1178577,1178624,1178675,1182016
    Description:

    This update for gcc10 fixes the following issues:

    • Disable nvptx offloading for aarch64 again since it doesn't work
    • Fixed a build failure issue. (bsc#1182016)
    • Fix for memory miscompilation on 'aarch64'. (bsc#1178624, bsc#1178577)
    • Fix 32bit 'libgnat.so' link. (bsc#1178675)
    • prepare usrmerge: Install libgcc_s into %_libdir. ABI wise it stays /%lib. (bsc#1029961)
    • Build complete set of multilibs for arm-none target. (bsc#1106014)


    Advisory IDSUSE-SU-2021:1897-1
    ReleasedTue Jun 8 16:15:17 2021
    SummarySecurity update for libX11
    Typesecurity
    Severityimportant
    References1186643,CVE-2021-31535
    Description:

    This update for libX11 fixes the following issues:

    • Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)


    Advisory IDSUSE-RU-2021:1935-1
    ReleasedThu Jun 10 10:45:09 2021
    SummaryRecommended update for gzip
    Typerecommended
    Severitymoderate
    References1186642
    Description:


    This update for gzip fixes the following issue:

    • gzip had a lower release number in 15 sp2 and sp3 than in 15 sp1, which could lead to migration issues. (bsc#1186642)


    Advisory IDSUSE-RU-2021:1937-1
    ReleasedThu Jun 10 10:47:09 2021
    SummaryRecommended update for nghttp2
    Typerecommended
    Severitymoderate
    References1186642
    Description:


    This update for nghttp2 fixes the following issue:

    • The (lib)nghttp2 packages had a lower release number in SUSE Linux Enterprise 15 sp2 and sp3 than in 15 sp1, which could lead to migration issues. (bsc#1186642)


    Advisory IDSUSE-RU-2021:2146-1
    ReleasedWed Jun 23 17:55:14 2021
    SummaryRecommended update for openssh
    Typerecommended
    Severitymoderate
    References1115550,1174162
    Description:

    This update for openssh fixes the following issues:

    • Fixed a race condition leading to a sshd termination of multichannel sessions with non-root users (bsc#1115550, bsc#1174162).


    Advisory IDSUSE-RU-2021:2173-1
    ReleasedMon Jun 28 14:59:45 2021
    SummaryRecommended update for automake
    Typerecommended
    Severitymoderate
    References1040589,1047218,1182604,1185540,1186049
    Description:

    This update for automake fixes the following issues:

    • Implement generated autoconf makefiles reproducible (bsc#1182604)
    • Add fix to avoid date variations in docs. (bsc#1047218, jsc#SLE-17848)
    • Avoid bashisms in test-driver script. (bsc#1185540)

    This update for pcre fixes the following issues:
    • Do not run profiling 'check' in parallel to make package build reproducible. (bsc#1040589)

    This update for brp-check-suse fixes the following issues:
    • Add fixes to support reproducible builds. (bsc#1186049)


    Advisory IDSUSE-RU-2021:2193-1
    ReleasedMon Jun 28 18:38:43 2021
    SummaryRecommended update for tar
    Typerecommended
    Severitymoderate
    References1184124
    Description:

    This update for tar fixes the following issues:

    • Link '/var/lib/tests/tar/bin/genfile' as Position-Independent Executable (bsc#1184124)


    Advisory IDSUSE-SU-2021:2196-1
    ReleasedTue Jun 29 09:41:39 2021
    SummarySecurity update for lua53
    Typesecurity
    Severitymoderate
    References1175448,1175449,CVE-2020-24370,CVE-2020-24371
    Description:

    This update for lua53 fixes the following issues:
    Update to version 5.3.6:

    • CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
    • CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
    • Long brackets with a huge number of '=' overflow some internal buffer arithmetic.


    Advisory IDSUSE-SU-2021:2320-1
    ReleasedWed Jul 14 17:01:06 2021
    SummarySecurity update for sqlite3
    Typesecurity
    Severityimportant
    References1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701,CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
    Description:

    This update for sqlite3 fixes the following issues:

    • Update to version 3.36.0
    • CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener optimization (bsc#1173641)
    • CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in isAuxiliaryVtabOperator (bsc#1164719)
    • CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
    • CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
    • CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer dereference (bsc#1160309)
    • CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
    • CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
    • CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)
    • CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference (bsc#1159491)
    • CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with a shadow table name (bsc#1158960)
    • CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns (bsc#1158959)
    • CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements (bsc#1158958)
    • CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service (bsc#1158812)
    • CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
    • CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
    • CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
    • CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
    • CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
    • CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
    • CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
    • CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)


    Advisory IDSUSE-SU-2021:2555-1
    ReleasedThu Jul 29 08:29:55 2021
    SummarySecurity update for git
    Typesecurity
    Severitymoderate
    References1168930,1183026,1183580,CVE-2021-21300
    Description:

    This update for git fixes the following issues:
    Update from version 2.26.2 to version 2.31.1 (jsc#SLE-18152)
    Security fixes:

    • CVE-2021-21300: On case-insensitive file systems with support for symbolic links, if Git is configured globally to apply delay-capable clean/smudge filters (such as Git LFS), Git could run remote code during a clone. (bsc#1183026)

    Non security changes:
    • Add `sysusers` file to create `git-daemon` user.
    • Remove `perl-base` and `openssh-server` dependency on `git-core`and provide a `perl-Git` package. (jsc#SLE-17838)
    • `fsmonitor` bug fixes
    • Fix `git bisect` to take an annotated tag as a good/bad endpoint
    • Fix a corner case in `git mv` on case insensitive systems
    • Require only `openssh-clients` where possible (like Tumbleweed or SUSE Linux Enterprise >= 15 SP3). (bsc#1183580)
    • Drop `rsync` requirement, not necessary anymore.
    • Use of `pack-redundant` command is discouraged and will trigger a warning. The replacement is `repack -d`.
    • The `--format=%(trailers)` mechanism gets enhanced to make it easier to design output for machine consumption.
    • No longer give message to choose between rebase or merge upon pull if the history `fast-forwards`.
    • The configuration variable `core.abbrev` can be set to `no` to force no abbreviation regardless of the hash algorithm
    • `git rev-parse` can be explicitly told to give output as absolute or relative path with the `--path-format=(absolute|relative)` option.
    • Bash completion update to make it easier for end-users to add completion for their custom `git` subcommands.
    • `git maintenance` learned to drive scheduled maintenance on platforms whose native scheduling methods are not 'cron'.
    • After expiring a reflog and making a single commit, the reflog for the branch would record a single entry that knows both `@{0}` and `@{1}`, but we failed to answer 'what commit were we on?', i.e. `@{1}`
    • `git bundle` learns `--stdin` option to read its refs from the standard input. Also, it now does not lose refs when they point at the same object.
    • `git log` learned a new `--diff-merges=` option.
    • `git ls-files` can and does show multiple entries when the index is unmerged, which is a source for confusion unless `-s/-u` option is in use. A new option `--deduplicate` has been introduced.
    • `git worktree list` now annotates worktrees as prunable, shows locked and prunable attributes in `--porcelain mode`, and gained a `--verbose` option.
    • `git clone` tries to locally check out the branch pointed at by HEAD of the remote repository after it is done, but the protocol did not convey the information necessary to do so when copying an empty repository. The protocol v2 learned how to do so.
    • There are other ways than `..` for a single token to denote a `commit range', namely `^!` and `^-`, but `git range-diff` did not understand them.
    • The `git range-diff` command learned `--(left|right)-only` option to show only one side of the compared range.
    • `git mergetool` feeds three versions (base, local and remote) of a conflicted path unmodified. The command learned to optionally prepare these files with unconflicted parts already resolved.
    • The `.mailmap` is documented to be read only from the root level of a working tree, but a stray file in a bare repository also was read by accident, which has been corrected.
    • `git maintenance` tool learned a new `pack-refs` maintenance task.
    • Improved error message given when a configuration variable that is expected to have a boolean value.
    • Signed commits and tags now allow verification of objects, whose two object names (one in SHA-1, the other in SHA-256) are both signed.
    • `git rev-list` command learned `--disk-usage` option.
    • `git diff`, `git log` `--{skip,rotate}-to=` allows the user to discard diff output for early paths or move them to the end of the output.
    • `git difftool` learned `--skip-to=` option to restart an interrupted session from an arbitrary path.
    • `git grep` has been tweaked to be limited to the sparse checkout paths.
    • `git rebase --[no-]fork-point` gained a configuration variable `rebase.forkPoint` so that users do not have to keep specifying a non-default setting.
    • `git stash` did not work well in a sparsely checked out working tree.
    • Newline characters in the host and path part of `git://` URL are now forbidden.
    • `Userdiff` updates for PHP, Rust, CSS
    • Avoid administrator error leading to data loss with `git push --force-with-lease[=]` by introducing `--force-if-includes`
    • only pull `asciidoctor` for the default ruby version
    • The `--committer-date-is-author-date` option of `rebase` and `am` subcommands lost the e-mail address by mistake in 2.29
    • The transport protocol v2 has become the default again
    • `git worktree` gained a `repair` subcommand, `git init --separate-git-dir` no longer corrupts administrative data related to linked worktrees
    • `git maintenance` introduced for repository maintenance tasks
    • `fetch.writeCommitGraph` is deemed to be still a bit too risky and is no longer part of the `feature.experimental` set.
    • The commands in the `diff` family honors the `diff.relative` configuration variable.
    • `git diff-files` has been taught to say paths that are marked as `intent-to-add` are new files, not modified from an empty blob.
    • `git gui` now allows opening work trees from the start-up dialog.
    • `git bugreport` reports what shell is in use.
    • Some repositories have commits that record wrong committer timezone; `git fast-import` has an option to pass these timestamps intact to allow recreating existing repositories as-is.
    • `git describe` will always use the `long` version when giving its output based misplaced tags
    • `git pull` issues a warning message until the `pull.rebase` configuration variable is explicitly given


    Advisory IDSUSE-RU-2021:2573-1
    ReleasedThu Jul 29 14:21:52 2021
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1188127
    Description:

    This update for timezone fixes the following issue:

    • From systemd v249: when enumerating time zones the timedatectl tool will now consult the 'tzdata.zi' file shipped by
    the IANA time zone database package, in addition to 'zone1970.tab', as before. This makes sure time zone aliases are now correctly supported. This update adds the 'tzdata.zi' file (bsc#1188127).


    Advisory IDSUSE-RU-2021:2606-1
    ReleasedWed Aug 4 13:16:09 2021
    SummaryRecommended update for libcbor
    Typerecommended
    Severitymoderate
    References1102408
    Description:

    This update for libcbor fixes the following issues:

    • Implement a fix to avoid building shared library twice. (bsc#1102408)


    Advisory IDSUSE-SU-2021:2682-1
    ReleasedThu Aug 12 20:06:19 2021
    SummarySecurity update for rpm
    Typesecurity
    Severityimportant
    References1179416,1181805,1183543,1183545,CVE-2021-20266,CVE-2021-20271,CVE-2021-3421
    Description:

    This update for rpm fixes the following issues:

    • Changed default package verification level to 'none' to be compatible to rpm-4.14.1
    • Made illegal obsoletes a warning
    • Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
    • Added support for enforcing signature policy and payload verification step to transactions (jsc#SLE-17817)
    • Added :humansi and :hmaniec query formatters for human readable output
    • Added query selectors for whatobsoletes and whatconflicts
    • Added support for sorting caret higher than base version
    • rpm does no longer require the signature header to be in a contiguous region when signing (bsc#1181805)

    Security fixes:
    • CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity (bsc#1183543)

    • CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

    • CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.


    Advisory IDSUSE-RU-2021:2885-1
    ReleasedTue Aug 31 12:21:17 2021
    SummaryRecommended update for publicsuffix
    Typerecommended
    Severitylow
    References1189124
    Description:

    This update for publicsuffix fixes the following issues:

    • Updates the list of known/accepted domains with recent data (bsc#1189124).


    Advisory IDSUSE-SU-2021:2952-1
    ReleasedFri Sep 3 14:38:44 2021
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1185476,1188564,1188565,1188566,CVE-2021-2341,CVE-2021-2369,CVE-2021-2388
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Update to jdk-11.0.12+7
    • CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
    • CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
    • CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)


    Advisory IDSUSE-RU-2021:3115-1
    ReleasedThu Sep 16 14:04:26 2021
    SummaryRecommended update for mozilla-nspr, mozilla-nss
    Typerecommended
    Severitymoderate
    References1029961,1174697,1176206,1176934,1179382,1188891,CVE-2020-12400,CVE-2020-12401,CVE-2020-12403,CVE-2020-25648,CVE-2020-6829
    Description:

    This update for mozilla-nspr fixes the following issues:
    mozilla-nspr was updated to version 4.32:

    • implement new socket option PR_SockOpt_DontFrag
    • support larger DNS records by increasing the default buffer size for DNS queries
    • Lock access to PRCallOnceType members in PR_CallOnce* for thread safety bmo#1686138
    • PR_GetSystemInfo supports a new flag PR_SI_RELEASE_BUILD to get information about the operating system build version.


    Mozilla NSS was updated to version 3.68:
    • bmo#1713562 - Fix test leak.
    • bmo#1717452 - NSS 3.68 should depend on NSPR 4.32.
    • bmo#1693206 - Implement PKCS8 export of ECDSA keys.
    • bmo#1712883 - DTLS 1.3 draft-43.
    • bmo#1655493 - Support SHA2 HW acceleration using Intel SHA Extension.
    • bmo#1713562 - Validate ECH public names.
    • bmo#1717610 - Add function to get seconds from epoch from pkix::Time.

    update to NSS 3.67
    • bmo#1683710 - Add a means to disable ALPN.
    • bmo#1715720 - Fix nssckbi version number in NSS 3.67 (was supposed to be incremented in 3.66).
    • bmo#1714719 - Set NSS_USE_64 on riscv64 target when using GYP/Ninja.
    • bmo#1566124 - Fix counter increase in ppc-gcm-wrap.c.
    • bmo#1566124 - Fix AES_GCM mode on ppc64le for messages of length more than 255-byte.

    update to NSS 3.66
    • bmo#1710716 - Remove Expired Sonera Class2 CA from NSS.
    • bmo#1710716 - Remove Expired Root Certificates from NSS - QuoVadis Root Certification Authority.
    • bmo#1708307 - Remove Trustis FPS Root CA from NSS.
    • bmo#1707097 - Add Certum Trusted Root CA to NSS.
    • bmo#1707097 - Add Certum EC-384 CA to NSS.
    • bmo#1703942 - Add ANF Secure Server Root CA to NSS.
    • bmo#1697071 - Add GLOBALTRUST 2020 root cert to NSS.
    • bmo#1712184 - NSS tools manpages need to be updated to reflect that sqlite is the default database.
    • bmo#1712230 - Don't build ppc-gcm.s with clang integrated assembler.
    • bmo#1712211 - Strict prototype error when trying to compile nss code that includes blapi.h.
    • bmo#1710773 - NSS needs FIPS 180-3 FIPS indicators.
    • bmo#1709291 - Add VerifyCodeSigningCertificateChain.

    update to NSS 3.65
    • bmo#1709654 - Update for NetBSD configuration.
    • bmo#1709750 - Disable HPKE test when fuzzing.
    • bmo#1566124 - Optimize AES-GCM for ppc64le.
    • bmo#1699021 - Add AES-256-GCM to HPKE.
    • bmo#1698419 - ECH -10 updates.
    • bmo#1692930 - Update HPKE to final version.
    • bmo#1707130 - NSS should use modern algorithms in PKCS#12 files by default.
    • bmo#1703936 - New coverity/cpp scanner errors.
    • bmo#1697303 - NSS needs to update it's csp clearing to FIPS 180-3 standards.
    • bmo#1702663 - Need to support RSA PSS with Hashing PKCS #11 Mechanisms.
    • bmo#1705119 - Deadlock when using GCM and non-thread safe tokens.

    update to NSS 3.64
    • bmo#1705286 - Properly detect mips64.
    • bmo#1687164 - Introduce NSS_DISABLE_CRYPTO_VSX and
    disable_crypto_vsx.
  • bmo#1698320 - replace __builtin_cpu_supports('vsx') with
  • ppc_crypto_support() for clang.
  • bmo#1613235 - Add POWER ChaCha20 stream cipher vector
  • acceleration.
    Fixed in 3.63
    • bmo#1697380 - Make a clang-format run on top of helpful contributions.
    • bmo#1683520 - ECCKiila P384, change syntax of nested structs
    initialization to prevent build isses with GCC 4.8.
  • bmo#1683520 - [lib/freebl/ecl] P-384: allow zero scalars in dual
  • scalar multiplication.
  • bmo#1683520 - ECCKiila P521, change syntax of nested structs
  • initialization to prevent build isses with GCC 4.8.
  • bmo#1683520 - [lib/freebl/ecl] P-521: allow zero scalars in dual
  • scalar multiplication.
  • bmo#1696800 - HACL* update March 2021 - c95ab70fcb2bc21025d8845281bc4bc8987ca683.
  • bmo#1694214 - tstclnt can't enable middlebox compat mode.
  • bmo#1694392 - NSS does not work with PKCS #11 modules not supporting
  • profiles.
  • bmo#1685880 - Minor fix to prevent unused variable on early return.
  • bmo#1685880 - Fix for the gcc compiler version 7 to support setenv
  • with nss build.
  • bmo#1693217 - Increase nssckbi.h version number for March 2021 batch
  • of root CA changes, CA list version 2.48.
  • bmo#1692094 - Set email distrust after to 21-03-01 for Camerfirma's
  • 'Chambers of Commerce' and 'Global Chambersign' roots.
  • bmo#1618407 - Symantec root certs - Set CKA_NSS_EMAIL_DISTRUST_AFTER.
  • bmo#1693173 - Add GlobalSign R45, E45, R46, and E46 root certs to NSS.
  • bmo#1683738 - Add AC RAIZ FNMT-RCM SERVIDORES SEGUROS root cert to NSS.
  • bmo#1686854 - Remove GeoTrust PCA-G2 and VeriSign Universal root certs
  • from NSS.
  • bmo#1687822 - Turn off Websites trust bit for the “Staat der
  • Nederlanden Root CA - G3” root cert in NSS.
  • bmo#1692094 - Turn off Websites Trust Bit for 'Chambers of Commerce
  • Root - 2008' and 'Global Chambersign Root - 2008’.
  • bmo#1694291 - Tracing fixes for ECH.

  • update to NSS 3.62
    • bmo#1688374 - Fix parallel build NSS-3.61 with make
    • bmo#1682044 - pkix_Build_GatherCerts() + pkix_CacheCert_Add()
    can corrupt 'cachedCertTable'
  • bmo#1690583 - Fix CH padding extension size calculation
  • bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
  • bmo#1690421 - Install packaged libabigail in docker-builds image
  • bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
  • bmo#1674819 - Fixup a51fae403328, enum type may be signed
  • bmo#1681585 - Add ECH support to selfserv
  • bmo#1681585 - Update ECH to Draft-09
  • bmo#1678398 - Add Export/Import functions for HPKE context
  • bmo#1678398 - Update HPKE to draft-07

  • update to NSS 3.61
    • bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
    values under certain conditions.
  • bmo#1684300 - Fix default PBE iteration count when NSS is compiled
  • with NSS_DISABLE_DBM.
  • bmo#1651411 - Improve constant-timeness in RSA operations.
  • bmo#1677207 - Upgrade Google Test version to latest release.
  • bmo#1654332 - Add aarch64-make target to nss-try.

  • Update to NSS 3.60.1:
    Notable changes in NSS 3.60:
    • TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support has been added, replacing the previous ESNI (draft-ietf-tls-esni-01) implementation. See bmo#1654332 for more information.
    • December 2020 batch of Root CA changes, builtins library updated to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769 for more information.

    Update to NSS 3.59.1:
    • bmo#1679290 - Fix potential deadlock with certain third-party
    PKCS11 modules
    Update to NSS 3.59:
    Notable changes:
    • Exported two existing functions from libnss: CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData

    Bugfixes
    • bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race
    • bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
    • bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
    • bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
    • bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
    root certs when SHA1 signatures are disabled.
  • bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
  • solve some test intermittents
  • bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
  • our CVE-2020-25648 fix that broke purple-discord (boo#1179382)
  • bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
  • bmo#1667989 - Fix gyp linking on Solaris
  • bmo#1668123 - Export CERT_AddCertToListHeadWithData and
  • CERT_AddCertToListTailWithData from libnss
  • bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
  • bmo#1663091 - Remove unnecessary assertions in the streaming
  • ASN.1 decoder that affected decoding certain PKCS8 private keys when using NSS debug builds
  • bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.

  • update to NSS 3.58
    Bugs fixed:
    • bmo#1641480 (CVE-2020-25648) Tighten CCS handling for middlebox compatibility mode.
    • bmo#1631890 - Add support for Hybrid Public Key Encryption (draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello (draft-ietf-tls-esni).
    • bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto extensions.
    • bmo#1668328 - Handle spaces in the Python path name when using gyp on Windows.
    • bmo#1667153 - Add PK11_ImportDataKey for data object import.
    • bmo#1665715 - Pass the embedded SCT list extension (if present) to TrustDomain::CheckRevocation instead of the notBefore value.

    update to NSS 3.57
    • The following CA certificates were Added: bmo#1663049 - CN=Trustwave Global Certification Authority SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8 bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4 bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
    • The following CA certificates were Removed: bmo#1651211 - CN=EE Certification Centre Root CA SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76 bmo#1656077 - O=Government Root Certification Authority; C=TW SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
    • Trust settings for the following CA certificates were Modified: bmo#1653092 - CN=OISTE WISeKey Global Root GA CA Websites (server authentication) trust bit removed.
    • https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.57_release_notes

    update to NSS 3.56
    Notable changes
    • bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
    • bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
    • bmo#1654142 - Add CPU feature detection for Intel SHA extension.
    • bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
    • bmo#1656986 - Properly detect arm64 during GYP build architecture
    detection.
  • bmo#1652729 - Add build flag to disable RC2 and relocate to
  • lib/freebl/deprecated.
  • bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
  • bmo#1588941 - Send empty certificate message when scheme selection
  • fails.
  • bmo#1652032 - Fix failure to build in Windows arm64 makefile
  • cross-compilation.
  • bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
  • bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
  • makefile target.
  • bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
  • bmo#1659814 - Fix interop.sh failures with newer tls-interop
  • commit and dependencies.
  • bmo#1656519 - NSPR dependency updated to 4.28

  • update to NSS 3.55
    Notable changes
    • P384 and P521 elliptic curve implementations are replaced with verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
    • PK11_FindCertInSlot is added. With this function, a given slot can be queried with a DER-Encoded certificate, providing performance and usability improvements over other mechanisms. (bmo#1649633)
    • DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)

    Relevant Bugfixes
    • bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
    • bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
    • bmo#1631573 (CVE-2020-12401) - Remove unnecessary scalar padding.
    • bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part ChaCha20 (which was not functioning correctly) and more strictly enforce tag length.
    • bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
    • bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
    • bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
    • bmo#1653202 - Fix initialization bug in blapitest when compiled with NSS_DISABLE_DEPRECATED_SEED.
    • bmo#1646594 - Fix AVX2 detection in makefile builds.
    • bmo#1649633 - Add PK11_FindCertInSlot to search a given slot for a DER-encoded certificate.
    • bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
    • bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
    • bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
    • bmo#1649226 - Add Wycheproof ECDSA tests.
    • bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
    • bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in RSA_CheckSignRecover.
    • bmo#1646324 - Advertise PKCS#1 schemes for certificates in the signature_algorithms extension.

    update to NSS 3.54
    Notable changes
    • Support for TLS 1.3 external pre-shared keys (bmo#1603042).
    • Use ARM Cryptography Extension for SHA256, when available (bmo#1528113)
    • The following CA certificates were Added: bmo#1645186 - certSIGN Root CA G2. bmo#1645174 - e-Szigno Root CA 2017. bmo#1641716 - Microsoft ECC Root Certificate Authority 2017. bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
    • The following CA certificates were Removed: bmo#1645199 - AddTrust Class 1 CA Root. bmo#1645199 - AddTrust External CA Root. bmo#1641718 - LuxTrust Global Root 2. bmo#1639987 - Staat der Nederlanden Root CA - G2. bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4. bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4. bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.

    • A number of certificates had their Email trust bit disabled. See bmo#1618402 for a complete list.

    Bugs fixed
    • bmo#1528113 - Use ARM Cryptography Extension for SHA256.
    • bmo#1603042 - Add TLS 1.3 external PSK support.
    • bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
    • bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
    • bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
    • bmo#1641716 - Add Microsoft's non-EV root certificates.
    • bmo1621151 - Disable email trust bit for 'O=Government
    Root Certification Authority; C=TW' root.
  • bmo#1645199 - Remove AddTrust root certificates.
  • bmo#1641718 - Remove 'LuxTrust Global Root 2' root certificate.
  • bmo#1639987 - Remove 'Staat der Nederlanden Root CA - G2' root
  • certificate.
  • bmo#1618402 - Remove Symantec root certificates and disable email trust
  • bit.
  • bmo#1640516 - NSS 3.54 should depend on NSPR 4.26.
  • bmo#1642146 - Fix undefined reference to `PORT_ZAlloc_stub' in seed.c.
  • bmo#1642153 - Fix infinite recursion building NSS.
  • bmo#1642638 - Fix fuzzing assertion crash.
  • bmo#1642871 - Enable SSL_SendSessionTicket after resumption.
  • bmo#1643123 - Support SSL_ExportEarlyKeyingMaterial with External PSKs.
  • bmo#1643557 - Fix numerous compile warnings in NSS.
  • bmo#1644774 - SSL gtests to use ClearServerCache when resetting
  • self-encrypt keys.
  • bmo#1645479 - Don't use SECITEM_MakeItem in secutil.c.
  • bmo#1646520 - Stricter enforcement of ASN.1 INTEGER encoding.

  • Advisory IDSUSE-RU-2021:3171-1
    ReleasedMon Sep 20 17:26:34 2021
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severityimportant
    References1189201,1190252
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Implement FIPS support in OpenJDK
    • Fix build with 'glibc-2.34' (bsc#1189201)
    • Add support for 'riscv64' (zero VM)
    • Make NSS the default security provider. (bsc#1190252)


    Advisory IDSUSE-RU-2021:3182-1
    ReleasedTue Sep 21 17:04:26 2021
    SummaryRecommended update for file
    Typerecommended
    Severitymoderate
    References1189996
    Description:

    This update for file fixes the following issues:

    • Fixes exception thrown by memory allocation problem (bsc#1189996)


    Advisory IDSUSE-SU-2021:3291-1
    ReleasedWed Oct 6 16:45:36 2021
    SummarySecurity update for glibc
    Typesecurity
    Severitymoderate
    References1186489,1187911,CVE-2021-33574,CVE-2021-35942
    Description:

    This update for glibc fixes the following issues:

    • CVE-2021-33574: Fixed use __pthread_attr_copy in mq_notify (bsc#1186489).
    • CVE-2021-35942: Fixed wordexp handle overflow in positional parameter number (bsc#1187911).


    Advisory IDSUSE-SU-2021:3445-1
    ReleasedFri Oct 15 09:03:39 2021
    SummarySecurity update for rpm
    Typesecurity
    Severityimportant
    References1183659,1185299,1187670,1188548
    Description:

    This update for rpm fixes the following issues:
    Security issues fixed:

    • PGP hardening changes (bsc#1185299)

    Maintaince issues fixed:
    • Fixed zstd detection (bsc#1187670)
    • Added ndb rofs support (bsc#1188548)
    • Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)


    Advisory IDSUSE-SU-2021:3490-1
    ReleasedWed Oct 20 16:31:55 2021
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1190793,CVE-2021-39537
    Description:

    This update for ncurses fixes the following issues:

    • CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)


    Advisory IDSUSE-RU-2021:3494-1
    ReleasedWed Oct 20 16:48:46 2021
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1190052
    Description:

    This update for pam fixes the following issues:

    • Added pam_faillock to the set of available PAM modules. (jsc#SLE-20638)
    • Added new file macros.pam on request of systemd. (bsc#1190052)


    Advisory IDSUSE-RU-2021:3510-1
    ReleasedTue Oct 26 11:22:15 2021
    SummaryRecommended update for pam
    Typerecommended
    Severityimportant
    References1191987
    Description:

    This update for pam fixes the following issues:

    • Fixed a bad directive file which resulted in the 'securetty' file to be installed as 'macros.pam'. (bsc#1191987)


    Advisory IDSUSE-SU-2021:3529-1
    ReleasedWed Oct 27 09:23:32 2021
    SummarySecurity update for pcre
    Typesecurity
    Severitymoderate
    References1172973,1172974,CVE-2019-20838,CVE-2020-14155
    Description:

    This update for pcre fixes the following issues:
    Update pcre to version 8.45:

    • CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
    • CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)


    Advisory IDSUSE-SU-2021:3671-1
    ReleasedTue Nov 16 14:48:10 2021
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1191901,1191903,1191904,1191906,1191909,1191910,1191911,1191912,1191913,1191914,CVE-2021-35550,CVE-2021-35556,CVE-2021-35559,CVE-2021-35561,CVE-2021-35564,CVE-2021-35565,CVE-2021-35567,CVE-2021-35578,CVE-2021-35586,CVE-2021-35603
    Description:

    This update for java-11-openjdk fixes the following issues:
    Update to 11.0.13+8 (October 2021 CPU)

    • CVE-2021-35550, bsc#1191901: Update the default enabled cipher suites preference
    • CVE-2021-35565, bsc#1191909: com.sun.net.HttpsServer spins on TLS session close
    • CVE-2021-35556, bsc#1191910: Richer Text Editors
    • CVE-2021-35559, bsc#1191911: Enhanced style for RTF kit
    • CVE-2021-35561, bsc#1191912: Better hashing support
    • CVE-2021-35564, bsc#1191913: Improve Keystore integrity
    • CVE-2021-35567, bsc#1191903: More Constrained Delegation
    • CVE-2021-35578, bsc#1191904: Improve TLS client handshaking
    • CVE-2021-35586, bsc#1191914: Better BMP support
    • CVE-2021-35603, bsc#1191906: Better session identification
    • Improve Stream handling for SSL
    • Improve requests of certificates
    • Correct certificate requests
    • Enhance DTLS client handshake


    Advisory IDSUSE-RU-2021:3766-1
    ReleasedTue Nov 23 07:07:43 2021
    SummaryRecommended update for git
    Typerecommended
    Severitymoderate
    References1192023
    Description:

    This update for git fixes the following issues:

    • Installation of the 'git-daemon' package needs nogroup group dependency (bsc#1192023)


    Advisory IDSUSE-RU-2021:3799-1
    ReleasedWed Nov 24 18:07:54 2021
    SummaryRecommended update for gcc11
    Typerecommended
    Severitymoderate
    References1187153,1187273,1188623
    Description:

    This update for gcc11 fixes the following issues:
    The additional GNU compiler collection GCC 11 is provided:
    To select these compilers install the packages:

    • gcc11
    • gcc-c++11
    • and others with 11 prefix.

    to select them for building:
    • CC='gcc-11'
    • CXX='g++-11'

    The compiler baselibraries (libgcc_s1, libstdc++6 and others) are being replaced by the GCC 11 variants.


    Advisory IDSUSE-RU-2021:3872-1
    ReleasedThu Dec 2 07:25:55 2021
    SummaryRecommended update for cracklib
    Typerecommended
    Severitymoderate
    References1191736
    Description:

    This update for cracklib fixes the following issues:

    • Enable build time tests (bsc#1191736)


    Advisory IDSUSE-RU-2021:3883-1
    ReleasedThu Dec 2 11:47:07 2021
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:
    Update timezone to 2021e (bsc#1177460)

    • Palestine will fall back 10-29 (not 10-30) at 01:00
    • Fiji suspends DST for the 2021/2022 season
    • 'zic -r' marks unspecified timestamps with '-00'
    • Fix a bug in 'zic -b fat' that caused old timestamps to be mishandled in 32-bit-only readers
    • Refresh timezone info for china


    Advisory IDSUSE-RU-2021:3891-1
    ReleasedFri Dec 3 10:21:49 2021
    SummaryRecommended update for keyutils
    Typerecommended
    Severitymoderate
    References1029961,1113013,1187654
    Description:

    This update for keyutils fixes the following issues:

    • Add /etc/keys/ and /usr/etc/keys/ directory (bsc#1187654)

    keyutils was updated to 1.6.3 (jsc#SLE-20016):
    • Revert the change notifications that were using /dev/watch_queue.
    • Apply the change notifications that use pipe2(O_NOTIFICATION_PIPE).
    • Allow 'keyctl supports' to retrieve raw capability data.
    • Allow 'keyctl id' to turn a symbolic key ID into a numeric ID.
    • Allow 'keyctl new_session' to name the keyring.
    • Allow 'keyctl add/padd/etc.' to take hex-encoded data.
    • Add 'keyctl watch*' to expose kernel change notifications on keys.
    • Add caps for namespacing and notifications.
    • Set a default TTL on keys that upcall for name resolution.
    • Explicitly clear memory after it's held sensitive information.
    • Various manual page fixes.
    • Fix C++-related errors.
    • Add support for keyctl_move().
    • Add support for keyctl_capabilities().
    • Make key=val list optional for various public-key ops.
    • Fix system call signature for KEYCTL_PKEY_QUERY.
    • Fix 'keyctl pkey_query' argument passing.
    • Use keyctl_read_alloc() in dump_key_tree_aux().
    • Various manual page fixes.

    Updated to 1.6:
    • Apply various specfile cleanups from Fedora.
    • request-key: Provide a command line option to suppress helper execution.
    • request-key: Find least-wildcard match rather than first match.
    • Remove the dependency on MIT Kerberos.
    • Fix some error messages
    • keyctl_dh_compute.3: Suggest /proc/crypto for list of available hashes.
    • Fix doc and comment typos.
    • Add public key ops for encrypt, decrypt, sign and verify (needs linux-4.20).
    • Add pkg-config support for finding libkeyutils.
    • upstream isn't offering PGP signatures for the source tarballs anymore

    Updated to 1.5.11 (bsc#1113013)
    • Add keyring restriction support.
    • Add KDF support to the Diffie-Helman function.
    • DNS: Add support for AFS config files and SRV records


    Advisory IDSUSE-SU-2021:3942-1
    ReleasedMon Dec 6 14:46:05 2021
    SummarySecurity update for brotli
    Typesecurity
    Severitymoderate
    References1175825,CVE-2020-8927
    Description:

    This update for brotli fixes the following issues:

    • CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).


    Advisory IDSUSE-SU-2021:3946-1
    ReleasedMon Dec 6 14:57:42 2021
    SummarySecurity update for gmp
    Typesecurity
    Severitymoderate
    References1192717,CVE-2021-43618
    Description:

    This update for gmp fixes the following issues:

    • CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).


    Advisory IDSUSE-SU-2021:3950-1
    ReleasedMon Dec 6 14:59:37 2021
    SummarySecurity update for openssh
    Typesecurity
    Severityimportant
    References1190975,CVE-2021-41617
    Description:

    This update for openssh fixes the following issues:

    • CVE-2021-41617: Fixed privilege escalation when AuthorizedKeysCommand/AuthorizedPrincipalsCommand are configured (bsc#1190975).


    Advisory IDSUSE-RU-2021:3980-1
    ReleasedThu Dec 9 16:42:19 2021
    SummaryRecommended update for glibc
    Typerecommended
    Severitymoderate
    References1191592
    Description:


    glibc was updated to fix the following issue:

    • Support for new IBM Z Hardware (bsc#1191592, jsc#IBM-869)


    Advisory IDSUSE-SU-2021:4153-1
    ReleasedWed Dec 22 11:00:48 2021
    SummarySecurity update for openssh
    Typesecurity
    Severityimportant
    References1183137,CVE-2021-28041
    Description:

    This update for openssh fixes the following issues:

    • CVE-2021-28041: Fixed double free in ssh-agent (bsc#1183137).


    Advisory IDSUSE-RU-2022:12-1
    ReleasedMon Jan 3 15:36:04 2022
    SummaryRecommended update for cairo, jbigkit, libjpeg-turbo, libwebp, libxcb, openjpeg2, pixman, poppler, tiff
    Typerecommended
    Severitymoderate
    References
    Description:

    This recommended update for cairo, jbigkit, libjpeg-turbo, libwebp, libxcb, openjpeg2, pixman, poppler, tiff provides the following fix:

    • Ship some missing binaries to PackageHub.


    Advisory IDSUSE-RU-2022:96-1
    ReleasedTue Jan 18 05:14:44 2022
    SummaryRecommended update for rpm
    Typerecommended
    Severityimportant
    References1180125,1190824,1193711
    Description:

    This update for rpm fixes the following issues:

    • Fix header check so that old rpms no longer get rejected (bsc#1190824)
    • Add explicit requirement on python-rpm-macros (bsc#1180125, bsc#1193711)


    Advisory IDSUSE-RU-2022:143-1
    ReleasedThu Jan 20 14:32:30 2022
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References1193314
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Java Cryptography was always operating in FIPS mode if crypto-policies was not used.
    • Allow plain key import in fips mode unless 'com.suse.fips.plainKeySupport' is set to false


    Advisory IDSUSE-RU-2022:207-1
    ReleasedThu Jan 27 09:24:49 2022
    SummaryRecommended update for glibc
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for glibc fixes the following issues:

    • Add support for livepatches on x86_64 for SUSE Linux Enterprise 15 SP4 (jsc#SLE-20049).


    Advisory IDSUSE-RU-2022:227-1
    ReleasedMon Jan 31 06:05:25 2022
    SummaryRecommended update for git
    Typerecommended
    Severitymoderate
    References1193722
    Description:

    This update for git fixes the following issues:

    • update to 2.34.1 (bsc#1193722): * 'git grep' looking in a blob that has non-UTF8 payload was completely broken when linked with certain versions of PCREv2 library in the latest release. * 'git pull' with any strategy when the other side is behind us should succeed as it is a no-op, but doesn't. * An earlier change in 2.34.0 caused JGit application (that abused GIT_EDITOR mechanism when invoking 'git config') to get stuck with a SIGTTOU signal; it has been reverted. * An earlier change that broke .gitignore matching has been reverted. * SubmittingPatches document gained a syntactically incorrect mark-up, which has been corrected.

    • git 2.33.0: * 'git send-email' learned the '--sendmail-cmd' command line option and the 'sendemail.sendmailCmd' configuration variable, which is a more sensible approach than the current way of repurposing the 'smtp-server' that is meant to name the server to instead name the command to talk to the server. * The userdiff pattern for C# learned the token 'record'. * 'git rev-list' learns to omit the 'commit ' header lines from the output with the `--no-commit-header` option. * 'git worktree add --lock' learned to record why the worktree is locked with a custom message. * internal improvements including performance optimizations * a number of bug fixes

    • git 2.32.0: * '.gitattributes', '.gitignore', and '.mailmap' files that are symbolic links are ignored * 'git apply --3way' used to first attempt a straight application, and only fell back to the 3-way merge algorithm when the straight application failed. Starting with this version, the command will first try the 3-way merge algorithm and only when it fails (either resulting with conflict or the base versions of blobs are missing), falls back to the usual patch application. * 'git stash show' can now show the untracked part of the stash * Improved 'git repack' strategy * http code can now unlock a certificate with a cached password respectively. * 'git clone --reject-shallow' option fails the clone as soon as we notice that we are cloning from a shallow repository. * 'gitweb' learned 'e-mail privacy' feature * Multiple improvements to output and configuration options * Bug fixes and developer visible fixes


    Advisory IDSUSE-SU-2022:330-1
    ReleasedFri Feb 4 09:29:08 2022
    SummarySecurity update for glibc
    Typesecurity
    Severityimportant
    References1194640,1194768,1194770,1194785,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219
    Description:


    This update for glibc fixes the following issues:

    • CVE-2021-3999: Fixed incorrect errno in getcwd (bsc#1194640)
    • CVE-2022-23219: Fixed buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
    • CVE-2022-23218: Fixed buffer overflow in sunrpc svcunix_create (bsc#1194770)

    Features added:
    • IBM Power 10 string operation improvements (bsc#1194785, jsc#SLE-18195)


    Advisory IDSUSE-RU-2022:520-1
    ReleasedFri Feb 18 12:45:19 2022
    SummaryRecommended update for rpm
    Typerecommended
    Severitymoderate
    References1194968
    Description:

    This update for rpm fixes the following issues:

    • Revert unwanted /usr/bin/python to /usr/bin/python2 change we got with the update to 4.14.3 (bsc#1194968)


    Advisory IDSUSE-RU-2022:692-1
    ReleasedThu Mar 3 15:46:47 2022
    SummaryRecommended update for filesystem
    Typerecommended
    Severitymoderate
    References1190447
    Description:

    This update for filesystem fixes the following issues:

    • Release ported filesystem to LTSS channels (bsc#1190447).


    Advisory IDSUSE-RU-2022:789-1
    ReleasedThu Mar 10 11:22:05 2022
    SummaryRecommended update for update-alternatives
    Typerecommended
    Severitymoderate
    References1195654
    Description:

    This update for update-alternatives fixes the following issues:

    • Break bash - update-alternatives cycle rewrite of '%post' in 'lua'. (bsc#1195654)


    Advisory IDSUSE-SU-2022:816-1
    ReleasedMon Mar 14 10:22:04 2022
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1194925,1194926,1194927,1194928,1194929,1194930,1194931,1194932,1194933,1194934,1194935,1194937,1194939,1194940,1194941,CVE-2022-21248,CVE-2022-21277,CVE-2022-21282,CVE-2022-21283,CVE-2022-21291,CVE-2022-21293,CVE-2022-21294,CVE-2022-21296,CVE-2022-21299,CVE-2022-21305,CVE-2022-21340,CVE-2022-21341,CVE-2022-21360,CVE-2022-21365,CVE-2022-21366
    Description:

    This update for java-11-openjdk fixes the following issues:

    • CVE-2022-21248: Fixed incomplete deserialization class filtering in ObjectInputStream. (bnc#1194926)
    • CVE-2022-21277: Fixed incorrect reading of TIFF files in TIFFNullDecompressor. (bnc#1194930)
    • CVE-2022-21282: Fixed Insufficient URI checks in the XSLT TransformerImpl. (bnc#1194933)
    • CVE-2022-21283: Fixed unexpected exception thrown in regex Pattern. (bnc#1194937)
    • CVE-2022-21291: Fixed Incorrect marking of writeable fields. (bnc#1194925)
    • CVE-2022-21293: Fixed Incomplete checks of StringBuffer and StringBuilder during deserialization. (bnc#1194935)
    • CVE-2022-21294: Fixed Incorrect IdentityHashMap size checks during deserialization. (bnc#1194934)
    • CVE-2022-21296: Fixed Incorrect access checks in XMLEntityManager. (bnc#1194932)
    • CVE-2022-21299: Fixed Infinite loop related to incorrect handling of newlines in XMLEntityScanner. (bnc#1194931)
    • CVE-2022-21305: Fixed Array indexing issues in LIRGenerator. (bnc#1194939)
    • CVE-2022-21340: Fixed Excessive resource use when reading JAR manifest attributes. (bnc#1194940)
    • CVE-2022-21341: Fixed OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream. (bnc#1194941)
    • CVE-2022-21360: Fixed Excessive memory allocation in BMPImageReader. (bnc#1194929)
    • CVE-2022-21365: Fixed Integer overflow in BMPImageReader. (bnc#1194928)
    • CVE-2022-21366: Fixed Excessive memory allocation in TIFF*Decompressor. (bnc#1194927)


    Advisory IDSUSE-RU-2022:861-1
    ReleasedTue Mar 15 23:31:21 2022
    SummaryRecommended update for openssl-1_1
    Typerecommended
    Severitymoderate
    References1182959,1195149,1195792,1195856
    Description:

    This update for openssl-1_1 fixes the following issues:
    openssl-1_1:

    • Fix PAC pointer authentication in ARM (bsc#1195856)
    • Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
    • FIPS: Fix function and reason error codes (bsc#1182959)
    • Enable zlib compression support (bsc#1195149)
    glibc:
    • Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    linux-glibc-devel:
    • Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

    libxcrypt:
    • Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

    zlib:
    • Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1


    Advisory IDSUSE-RU-2022:936-1
    ReleasedTue Mar 22 18:10:17 2022
    SummaryRecommended update for filesystem and systemd-rpm-macros
    Typerecommended
    Severitymoderate
    References1196275,1196406
    Description:

    This update for filesystem and systemd-rpm-macros fixes the following issues:
    filesystem:

    • Add path /lib/modprobe.d (bsc#1196275, jsc#SLE-20639)

    systemd-rpm-macros:
    • Make %_modprobedir point to /lib/modprobe.d (bsc#1196275, bsc#1196406)


    Advisory IDSUSE-RU-2022:1033-1
    ReleasedTue Mar 29 18:42:05 2022
    SummaryRecommended update for java-11-openjdk
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Build failure on Solaris.
    • Unable to connect to https://google.com using java.net.HttpClient.


    Advisory IDSUSE-RU-2022:1047-1
    ReleasedWed Mar 30 16:20:56 2022
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1196093,1197024
    Description:

    This update for pam fixes the following issues:

    • Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
    • Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable. This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)


    Advisory IDSUSE-RU-2022:1118-1
    ReleasedTue Apr 5 18:34:06 2022
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:

    • timezone update 2022a (bsc#1177460): * Palestine will spring forward on 2022-03-27, not on 03-26 * `zdump -v` now outputs better failure indications * Bug fixes for code that reads corrupted TZif data


    Advisory IDSUSE-SU-2022:1158-1
    ReleasedTue Apr 12 14:44:43 2022
    SummarySecurity update for xz
    Typesecurity
    Severityimportant
    References1198062,CVE-2022-1271
    Description:

    This update for xz fixes the following issues:

    • CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)


    Advisory IDSUSE-SU-2022:1265-1
    ReleasedTue Apr 19 15:22:37 2022
    SummarySecurity update for jsoup, jsr-305
    Typesecurity
    Severityimportant
    References1189749,CVE-2021-37714
    Description:

    This update for jsoup, jsr-305 fixes the following issues:

    • CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

    Changes in jsr-305:
    • Build with java source and target levels 8
    • Upgrade to upstream version 3.0.2

    Changes in jsoup:
    • Upgrade to upstream version 1.14.2
    • Generate tarball using source service instead of a script


    Advisory IDSUSE-RU-2022:1281-1
    ReleasedWed Apr 20 12:26:38 2022
    SummaryRecommended update for libtirpc
    Typerecommended
    Severitymoderate
    References1196647
    Description:

    This update for libtirpc fixes the following issues:

    • Add option to enforce connection via protocol version 2 first (bsc#1196647)


    Advisory IDSUSE-RU-2022:1374-1
    ReleasedMon Apr 25 15:02:13 2022
    SummaryRecommended update for openldap2
    Typerecommended
    Severitymoderate
    References1191157,1197004
    Description:

    This update for openldap2 fixes the following issues:

    • allow specification of max/min TLS version with TLS1.3 (bsc#1191157)
    • libldap was able to be out of step with openldap in some cases which could cause incorrect installations and symbol resolution failures. openldap2 and libldap now are locked to their related release versions. (bsc#1197004)
    • restore CLDAP functionality in CLI tools (jsc#PM-3288)


    Advisory IDSUSE-RU-2022:1409-1
    ReleasedTue Apr 26 12:54:57 2022
    SummaryRecommended update for gcc11
    Typerecommended
    Severitymoderate
    References1195628,1196107
    Description:

    This update for gcc11 fixes the following issues:

    • Add a list of Obsoletes to libstdc++6-pp-gcc11 so updates from packages provided by older GCC work. Add a requires from that package to the corresponding libstc++6 package to keep those at the same version. [bsc#1196107]
    • Fixed memory corruption when creating dependences with the D language frontend.
    • Add gcc11-PIE, similar to gcc-PIE but affecting gcc11 [bsc#1195628]
    • Put libstdc++6-pp Requires on the shared library and drop to Recommends.


    Advisory IDSUSE-RU-2022:1451-1
    ReleasedThu Apr 28 10:47:22 2022
    SummaryRecommended update for perl
    Typerecommended
    Severitymoderate
    References1193489
    Description:

    This update for perl fixes the following issues:

    • Fix Socket::VERSION evaluation and stabilize Socket:VERSION comparisons (bsc#1193489)


    Advisory IDSUSE-SU-2022:1484-1
    ReleasedMon May 2 16:47:10 2022
    SummarySecurity update for git
    Typesecurity
    Severityimportant
    References1181400,1198234,CVE-2022-24765
    Description:

    This update for git fixes the following issues:

    • Updated to version 2.35.3: - CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).


    Advisory IDSUSE-SU-2022:1513-1
    ReleasedTue May 3 16:13:25 2022
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1198671,1198672,1198673,1198674,1198675,CVE-2022-21426,CVE-2022-21434,CVE-2022-21443,CVE-2022-21476,CVE-2022-21496
    Description:

    This update for java-11-openjdk fixes the following issues:

    • CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
    • CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
    • CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
    • CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
    • CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).


    Advisory IDSUSE-SU-2022:1548-1
    ReleasedThu May 5 16:45:28 2022
    SummarySecurity update for tar
    Typesecurity
    Severitymoderate
    References1029961,1120610,1130496,1181131,CVE-2018-20482,CVE-2019-9923,CVE-2021-20193
    Description:

    This update for tar fixes the following issues:

    • CVE-2021-20193: Fixed a memory leak in read_header() in list.c (bsc#1181131).
    • CVE-2019-9923: Fixed a null-pointer dereference in pax_decode_header in sparse.c (bsc#1130496).
    • CVE-2018-20482: Fixed infinite read loop in sparse_dump_region in sparse.c (bsc#1120610).

    • Update to GNU tar 1.34: * Fix extraction over pipe * Fix memory leak in read_header (CVE-2021-20193) (bsc#1181131) * Fix extraction when . and .. are unreadable * Gracefully handle duplicate symlinks when extracting * Re-initialize supplementary groups when switching to user privileges

    • Update to GNU tar 1.33: * POSIX extended format headers do not include PID by default * --delay-directory-restore works for archives with reversed member ordering * Fix extraction of a symbolic link hardlinked to another symbolic link * Wildcards in exclude-vcs-ignore mode don't match slash * Fix the --no-overwrite-dir option * Fix handling of chained renames in incremental backups * Link counting works for file names supplied with -T * Accept only position-sensitive (file-selection) options in file list files

    • prepare usrmerge (bsc#1029961)

    • Update to GNU 1.32 * Fix the use of --checkpoint without explicit --checkpoint-action * Fix extraction with the -U option * Fix iconv usage on BSD-based systems * Fix possible NULL dereference (savannah bug #55369) [bsc#1130496] [CVE-2019-9923] * Improve the testsuite

    • Update to GNU 1.31 * Fix heap-buffer-overrun with --one-top-level, bug introduced with the addition of that option in 1.28 * Support for zstd compression * New option '--zstd' instructs tar to use zstd as compression program. When listing, extractng and comparing, zstd compressed archives are recognized automatically. When '-a' option is in effect, zstd compression is selected if the destination archive name ends in '.zst' or '.tzst'. * The -K option interacts properly with member names given in the command line. Names of members to extract can be specified along with the '-K NAME' option. In this case, tar will extract NAME and those of named members that appear in the archive after it, which is consistent with the semantics of the option. Previous versions of tar extracted NAME, those of named members that appeared before it, and everything after it. * Fix CVE-2018-20482 - When creating archives with the --sparse option, previous versions of tar would loop endlessly if a sparse file had been truncated while being archived.


    Advisory IDSUSE-SU-2022:1565-1
    ReleasedFri May 6 17:09:36 2022
    SummarySecurity update for giflib
    Typesecurity
    Severitymoderate
    References1094832,1146299,1184123,974847,CVE-2016-3977,CVE-2018-11490,CVE-2019-15133
    Description:

    This update for giflib fixes the following issues:

    • CVE-2019-15133: Fixed a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero (bsc#1146299).
    • CVE-2018-11490: Fixed a heap-based buffer overflow in DGifDecompressLine function in dgif_lib.c (bsc#1094832).
    • CVE-2016-3977: Fixed a heap buffer overflow in gif2rgb (bsc#974847).
    Update to version 5.2.1 * In gifbuild.c, avoid a core dump on no color map. * Restore inadvertently removed library version numbers in Makefile. Changes in version 5.2.0 * The undocumented and deprecated GifQuantizeBuffer() entry point has been moved to the util library to reduce libgif size and attack surface. Applications needing this function are couraged to link the util library or make their own copy. * The following obsolete utility programs are no longer installed: gifecho, giffilter, gifinto, gifsponge. These were either installed in error or have been obsolesced by modern image-transformmation tools like ImageMagick convert. They may be removed entirely in a future release. * Address SourceForge issue #136: Stack-buffer-overflow in gifcolor.c:84 * Address SF bug #134: Giflib fails to slurp significant number of gifs * Apply SPDX convention for license tagging. Changes in version 5.1.9 * The documentation directory now includes an HTMlified version of the GIF89 standard, and a more detailed description of how LZW compression is applied to GIFs. * Address SF bug #129: The latest version of giflib cannot be build on windows. * Address SF bug #126: Cannot compile giflib using c89 Changes in version 5.1.8 * Address SF bug #119: MemorySanitizer: FPE on unknown address (CVE-2019-15133 bsc#1146299) * Address SF bug #125: 5.1.7: xmlto is still required for tarball * Address SF bug #124: 5.1.7: ar invocation is not crosscompile compatible * Address SF bug #122: 5.1.7 installs manpages to wrong directory * Address SF bug #121: make: getversion: Command not found * Address SF bug #120: 5.1.7 does not build a proper library - no Changes in version 5.1.7 * Correct a minor packaging error (superfluous symlinks) in the 5.1.6 tarballs. Changes in version 5.1.6 * Fix library installation in the Makefile. Changes in version 5.1.5 * Fix SF bug #114: Null dereferences in main() of gifclrmp * Fix SF bug #113: Heap Buffer Overflow-2 in function DGifDecompressLine() in cgif.c. This had been assigned (CVE-2018-11490 bsc#1094832). * Fix SF bug #111: segmentation fault in PrintCodeBlock * Fix SF bug #109: Segmentation fault of giftool reading a crafted file * Fix SF bug #107: Floating point exception in giftext utility * Fix SF bug #105: heap buffer overflow in DumpScreen2RGB in gif2rgb.c:317 * Fix SF bug #104: Ineffective bounds check in DGifSlurp * Fix SF bug #103: GIFLIB 5.1.4: DGifSlurp fails on empty comment * Fix SF bug #87: Heap buffer overflow in 5.1.2 (gif2rgb). (CVE-2016-3977 bsc#974847) * The horrible old autoconf build system has been removed with extreme prejudice. You now build this simply by running 'make' from the top-level directory.
    The following non-security bugs were fixed:
    • build path independent objects and inherit CFLAGS from the build system (bsc#1184123)


    Advisory IDSUSE-SU-2022:1617-1
    ReleasedTue May 10 14:40:12 2022
    SummarySecurity update for gzip
    Typesecurity
    Severityimportant
    References1198062,1198922,CVE-2022-1271
    Description:

    This update for gzip fixes the following issues:

    • CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)


    Advisory IDSUSE-RU-2022:1655-1
    ReleasedFri May 13 15:36:10 2022
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References1197794
    Description:

    This update for pam fixes the following issue:

    • Do not include obsolete header files (bsc#1197794)


    Advisory IDSUSE-RU-2022:1658-1
    ReleasedFri May 13 15:40:20 2022
    SummaryRecommended update for libpsl
    Typerecommended
    Severityimportant
    References1197771
    Description:

    This update for libpsl fixes the following issues:

    • Fix libpsl compilation issues (bsc#1197771)


    Advisory IDSUSE-RU-2022:1660-1
    ReleasedFri May 13 15:42:21 2022
    SummaryRecommended update for publicsuffix
    Typerecommended
    Severitylow
    References1198068
    Description:

    This update for publicsuffix fixes the following issue:

    • Update to version 20220405 (bsc#1198068)


    Advisory IDSUSE-SU-2022:1670-1
    ReleasedMon May 16 10:06:30 2022
    SummarySecurity update for openldap2
    Typesecurity
    Severityimportant
    References1199240,CVE-2022-29155
    Description:

    This update for openldap2 fixes the following issues:

    • CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).


    Advisory IDSUSE-RU-2022:1709-1
    ReleasedTue May 17 17:35:47 2022
    SummaryRecommended update for libcbor
    Typerecommended
    Severityimportant
    References1197743
    Description:

    This update for libcbor fixes the following issues:

    • Fix build errors occuring on SUSE Linux Enterprise 15 Service Pack 4


    Advisory IDSUSE-SU-2022:1718-1
    ReleasedTue May 17 17:44:43 2022
    SummarySecurity update for e2fsprogs
    Typesecurity
    Severityimportant
    References1198446,CVE-2022-1304
    Description:

    This update for e2fsprogs fixes the following issues:

    • CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault and possibly arbitrary code execution. (bsc#1198446)


    Advisory IDSUSE-RU-2022:1887-1
    ReleasedTue May 31 09:24:18 2022
    SummaryRecommended update for grep
    Typerecommended
    Severitymoderate
    References1040589
    Description:

    This update for grep fixes the following issues:

    • Make profiling deterministic. (bsc#1040589, SLE-24115)


    Advisory IDSUSE-RU-2022:1899-1
    ReleasedWed Jun 1 10:43:22 2022
    SummaryRecommended update for libtirpc
    Typerecommended
    Severityimportant
    References1198176
    Description:

    This update for libtirpc fixes the following issues:

    • Add a check for nullpointer in check_address to prevent client from crashing (bsc#1198176)


    Advisory IDSUSE-RU-2022:1909-1
    ReleasedWed Jun 1 16:25:35 2022
    SummaryRecommended update for glibc
    Typerecommended
    Severitymoderate
    References1198751
    Description:

    This update for glibc fixes the following issues:

    • Add the correct name for the IBM Z16 (bsc#1198751).


    Advisory IDSUSE-RU-2022:2019-1
    ReleasedWed Jun 8 16:50:07 2022
    SummaryRecommended update for gcc11
    Typerecommended
    Severitymoderate
    References1192951,1193659,1195283,1196861,1197065
    Description:

    This update for gcc11 fixes the following issues:
    Update to the GCC 11.3.0 release.

    • includes SLS hardening backport on x86_64. [bsc#1195283]
    • includes change to adjust gnats idea of the target, fixing the build of gprbuild. [bsc#1196861]
    • fixed miscompile of embedded premake in 0ad on i586. [bsc#1197065]
    • use --with-cpu rather than specifying --with-arch/--with-tune
    • Fix D memory corruption in -M output.
    • Fix ICE in is_this_parameter with coroutines. [bsc#1193659]
    • fixes issue with debug dumping together with -o /dev/null
    • fixes libgccjit issue showing up in emacs build [bsc#1192951]
    • Package mwaitintrin.h


    Advisory IDSUSE-SU-2022:2294-1
    ReleasedWed Jul 6 13:34:15 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1196025,1196026,1196168,1196169,1196171,1196784,CVE-2022-25235,CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315
    Description:

    This update for expat fixes the following issues:

    • CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
    • Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
    • CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
    • CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
    • CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
    • CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).


    Advisory IDSUSE-SU-2022:2305-1
    ReleasedWed Jul 6 13:38:42 2022
    SummarySecurity update for curl
    Typesecurity
    Severityimportant
    References1200734,1200735,1200736,1200737,CVE-2022-32205,CVE-2022-32206,CVE-2022-32207,CVE-2022-32208
    Description:

    This update for curl fixes the following issues:

    • CVE-2022-32205: Set-Cookie denial of service (bsc#1200734)
    • CVE-2022-32206: HTTP compression denial of service (bsc#1200735)
    • CVE-2022-32207: Unpreserved file permissions (bsc#1200736)
    • CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)


    Advisory IDSUSE-SU-2022:2360-1
    ReleasedTue Jul 12 12:01:39 2022
    SummarySecurity update for pcre2
    Typesecurity
    Severityimportant
    References1199232,CVE-2022-1586
    Description:

    This update for pcre2 fixes the following issues:

    • CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)


    Advisory IDSUSE-SU-2022:2361-1
    ReleasedTue Jul 12 12:05:01 2022
    SummarySecurity update for pcre
    Typesecurity
    Severityimportant
    References1199232,CVE-2022-1586
    Description:

    This update for pcre fixes the following issues:

    • CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)


    Advisory IDSUSE-RU-2022:2406-1
    ReleasedFri Jul 15 11:49:01 2022
    SummaryRecommended update for glibc
    Typerecommended
    Severitymoderate
    References1197718,1199140,1200334,1200855
    Description:

    This update for glibc fixes the following issues:

    • powerpc: Fix VSX register number on __strncpy_power9 (bsc#1200334)
    • Disable warnings due to deprecated libselinux symbols used by nss and nscd (bsc#1197718)
    • i386: Remove broken CAN_USE_REGISTER_ASM_EBP (bsc#1197718)
    • rtld: Avoid using up static TLS surplus for optimizations (bsc#1200855, BZ #25051)

    This readds the s390 32bit glibc and libcrypt1 libraries (glibc-32bit, glibc-locale-base-32bit, libcrypt1-32bit).


    Advisory IDSUSE-RU-2022:2469-1
    ReleasedThu Jul 21 04:38:31 2022
    SummaryRecommended update for systemd
    Typerecommended
    Severityimportant
    References1137373,1181658,1194708,1195157,1197570,1198732,1200170,1201276
    Description:

    This update for systemd fixes the following issues:

    • Make {/etc,/usr/lib}/systemd/network owned by both udev and systemd-network. The configuration files put in these directories are read by both udevd and systemd-networkd (bsc#1201276)
    • Allow control characters in environment variable values (bsc#1200170)
    • Fix issues with multipath setup (bsc#1137373, bsc#1181658, bsc#1194708, bsc#1195157, bsc#1197570)
    • Fix parsing error in s390 udev rules conversion script (bsc#1198732)
    • core/device: device_coldplug(): don't set DEVICE_DEAD
    • core/device: do not downgrade device state if it is already enumerated
    • core/device: drop unnecessary condition


    Advisory IDSUSE-RU-2022:2493-1
    ReleasedThu Jul 21 14:35:08 2022
    SummaryRecommended update for rpm-config-SUSE
    Typerecommended
    Severitymoderate
    References1193282
    Description:

    This update for rpm-config-SUSE fixes the following issues:

    • Add SBAT values macros for other packages (bsc#1193282)


    Advisory IDSUSE-RU-2022:2494-1
    ReleasedThu Jul 21 15:16:42 2022
    SummaryRecommended update for glibc
    Typerecommended
    Severityimportant
    References1200855,1201560,1201640
    Description:

    This update for glibc fixes the following issues:

    • Remove tunables from static tls surplus patch which caused crashes (bsc#1200855)
    • i386: Disable check_consistency for GCC 5 and above (bsc#1201640, BZ #25788)


    Advisory IDSUSE-SU-2022:2533-1
    ReleasedFri Jul 22 17:37:15 2022
    SummarySecurity update for mozilla-nss
    Typesecurity
    Severityimportant
    References1192079,1192080,1192086,1192087,1192228,1198486,1200027,CVE-2022-31741
    Description:

    This update for mozilla-nss fixes the following issues:
    Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4:

    • Makes the PBKDF known answer test compliant with NIST SP800-132. (bsc#1192079).
    • FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck() (bsc#1198980).
    • FIPS: mark algorithms as approved/non-approved according to security policy (bsc#1191546, bsc#1201298).
    • FIPS: remove hard disabling of unapproved algorithms. This requirement is now fulfilled by the service level indicator (bsc#1200325).
    • Run test suite at build time, and make it pass (bsc#1198486).
    • FIPS: skip algorithms that are hard disabled in FIPS mode.
    • Prevent expired PayPalEE cert from failing the tests.
    • Allow checksumming to be disabled, but only if we entered FIPS mode due to NSS_FIPS being set, not if it came from /proc.
    • FIPS: Make the PBKDF known answer test compliant with NIST SP800-132.
    • Update FIPS validation string to version-release format.
    • FIPS: remove XCBC MAC from list of FIPS approved algorithms.
    • Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID for build.
    • FIPS: claim 3DES unapproved in FIPS mode (bsc#1192080).
    • FIPS: allow testing of unapproved algorithms (bsc#1192228).
    • FIPS: add version indicators. (bmo#1729550, bsc#1192086).
    • FIPS: fix some secret clearing (bmo#1697303, bsc#1192087).

    Version update to NSS 3.79:
    • Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
    • Update mercurial in clang-format docker image.
    • Use of uninitialized pointer in lg_init after alloc fail.
    • selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
    • Add SECMOD_LockedModuleHasRemovableSlots.
    • Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
    • Added RFC8422 compliant TLS <= 1.2 undefined/compressed ECPointFormat extension alerts.
    • TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
    • Correct invalid record inner and outer content type alerts.
    • NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
    • improve error handling after nssCKFWInstance_CreateObjectHandle.
    • Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
    • NSS 3.79 should depend on NSPR 4.34

    Version update to NSS 3.78.1:
    • Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

    Version update to NSS 3.78:
    • Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
    • Reworked overlong record size checks and added TLS1.3 specific boundaries.
    • Add ECH Grease Support to tstclnt
    • Add a strict variant of moz::pkix::CheckCertHostname.
    • Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
    • Make SEC_PKCS12EnableCipher succeed
    • Update zlib in NSS to 1.2.12.

    Version update to NSS 3.77:
    • Fix link to TLS page on wireshark wiki
    • Add two D-TRUST 2020 root certificates.
    • Add Telia Root CA v2 root certificate.
    • Remove expired explicitly distrusted certificates from certdata.txt.
    • support specific RSA-PSS parameters in mozilla::pkix
    • Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
    • Remove token member from NSSSlot struct.
    • Provide secure variants of mpp_pprime and mpp_make_prime.
    • Support UTF-8 library path in the module spec string.
    • Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
    • Update googletest to 1.11.0
    • Add SetTls13GreaseEchSize to experimental API.
    • TLS 1.3 Illegal legacy_version handling/alerts.
    • Fix calculation of ECH HRR Transcript.
    • Allow ld path to be set as environment variable.
    • Ensure we don't read uninitialized memory in ssl gtests.
    • Fix DataBuffer Move Assignment.
    • internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
    • rework signature verification in mozilla::pkix

    Version update to NSS 3.76.1
    • Remove token member from NSSSlot struct.
    • Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
    • Check return value of PK11Slot_GetNSSToken.
    • Use Wycheproof JSON for RSASSA-PSS
    • Add SHA256 fingerprint comments to old certdata.txt entries.
    • Avoid truncating files in nss-release-helper.py.
    • Throw illegal_parameter alert for illegal extensions in handshake message.

    Version update to NSS 3.75
    • Make DottedOIDToCode.py compatible with python3.
    • Avoid undefined shift in SSL_CERT_IS while fuzzing.
    • Remove redundant key type check.
    • Update ABI expectations to match ECH changes.
    • Enable CKM_CHACHA20.
    • check return on NSS_NoDB_Init and NSS_Shutdown.
    • Run ECDSA test vectors from bltest as part of the CI tests.
    • Add ECDSA test vectors to the bltest command line tool.
    • Allow to build using clang's integrated assembler.
    • Allow to override python for the build.
    • test HKDF output rather than input.
    • Use ASSERT macros to end failed tests early.
    • move assignment operator for DataBuffer.
    • Add test cases for ECH compression and unexpected extensions in SH.
    • Update tests for ECH-13.
    • Tidy up error handling.
    • Add tests for ECH HRR Changes.
    • Server only sends GREASE HRR extension if enabled by preference.
    • Update generation of the Associated Data for ECH-13.
    • When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
    • Allow for compressed, non-contiguous, extensions.
    • Scramble the PSK extension in CHOuter.
    • Split custom extension handling for ECH.
    • Add ECH-13 HRR Handling.
    • Client side ECH padding.
    • Stricter ClientHelloInner Decompression.
    • Remove ECH_inner extension, use new enum format.
    • Update the version number for ECH-13 and adjust the ECHConfig size.

    Version update to NSS 3.74
    • mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
    • Ensure clients offer consistent ciphersuites after HRR
    • NSS does not properly restrict server keys based on policy
    • Set nssckbi version number to 2.54
    • Replace Google Trust Services LLC (GTS) R4 root certificate
    • Replace Google Trust Services LLC (GTS) R3 root certificate
    • Replace Google Trust Services LLC (GTS) R2 root certificate
    • Replace Google Trust Services LLC (GTS) R1 root certificate
    • Replace GlobalSign ECC Root CA R4
    • Remove Expired Root Certificates - DST Root CA X3
    • Remove Expiring Cybertrust Global Root and GlobalSign root certificates
    • Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
    • Add iTrusChina ECC root certificate
    • Add iTrusChina RSA root certificate
    • Add ISRG Root X2 root certificate
    • Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
    • Avoid a clang 13 unused variable warning in opt build
    • Check for missing signedData field
    • Ensure DER encoded signatures are within size limits

    • enable key logging option (boo#1195040)

    Version update to NSS 3.73.1:
    • Add SHA-2 support to mozilla::pkix's OSCP implementation

    Version update to NSS 3.73
    • check for missing signedData field.
    • Ensure DER encoded signatures are within size limits.
    • NSS needs FiPS 140-3 version indicators.
    • pkix_CacheCert_Lookup doesn't return cached certs
    • sunset Coverity from NSS

    Fixed MFSA 2021-51 (bsc#1193170) CVE-2021-43527: Memory corruption via DER-encoded DSA and RSA-PSS signatures
    Version update to NSS 3.72
    • Fix nsinstall parallel failure.
    • Increase KDF cache size to mitigate perf regression in about:logins

    Version update to NSS 3.71
    • Set nssckbi version number to 2.52.
    • Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
    • Import of PKCS#12 files with Camellia encryption is not supported
    • Add HARICA Client ECC Root CA 2021.
    • Add HARICA Client RSA Root CA 2021.
    • Add HARICA TLS ECC Root CA 2021.
    • Add HARICA TLS RSA Root CA 2021.
    • Add TunTrust Root CA certificate to NSS.

    Version update to NSS 3.70
    • Update test case to verify fix.
    • Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
    • Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
    • Avoid using a lookup table in nssb64d.
    • Use HW accelerated SHA2 on AArch64 Big Endian.
    • Change default value of enableHelloDowngradeCheck to true.
    • Cache additional PBE entries.
    • Read HPKE vectors from official JSON.

    Version update to NSS 3.69.1:
    • Disable DTLS 1.0 and 1.1 by default
    • integrity checks in key4.db not happening on private components with AES_CBC

    NSS 3.69:
    • Disable DTLS 1.0 and 1.1 by default (backed out again)
    • integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
    • SSL handling of signature algorithms ignores environmental invalid algorithms.
    • sqlite 3.34 changed it's open semantics, causing nss failures.
    • Gtest update changed the gtest reports, losing gtest details in all.sh reports.
    • NSS incorrectly accepting 1536 bit DH primes in FIPS mode
    • SQLite calls could timeout in starvation situations.
    • Coverity/cpp scanner errors found in nss 3.67
    • Import the NSS documentation from MDN in nss/doc.
    • NSS using a tempdir to measure sql performance not active

    Version Update to 3.68.4 (bsc#1200027)
    • CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple. (bmo#1767590)


    Mozilla NSPR was updated to version 4.34:
    • add an API that returns a preferred loopback IP on hosts that have two IP stacks available.


    Advisory IDSUSE-SU-2022:2550-1
    ReleasedTue Jul 26 14:00:21 2022
    SummarySecurity update for git
    Typesecurity
    Severityimportant
    References1201431,CVE-2022-29187
    Description:

    This update for git fixes the following issues:

    • CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).


    Advisory IDSUSE-SU-2022:2566-1
    ReleasedWed Jul 27 15:04:49 2022
    SummarySecurity update for pcre2
    Typesecurity
    Severityimportant
    References1199235,CVE-2022-1587
    Description:

    This update for pcre2 fixes the following issues:

    • CVE-2022-1587: Fixed out-of-bounds read due to bug in recursions (bsc#1199235).


    Advisory IDSUSE-SU-2022:2595-1
    ReleasedFri Jul 29 16:00:42 2022
    SummarySecurity update for mozilla-nss
    Typesecurity
    Severityimportant
    References1192079,1192080,1192086,1192087,1192228,1198486,1200027,CVE-2022-31741
    Description:

    This update for mozilla-nss fixes the following issues:
    Various FIPS 140-3 related fixes were backported from SUSE Linux Enterprise 15 SP4:

    • Makes the PBKDF known answer test compliant with NIST SP800-132. (bsc#1192079).
    • FIPS: Add on-demand integrity tests through sftk_FIPSRepeatIntegrityCheck() (bsc#1198980).
    • FIPS: mark algorithms as approved/non-approved according to security policy (bsc#1191546, bsc#1201298).
    • FIPS: remove hard disabling of unapproved algorithms. This requirement is now fulfilled by the service level indicator (bsc#1200325).
    • Run test suite at build time, and make it pass (bsc#1198486).
    • FIPS: skip algorithms that are hard disabled in FIPS mode.
    • Prevent expired PayPalEE cert from failing the tests.
    • Allow checksumming to be disabled, but only if we entered FIPS mode due to NSS_FIPS being set, not if it came from /proc.
    • FIPS: Make the PBKDF known answer test compliant with NIST SP800-132.
    • Update FIPS validation string to version-release format.
    • FIPS: remove XCBC MAC from list of FIPS approved algorithms.
    • Enable NSS_ENABLE_FIPS_INDICATORS and set NSS_FIPS_MODULE_ID for build.
    • FIPS: claim 3DES unapproved in FIPS mode (bsc#1192080).
    • FIPS: allow testing of unapproved algorithms (bsc#1192228).
    • FIPS: add version indicators. (bmo#1729550, bsc#1192086).
    • FIPS: fix some secret clearing (bmo#1697303, bsc#1192087).

    Version update to NSS 3.79:
    • Use PK11_GetSlotInfo instead of raw C_GetSlotInfo calls.
    • Update mercurial in clang-format docker image.
    • Use of uninitialized pointer in lg_init after alloc fail.
    • selfserv and tstclnt should use PR_GetPrefLoopbackAddrInfo.
    • Add SECMOD_LockedModuleHasRemovableSlots.
    • Fix secasn1d parsing of indefinite SEQUENCE inside indefinite GROUP.
    • Added RFC8422 compliant TLS <= 1.2 undefined/compressed ECPointFormat extension alerts.
    • TLS 1.3 Server: Send protocol_version alert on unsupported ClientHello.legacy_version.
    • Correct invalid record inner and outer content type alerts.
    • NSS does not properly import or export pkcs12 files with large passwords and pkcs5v2 encoding.
    • improve error handling after nssCKFWInstance_CreateObjectHandle.
    • Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple.
    • NSS 3.79 should depend on NSPR 4.34

    Version update to NSS 3.78.1:
    • Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple

    Version update to NSS 3.78:
    • Added TLS 1.3 zero-length inner plaintext checks and tests, zero-length record/fragment handling tests.
    • Reworked overlong record size checks and added TLS1.3 specific boundaries.
    • Add ECH Grease Support to tstclnt
    • Add a strict variant of moz::pkix::CheckCertHostname.
    • Change SSL_REUSE_SERVER_ECDHE_KEY default to false.
    • Make SEC_PKCS12EnableCipher succeed
    • Update zlib in NSS to 1.2.12.

    Version update to NSS 3.77:
    • Fix link to TLS page on wireshark wiki
    • Add two D-TRUST 2020 root certificates.
    • Add Telia Root CA v2 root certificate.
    • Remove expired explicitly distrusted certificates from certdata.txt.
    • support specific RSA-PSS parameters in mozilla::pkix
    • Remove obsolete stateEnd check in SEC_ASN1DecoderUpdate.
    • Remove token member from NSSSlot struct.
    • Provide secure variants of mpp_pprime and mpp_make_prime.
    • Support UTF-8 library path in the module spec string.
    • Update nssUTF8_Length to RFC 3629 and fix buffer overrun.
    • Update googletest to 1.11.0
    • Add SetTls13GreaseEchSize to experimental API.
    • TLS 1.3 Illegal legacy_version handling/alerts.
    • Fix calculation of ECH HRR Transcript.
    • Allow ld path to be set as environment variable.
    • Ensure we don't read uninitialized memory in ssl gtests.
    • Fix DataBuffer Move Assignment.
    • internal_error alert on Certificate Request with sha1+ecdsa in TLS 1.3
    • rework signature verification in mozilla::pkix

    Version update to NSS 3.76.1
    • Remove token member from NSSSlot struct.
    • Hold tokensLock through nssToken_GetSlot calls in nssTrustDomain_GetActiveSlots.
    • Check return value of PK11Slot_GetNSSToken.
    • Use Wycheproof JSON for RSASSA-PSS
    • Add SHA256 fingerprint comments to old certdata.txt entries.
    • Avoid truncating files in nss-release-helper.py.
    • Throw illegal_parameter alert for illegal extensions in handshake message.

    Version update to NSS 3.75
    • Make DottedOIDToCode.py compatible with python3.
    • Avoid undefined shift in SSL_CERT_IS while fuzzing.
    • Remove redundant key type check.
    • Update ABI expectations to match ECH changes.
    • Enable CKM_CHACHA20.
    • check return on NSS_NoDB_Init and NSS_Shutdown.
    • Run ECDSA test vectors from bltest as part of the CI tests.
    • Add ECDSA test vectors to the bltest command line tool.
    • Allow to build using clang's integrated assembler.
    • Allow to override python for the build.
    • test HKDF output rather than input.
    • Use ASSERT macros to end failed tests early.
    • move assignment operator for DataBuffer.
    • Add test cases for ECH compression and unexpected extensions in SH.
    • Update tests for ECH-13.
    • Tidy up error handling.
    • Add tests for ECH HRR Changes.
    • Server only sends GREASE HRR extension if enabled by preference.
    • Update generation of the Associated Data for ECH-13.
    • When ECH is accepted, reject extensions which were only advertised in the Outer Client Hello.
    • Allow for compressed, non-contiguous, extensions.
    • Scramble the PSK extension in CHOuter.
    • Split custom extension handling for ECH.
    • Add ECH-13 HRR Handling.
    • Client side ECH padding.
    • Stricter ClientHelloInner Decompression.
    • Remove ECH_inner extension, use new enum format.
    • Update the version number for ECH-13 and adjust the ECHConfig size.

    Version update to NSS 3.74
    • mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses
    • Ensure clients offer consistent ciphersuites after HRR
    • NSS does not properly restrict server keys based on policy
    • Set nssckbi version number to 2.54
    • Replace Google Trust Services LLC (GTS) R4 root certificate
    • Replace Google Trust Services LLC (GTS) R3 root certificate
    • Replace Google Trust Services LLC (GTS) R2 root certificate
    • Replace Google Trust Services LLC (GTS) R1 root certificate
    • Replace GlobalSign ECC Root CA R4
    • Remove Expired Root Certificates - DST Root CA X3
    • Remove Expiring Cybertrust Global Root and GlobalSign root certificates
    • Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate
    • Add iTrusChina ECC root certificate
    • Add iTrusChina RSA root certificate
    • Add ISRG Root X2 root certificate
    • Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate
    • Avoid a clang 13 unused variable warning in opt build
    • Check for missing signedData field
    • Ensure DER encoded signatures are within size limits

    • enable key logging option (boo#1195040)

    Version update to NSS 3.73.1:
    • Add SHA-2 support to mozilla::pkix's OSCP implementation

    Version update to NSS 3.73
    • check for missing signedData field.
    • Ensure DER encoded signatures are within size limits.
    • NSS needs FiPS 140-3 version indicators.
    • pkix_CacheCert_Lookup doesn't return cached certs
    • sunset Coverity from NSS

    Fixed MFSA 2021-51 (bsc#1193170) CVE-2021-43527: Memory corruption via DER-encoded DSA and RSA-PSS signatures
    Version update to NSS 3.72
    • Fix nsinstall parallel failure.
    • Increase KDF cache size to mitigate perf regression in about:logins

    Version update to NSS 3.71
    • Set nssckbi version number to 2.52.
    • Respect server requirements of tlsfuzzer/test-tls13-signature-algorithms.py
    • Import of PKCS#12 files with Camellia encryption is not supported
    • Add HARICA Client ECC Root CA 2021.
    • Add HARICA Client RSA Root CA 2021.
    • Add HARICA TLS ECC Root CA 2021.
    • Add HARICA TLS RSA Root CA 2021.
    • Add TunTrust Root CA certificate to NSS.

    Version update to NSS 3.70
    • Update test case to verify fix.
    • Explicitly disable downgrade check in TlsConnectStreamTls13.EchOuterWith12Max
    • Explicitly disable downgrade check in TlsConnectTest.DisableFalseStartOnFallback
    • Avoid using a lookup table in nssb64d.
    • Use HW accelerated SHA2 on AArch64 Big Endian.
    • Change default value of enableHelloDowngradeCheck to true.
    • Cache additional PBE entries.
    • Read HPKE vectors from official JSON.

    Version update to NSS 3.69.1:
    • Disable DTLS 1.0 and 1.1 by default
    • integrity checks in key4.db not happening on private components with AES_CBC

    NSS 3.69:
    • Disable DTLS 1.0 and 1.1 by default (backed out again)
    • integrity checks in key4.db not happening on private components with AES_CBC (backed out again)
    • SSL handling of signature algorithms ignores environmental invalid algorithms.
    • sqlite 3.34 changed it's open semantics, causing nss failures.
    • Gtest update changed the gtest reports, losing gtest details in all.sh reports.
    • NSS incorrectly accepting 1536 bit DH primes in FIPS mode
    • SQLite calls could timeout in starvation situations.
    • Coverity/cpp scanner errors found in nss 3.67
    • Import the NSS documentation from MDN in nss/doc.
    • NSS using a tempdir to measure sql performance not active

    Version Update to 3.68.4 (bsc#1200027)
    • CVE-2022-31741: Initialize pointers passed to NSS_CMSDigestContext_FinishMultiple. (bmo#1767590)


    Advisory IDSUSE-SU-2022:2632-1
    ReleasedWed Aug 3 09:51:00 2022
    SummarySecurity update for permissions
    Typesecurity
    Severityimportant
    References1198720,1200747,1201385
    Description:

    This update for permissions fixes the following issues:

    • apptainer: fix starter-suid location (bsc#1198720)
    • static permissions: remove deprecated bind / named chroot entries (bsc#1200747)
    • postfix: add postlog setgid for maildrop binary (bsc#1201385)


    Advisory IDSUSE-SU-2022:2664-1
    ReleasedThu Aug 4 09:22:06 2022
    SummarySecurity update for harfbuzz
    Typesecurity
    Severityimportant
    References1200900,CVE-2022-33068
    Description:

    This update for harfbuzz fixes the following issues:

    • CVE-2022-33068: Fixed a integer overflow in hb-ot-shape-fallback.cc (bsc#1200900).


    Advisory IDSUSE-SU-2022:2707-1
    ReleasedTue Aug 9 10:18:18 2022
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1201684,1201692,1201694,CVE-2022-21540,CVE-2022-21541,CVE-2022-34169
    Description:

    This update for java-11-openjdk fixes the following issues:
    Update to upstream tag jdk-11.0.16+8 (July 2022 CPU)

    • CVE-2022-21540: Improve class compilation (bsc#1201694)
    • CVE-2022-21541: Enhance MethodHandle invocations (bsc#1201692)
    • CVE-2022-34169: Improve Xalan supports (bsc#1201684)


    Advisory IDSUSE-SU-2022:2717-1
    ReleasedTue Aug 9 12:54:16 2022
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1198627,CVE-2022-29458
    Description:

    This update for ncurses fixes the following issues:

    • CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).


    Advisory IDSUSE-RU-2022:2735-1
    ReleasedWed Aug 10 04:31:41 2022
    SummaryRecommended update for tar
    Typerecommended
    Severitymoderate
    References1200657
    Description:

    This update for tar fixes the following issues:

    • Fix race condition while creating intermediate subdirectories (bsc#1200657)


    Advisory IDSUSE-RU-2022:2796-1
    ReleasedFri Aug 12 14:34:31 2022
    SummaryRecommended update for jitterentropy
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for jitterentropy fixes the following issues:
    jitterentropy is included in version 3.4.0 (jsc#SLE-24941):
    This is a FIPS 140-3 / NIST 800-90b compliant userspace jitter entropy generator library, used by other FIPS libraries.


    Advisory IDSUSE-RU-2022:2844-1
    ReleasedThu Aug 18 14:41:25 2022
    SummaryRecommended update for tar
    Typerecommended
    Severityimportant
    References1202436
    Description:

    This update for tar fixes the following issues:

    • A regression in a previous update lead to potential deadlocks when extracting an archive. (bsc#1202436)


    Advisory IDSUSE-RU-2022:2901-1
    ReleasedFri Aug 26 03:34:23 2022
    SummaryRecommended update for elfutils
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for elfutils fixes the following issues:

    • Fix runtime dependency for devel package


    Advisory IDSUSE-RU-2022:2904-1
    ReleasedFri Aug 26 05:28:34 2022
    SummaryRecommended update for openldap2
    Typerecommended
    Severitymoderate
    References1198341
    Description:

    This update for openldap2 fixes the following issues:

    • Prevent memory reuse which may lead to instability (bsc#1198341)


    Advisory IDSUSE-RU-2022:2920-1
    ReleasedFri Aug 26 15:17:02 2022
    SummaryRecommended update for systemd
    Typerecommended
    Severityimportant
    References1195059,1201795
    Description:

    This update for systemd fixes the following issues:

    • Don't replace /etc/systemd/system/tmp.mount symlink with a dangling one pointing to /usr/lib/systemd/ (bsc#1201795)
    • Drop or soften some of the deprecation warnings (jsc#PED-944)
    • Ensure root user can login even if systemd-user-sessions.service is not activated yet (bsc#1195059)
    • Avoid applying presets to any services shipped by the experimental sub-package, as they aren't enabled by default
    • analyze: Fix offline check for syscal filter
    • calendarspec: Fix timer skipping the next elapse
    • core: Allow command argument to be longer
    • hwdb: Add AV production controllers to hwdb and add uaccess
    • hwdb: Allow console users access to rfkill
    • hwdb: Allow end-users root-less access to TL866 EPROM readers
    • hwdb: Permit unsetting power/persist for USB devices
    • hwdb: Tag IR cameras as such
    • hwdb: Fix parsing issue
    • hwdb: Make usb match patterns uppercase
    • hwdb: Update the hardware database
    • journal-file: Stop using the event loop if it's already shutting down
    • journal-remote: Disable `--trust` option when gnutls is disabled and check_permission() should not be called
    • journald: Ensure resources are properly allocated for SIGTERM handling
    • kernel-install: Ensure modules.builtin.alias.bin is removed when no longer needed
    • macro: Account for negative values in DECIMAL_STR_WIDTH()
    • manager: Disallow clone3() function call in seccomp filters
    • missing-syscall: Define MOVE_MOUNT_T_EMPTY_PATH if missing
    • pid1,cgroup-show: Prevent failure if cgroup.procs in some subcgroups is not readable
    • resolve: Fix typo in dns_class_is_pseudo()
    • sd-event: Improve handling of process events and termination of processes
    • sd-ipv4acd: Fix ARP packet conflicts occurring when sender hardware is one of the host's interfaces
    • stdio-bridge: Improve the meaning of the error message
    • tmpfiles: Check for the correct directory


    Advisory IDSUSE-RU-2022:2929-1
    ReleasedMon Aug 29 11:21:47 2022
    SummaryRecommended update for timezone
    Typerecommended
    Severityimportant
    References1202310
    Description:

    This update for timezone fixes the following issue:

    • Reflect new Chile DST change (bsc#1202310)


    Advisory IDSUSE-RU-2022:2939-1
    ReleasedMon Aug 29 14:49:17 2022
    SummaryRecommended update for mozilla-nss
    Typerecommended
    Severitymoderate
    References1201298,1202645
    Description:

    This update for mozilla-nss fixes the following issues:
    Update to NSS 3.79.1 (bsc#1202645)

    • compare signature and signatureAlgorithm fields in legacy certificate verifier.
    • Uninitialized value in cert_ComputeCertType.
    • protect SFTKSlot needLogin with slotLock.
    • avoid data race on primary password change.
    • check for null template in sec_asn1{d,e}_push_state.

    • FIPS: unapprove the rest of the DSA ciphers, keeping signature verification only (bsc#1201298).


    Advisory IDSUSE-RU-2022:2994-1
    ReleasedFri Sep 2 10:44:54 2022
    SummaryRecommended update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame
    Typerecommended
    Severitymoderate
    References1198925
    Description:


    This update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame adds some missing 32bit libraries to some products. (bsc#1198925)
    No codechanges were done in this update.


    Advisory IDSUSE-SU-2022:3003-1
    ReleasedFri Sep 2 15:01:44 2022
    SummarySecurity update for curl
    Typesecurity
    Severitylow
    References1202593,CVE-2022-35252
    Description:

    This update for curl fixes the following issues:

    • CVE-2022-35252: Fixed a potential injection of control characters into cookies, which could be exploited by sister sites to cause a denial of service (bsc#1202593).


    Advisory IDSUSE-RU-2022:3127-1
    ReleasedWed Sep 7 04:36:10 2022
    SummaryRecommended update for libtirpc
    Typerecommended
    Severitymoderate
    References1198752,1200800
    Description:

    This update for libtirpc fixes the following issues:

    • Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
    • Fix memory leak in params.r_addr assignement (bsc#1198752)


    Advisory IDSUSE-RU-2022:3215-1
    ReleasedThu Sep 8 15:58:27 2022
    SummaryRecommended update for rpm
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for rpm fixes the following issues:

    • Support Ed25519 RPM signatures [jsc#SLE-24714]


    Advisory IDSUSE-SU-2022:3252-1
    ReleasedMon Sep 12 09:07:53 2022
    SummarySecurity update for freetype2
    Typesecurity
    Severitymoderate
    References1198823,1198830,1198832,CVE-2022-27404,CVE-2022-27405,CVE-2022-27406
    Description:

    This update for freetype2 fixes the following issues:

    • CVE-2022-27404 Fixed a segmentation fault via a crafted typeface (bsc#1198830).
    • CVE-2022-27405 Fixed a buffer overflow via a crafted typeface (bsc#1198832).
    • CVE-2022-27406 Fixed a segmentation fault via a crafted typeface (bsc#1198823).

    Non-security fixes:
    • Updated to version 2.10.4


    Advisory IDSUSE-RU-2022:3262-1
    ReleasedTue Sep 13 15:34:29 2022
    SummaryRecommended update for gcc11
    Typerecommended
    Severitymoderate
    References1199140
    Description:


    This update for gcc11 ships some missing 32bit libraries for s390x. (bsc#1199140)


    Advisory IDSUSE-SU-2022:3271-1
    ReleasedWed Sep 14 06:45:39 2022
    SummarySecurity update for perl
    Typesecurity
    Severitymoderate
    References1047178,CVE-2017-6512
    Description:

    This update for perl fixes the following issues:

    • CVE-2017-6512: Fixed File::Path rmtree/remove_tree race condition (bsc#1047178).


    Advisory IDSUSE-SU-2022:3305-1
    ReleasedMon Sep 19 11:45:57 2022
    SummarySecurity update for libtirpc
    Typesecurity
    Severityimportant
    References1201680,CVE-2021-46828
    Description:

    This update for libtirpc fixes the following issues:

    • CVE-2021-46828: Fixed denial of service vulnerability with lots of connections (bsc#1201680).


    Advisory IDSUSE-SU-2022:3307-1
    ReleasedMon Sep 19 13:26:51 2022
    SummarySecurity update for sqlite3
    Typesecurity
    Severitymoderate
    References1189802,1195773,1201783,CVE-2021-36690,CVE-2022-35737
    Description:

    This update for sqlite3 fixes the following issues:

    • CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
    • CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
    • Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).


    Advisory IDSUSE-RU-2022:3328-1
    ReleasedWed Sep 21 12:48:56 2022
    SummaryRecommended update for jitterentropy
    Typerecommended
    Severitymoderate
    References1202870
    Description:

    This update for jitterentropy fixes the following issues:

    • Hide the non-GNUC constructs that are library internal from the exported header, to make it usable in builds with strict C99 compliance. (bsc#1202870)


    Advisory IDSUSE-SU-2022:3353-1
    ReleasedFri Sep 23 15:23:40 2022
    SummarySecurity update for permissions
    Typesecurity
    Severitymoderate
    References1203018,CVE-2022-31252
    Description:

    This update for permissions fixes the following issues:

    • CVE-2022-31252: Fixed chkstat group controlled paths (bsc#1203018).


    Advisory IDSUSE-RU-2022:3452-1
    ReleasedWed Sep 28 12:13:43 2022
    SummaryRecommended update for glibc
    Typerecommended
    Severitymoderate
    References1201942
    Description:

    This update for glibc fixes the following issues:

    • Reversing calculation of __x86_shared_non_temporal_threshold (bsc#1201942)
    • powerpc: Optimized memcmp for power10 (jsc#PED-987)


    Advisory IDSUSE-SU-2022:3489-1
    ReleasedSat Oct 1 13:35:24 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1203438,CVE-2022-40674
    Description:

    This update for expat fixes the following issues:

    • CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).


    Advisory IDSUSE-RU-2022:3555-1
    ReleasedMon Oct 10 14:05:12 2022
    SummaryRecommended update for aaa_base
    Typerecommended
    Severityimportant
    References1199492
    Description:

    This update for aaa_base fixes the following issues:

    • The wrapper rootsh is not a restricted shell. (bsc#1199492)


    Advisory IDSUSE-SU-2022:3784-1
    ReleasedWed Oct 26 18:03:28 2022
    SummarySecurity update for libtasn1
    Typesecurity
    Severitycritical
    References1204690,CVE-2021-46848
    Description:

    This update for libtasn1 fixes the following issues:

    • CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690)


    Advisory IDSUSE-SU-2022:3785-1
    ReleasedWed Oct 26 20:20:19 2022
    SummarySecurity update for curl
    Typesecurity
    Severityimportant
    References1204383,1204386,CVE-2022-32221,CVE-2022-42916
    Description:

    This update for curl fixes the following issues:
    - CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383). - CVE-2022-42916: Fixed HSTS bypass via IDN (bsc#1204386).


    Advisory IDSUSE-RU-2022:3787-1
    ReleasedThu Oct 27 04:41:09 2022
    SummaryRecommended update for permissions
    Typerecommended
    Severityimportant
    References1194047,1203911
    Description:

    This update for permissions fixes the following issues:

    • Fix regression introduced by backport of security fix (bsc#1203911)
    • Add permissions for enlightenment helper on 32bit arches (bsc#1194047)


    Advisory IDSUSE-RU-2022:3873-1
    ReleasedFri Nov 4 14:58:08 2022
    SummaryRecommended update for mozilla-nspr, mozilla-nss
    Typerecommended
    Severitymoderate
    References1191546,1198980,1201298,1202870,1204729
    Description:

    This update for mozilla-nspr, mozilla-nss fixes the following issues:
    mozilla-nspr was updated to version 4.34.1:

    • add file descriptor sanity checks in the NSPR poll function.

    mozilla-nss was updated to NSS 3.79.2 (bsc#1204729):
    • Bump minimum NSPR version to 4.34.1.
    • Gracefully handle null nickname in CERT_GetCertNicknameWithValidity.

    Other fixes that were applied:
    • FIPS: Allow the use of DSA keys (verification only) (bsc#1201298).
    • FIPS: Add sftk_FIPSRepeatIntegrityCheck() to softoken's .def file (bsc#1198980).
    • FIPS: Allow the use of longer symmetric keys via the service level indicator (bsc#1191546).
    • FIPS: Prevent TLS sessions from getting flagged as non-FIPS (bsc#1191546).
    • FIPS: Mark DSA keygen unapproved (bsc#1191546, bsc#1201298).
    • FIPS: Use libjitterentropy for entropy (bsc#1202870).
    • FIPS: Fixed an abort() when both NSS_FIPS and /proc FIPS mode are enabled.


    Advisory IDSUSE-SU-2022:3884-1
    ReleasedMon Nov 7 10:59:26 2022
    SummarySecurity update for expat
    Typesecurity
    Severityimportant
    References1204708,CVE-2022-43680
    Description:

    This update for expat fixes the following issues:
    - CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).


    Advisory IDSUSE-RU-2022:3904-1
    ReleasedTue Nov 8 10:52:13 2022
    SummaryRecommended update for openssh
    Typerecommended
    Severitymoderate
    References1192439
    Description:

    This update for openssh fixes the following issue:

    • Prevent empty messages from being sent. (bsc#1192439)


    Advisory IDSUSE-RU-2022:3910-1
    ReleasedTue Nov 8 13:05:04 2022
    SummaryRecommended update for pam
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for pam fixes the following issue:

    • Update pam_motd to the most current version. (PED-1712)


    Advisory IDSUSE-SU-2022:3931-1
    ReleasedThu Nov 10 11:26:01 2022
    SummarySecurity update for git
    Typesecurity
    Severitymoderate
    References1204455,1204456,CVE-2022-39253,CVE-2022-39260
    Description:

    This update for git fixes the following issues:
    - CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456). - CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455).


    Advisory IDSUSE-RU-2022:3958-1
    ReleasedFri Nov 11 15:20:45 2022
    SummaryRecommended update for mozilla-nss
    Typerecommended
    Severitymoderate
    References1191546,1198980,1201298,1202870,1204729
    Description:

    This update for mozilla-nss fixes the following issues:
    mozilla-nss was updated to NSS 3.79.2 (bsc#1204729)

    • Bump minimum NSPR version to 4.34.1.
    • Gracefully handle null nickname in CERT_GetCertNicknameWithValidity.

    • FIPS: Allow the use of DSA keys (verification only) (bsc#1201298).
    • FIPS: Add sftk_FIPSRepeatIntegrityCheck() to softoken's .def file (bsc#1198980).
    • FIPS: Allow the use of longer symmetric keys via the service level indicator (bsc#1191546).
    • FIPS: Export sftk_FIPSRepeatIntegrityCheck() correctly (bsc#1198980).
    • FIPS: Prevent sessions from getting flagged as non-FIPS (bsc#1191546).
    • FIPS: Mark DSA keygen unapproved (bsc#1191546, bsc#1201298).
    • FIPS: Enable userspace entropy gathering via libjitterentropy (bsc#1202870).
    • FIPS: Prevent keys from getting flagged as non-FIPS and add remaining TLS mechanisms.
    • FIPS: Use libjitterentropy for entropy.
    • FIPS: Fixed an abort() when both NSS_FIPS and /proc FIPS mode are enabled.


    Advisory IDSUSE-SU-2022:3986-1
    ReleasedTue Nov 15 12:57:41 2022
    SummarySecurity update for libX11
    Typesecurity
    Severitymoderate
    References1204422,1204425,CVE-2022-3554,CVE-2022-3555
    Description:

    This update for libX11 fixes the following issues:
    - CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback() (bsc#1204422). - CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure() (bsc#1204425).


    Advisory IDSUSE-SU-2022:3999-1
    ReleasedTue Nov 15 17:08:04 2022
    SummarySecurity update for systemd
    Typesecurity
    Severitymoderate
    References1204179,1204968,CVE-2022-3821
    Description:

    This update for systemd fixes the following issues:

    • CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).

    • Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428 * 0469b9f2bc pstore: do not try to load all known pstore modules * ad05f54439 pstore: Run after modules are loaded * ccad817445 core: Add trigger limit for path units * 281d818fe3 core/mount: also add default before dependency for automount mount units * ffe5b4afa8 logind: fix crash in logind on user-specified message string

    • Document udev naming scheme (bsc#1204179)
    • Make 'sle15-sp3' net naming scheme still available for backward compatibility reason


    Advisory IDSUSE-SU-2022:4011-1
    ReleasedWed Nov 16 11:29:09 2022
    SummarySecurity update for jsoup
    Typesecurity
    Severitymoderate
    References1203459,CVE-2022-36033
    Description:

    This update for jsoup fixes the following issues:
    Updated to version 1.15.3:
    - CVE-2022-36033: Fixed incorrect sanitization of user input in SafeList.preserveRelativeLinks (bsc#1203459).


    Advisory IDSUSE-RU-2022:4066-1
    ReleasedFri Nov 18 10:43:00 2022
    SummaryRecommended update for timezone
    Typerecommended
    Severityimportant
    References1177460,1202324,1204649,1205156
    Description:

    This update for timezone fixes the following issues:
    Update timezone version from 2022a to 2022f (bsc#1177460, bsc#1204649, bsc#1205156):

    • Mexico will no longer observe DST except near the US border
    • Chihuahua moves to year-round -06 on 2022-10-30
    • Fiji no longer observes DST
    • In vanguard form, GMT is now a Zone and Etc/GMT a link
    • zic now supports links to links, and vanguard form uses this
    • Simplify four Ontario zones
    • Fix a Y2438 bug when reading TZif data
    • Enable 64-bit time_t on 32-bit glibc platforms
    • Omit large-file support when no longer needed
    • Jordan and Syria switch from +02/+03 with DST to year-round +03
    • Palestine transitions are now Saturdays at 02:00
    • Simplify three Ukraine zones into one
    • Improve tzselect on intercontinental Zones
    • Chile's DST is delayed by a week in September 2022 (bsc#1202324)
    • Iran no longer observes DST after 2022
    • Rename Europe/Kiev to Europe/Kyiv
    • New `zic -R` command option
    • Vanguard form now uses %z


    Advisory IDSUSE-RU-2022:4076-1
    ReleasedFri Nov 18 15:00:38 2022
    SummaryRecommended update for jsoup
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for jsoup fixes the following issues:

    • Fix typo in the ant *-build.xml file that caused errors while building eclipse.


    Advisory IDSUSE-SU-2022:4078-1
    ReleasedFri Nov 18 15:34:17 2022
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1203476,1204468,1204471,1204472,1204473,1204475,1204480,1204523,CVE-2022-21618,CVE-2022-21619,CVE-2022-21624,CVE-2022-21626,CVE-2022-21628,CVE-2022-39399
    Description:

    This update for java-11-openjdk fixes the following issues:

    • Update to jdk-11.0.17+8 (October 2022 CPU)
    • CVE-2022-39399: Improve HTTP/2 client usage(bsc#1204480)
    • CVE-2022-21628: Better HttpServer service (bsc#1204472)
    • CVE-2022-21624: Enhance icon presentations (bsc#1204475)
    • CVE-2022-21619: Improve NTLM support (bsc#1204473)
    • CVE-2022-21626: Key X509 usages (bsc#1204471)
    • CVE-2022-21618: Wider MultiByte (bsc#1204468)


    Advisory IDSUSE-SU-2022:4081-1
    ReleasedFri Nov 18 15:40:46 2022
    SummarySecurity update for dpkg
    Typesecurity
    Severitylow
    References1199944,CVE-2022-1664
    Description:

    This update for dpkg fixes the following issues:

    • CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).


    Advisory IDSUSE-RU-2022:4135-1
    ReleasedMon Nov 21 00:13:40 2022
    SummaryRecommended update for libeconf
    Typerecommended
    Severitymoderate
    References1198165
    Description:

    This update for libeconf fixes the following issues:

    • Update to version 0.4.6+git - econftool: Parsing error: Reporting file and line nr. --delimeters=spaces accepting all kind of spaces for delimiter. - libeconf: Parse files correctly on space characters (1198165)

    • Update to version 0.4.5+git - econftool: New call 'syntax' for checking the configuration files only. Returns an error string with line number if error. New options '--comment' and '--delimeters'


    Advisory IDSUSE-RU-2022:4198-1
    ReleasedWed Nov 23 13:15:04 2022
    SummaryRecommended update for rpm
    Typerecommended
    Severitymoderate
    References1202750
    Description:

    This update for rpm fixes the following issues:

    • Strip critical bit in signature subpackage parsing
    • No longer deadlock DNF after pubkey import (bsc#1202750)


    Advisory IDSUSE-RU-2022:4233-1
    ReleasedFri Nov 25 18:19:33 2022
    SummaryRecommended update for publicsuffix
    Typerecommended
    Severitylow
    References
    Description:

    This update for publicsuffix fixes the following issues:

    • Update to version 20220903


    Advisory IDSUSE-RU-2022:4256-1
    ReleasedMon Nov 28 12:36:32 2022
    SummaryRecommended update for gcc12
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for gcc12 fixes the following issues:
    This update ship the GCC 12 compiler suite and its base libraries.
    The compiler baselibraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 11 ones.
    The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP3 and SP4, and provided in the 'Development Tools' module.
    The Go, D and Ada language compiler parts are available unsupported via the PackageHub repositories.
    To use gcc12 compilers use:

    • install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
    • override your Makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.

    For a full changelog with all new GCC12 features, check out
    https://gcc.gnu.org/gcc-12/changes.html


    Advisory IDSUSE-RU-2022:4312-1
    ReleasedFri Dec 2 11:16:47 2022
    SummaryRecommended update for tar
    Typerecommended
    Severitymoderate
    References1200657,1203600
    Description:

    This update for tar fixes the following issues:

    • Fix unexpected inconsistency when making directory (bsc#1203600)
    • Update race condition fix (bsc#1200657)


    Advisory IDSUSE-RU-2022:4492-1
    ReleasedWed Dec 14 13:52:39 2022
    SummaryRecommended update for mozilla-nss
    Typerecommended
    Severitymoderate
    References1191546,1198980,1201298
    Description:

    This update for mozilla-nss fixes the following issues:

    • FIPS: Disapprove the creation of DSA keys, i.e. mark them as not-fips (bsc#1201298)
    • FIPS: Allow the use SHA keygen mechs (bsc#1191546).
    • FIPS: ensure abort() is called when the repeat integrity check fails (bsc#1198980).


    Advisory IDSUSE-RU-2022:4499-1
    ReleasedThu Dec 15 10:48:49 2022
    SummaryRecommended update for openssh
    Typerecommended
    Severitymoderate
    References1179465
    Description:

    This update for openssh fixes the following issues:

    • Make ssh connections update their dbus environment (bsc#1179465): * Add openssh-dbus.sh, openssh-dbus.csh, openssh-dbus.fish


    Advisory IDSUSE-SU-2022:4597-1
    ReleasedWed Dec 21 10:13:11 2022
    SummarySecurity update for curl
    Typesecurity
    Severityimportant
    References1206308,1206309,CVE-2022-43551,CVE-2022-43552
    Description:

    This update for curl fixes the following issues:

    • CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).
    • CVE-2022-43551: Fixed HSTS bypass via IDN (bsc#1206308).


    Advisory IDSUSE-feature-2022:4601-1
    ReleasedWed Dec 21 12:23:59 2022
    SummaryFeature update for GNOME 41
    Typefeature
    Severitymoderate
    References1175622,1179584,1188882,1196205,1200581,1203274,1204867,944832
    Description:

    This update for GNOME 41 fixes the following issues:
    atkmm1_6:

    • Version update from 2.28.1 to 2.28.3 (jsc#PED-2235): * Meson build: Avoid unnecessary configuration warnings * Meson build: Perl is not required by new versions of mm-common * Meson build: Require meson >= 0.55.0 * Meson build: Specify 'check' option in run_command(). Will be necessary with future versions of Meson. * Require atk >= 2.12.0 Not a new requirement, but previously it was not specified in configure.ac and meson.build * Support building with Visual Studio 2022

    eog:
    • Version update from 41.1 to 41.2 (jsc#PED-2235): * eog-window: use correct type for display_profile * Fix discovery of Evince for multi-page images

    evince:
    • Version update 41.3 to 41.4 (jsc#PED-2235): * shell: Fix failures when thumbnail extraction takes too long * Fix build with meson 0.60.0 and newer

    evolution:
    • Ensure evolution-devel is forward compatible with evolution-data-server-devel in a same major version (jsc#PED-2235)
    evolution-data-center:
    • Version update from 3.42.4 to 3.42.5 (jsc#PED-2235): * Google OAuth out-of-band (oob) flow will be deprecated

    folks:
    • Version update 0.15.3 to 0.15.5 (jsc#PED-2235): * vapi: Add missing generic type argument * Fix docs build against newer eds version * Fix build against newer eds version * Remove volatile keyword from tests

    gcr:
    • Version update 3.41.0 to 3.41.1 (jsc#PED-2235): * Add G_SPAWN_CLOEXEC_PIPES flag to all the g_spawn commands * Add gi-docgen dependency which is needed by the docs * Fix build with meson 0.60.0 and newer * Fix build without systemd * Several CI fixes

    geocode-glib:
    • Version update from 3.26.2 to 3.26.4 (jsc#PED-2235): * Fix to a test data file not being installed, and a bug fix for a bug in the libsoup3 port * Add support for libsoup 3.x

    gjs:
    • Version update from 1.70.1 to 1.70.2 (jsc#PED-2235): * Build and compatibility fixes backported from the development branch * Reverse order of running-from-source checks
    • Require xorg-x11-Xvfb for proper package build (bsc#1203274)


    glib2:
    • Version update from 2.70.4 to 2.70.5 (jsc#PED-2235): * Bugs fixed: glgo#GNOME/GLib#2620, glgo#GNOME/GLib!2537, glgo#GNOME/GLib!2555 * Split gtk-docs from -devel package, these are not needed during building projects using glib2


    gnome-control-center:
    • Fix the size of logo icon in About system (bsc#1200581)
    • Version update from 41.4 to 41.7 (jsc#PED-2235): * Cellular: Remove duplicate line from .desktop * Info: Allow changing 'Device Name' by pressing 'Enter' * Info: Remove trailing space after CPU name * Keyboard: Fix crash resetting all keyboard shortcuts * Keyboard: Fix leaks * Network: Fix saving passwords for non-wifi connections * Network: Fix critical when opening VPN details page * Wacom: Fix leaks

    gnome-desktop:
    • Version update from 41.2 to 41.8 (jsc#PED-2235): * Version increase but no actual changes

    gnome-music:
    • Version update from 41.0 to 41.1 (jsc#PED-2235): * Ensure the correct album is played * Fix build with meson 0.61.0 and newer * Fix crash on empty selection * Fix incorrect playlist import * Fix time displayed in RTL languages * Improve async queue work * Make random shuffle actually random * Make shuffle random * Speed increase on first startup on larger collections * Time is reversed in RTL

    gnome-remote-desktop:
    • Version update from 41.2 to 41.3 (jsc#PED-2235): * Add Icelandic translation

    gnome-session:
    • Clear error messages that can be ignored because expected to happen for GDM sessions (bsc#1204867)
    • Add fix for gnome-session to exit immediately when lost name on bus (bsc#1175622, bsc#1188882)
    gnome-shell:
    • Disable offline update suggestion before shutdown/reboot in SLE and openSUSE Leap (bsc#944832)
    • Version update from 41.4 to 41.9 (jsc#PED-2235): * Allow extension updates with only Extension Manager installed * Allow more intermediate icon sizes in app grid * Disable workspace switching while in search. * Do not create systemd scope for D-Bus activated apps * Fix calendar to correctly align world clocks header in RTL * Fix drag placeholder position in dash in RTL locales * Fix edge case where windows stay dimmed after a modal is closed * Fix feedback when turning on a11y features by keyboard * Fix focus tracking in magnifier on wayland * Fix fractional timezone offsets in world clock * Fix glitches in overview transition * Fix logging in with realmd * Fix memory leak * Fix opening device settings for enterprise WPA networks * Fix programatically set scrollview fade * Fix regression in ibus support * Fix unresponsive top bar in overview when in fullscreen * Handle monitor changes during startup animation * Hide overview after 'Show Details' from app context menu * Improve Belgian on-screen keyboard layout * Improve CSS shadow appearance * Make sure startup animation completes * Misc. bug fixes and cleanups * Only close messages via delete key if they can be closed * Respect IM hint for candidates list in on-screen keyboard
    gnome-software:
    • Disable offline update feature in SUSE Linux Enterprise and openSUSE Leap (bsc#944832)
    • Version update from 41.4 to 41.5 (jsc#PED-2235): * Added several appstream-related fixed * Disable scroll-by-mouse-wheel on featured carousel * Ensure details page shows app provided on command line


    gnome-terminal:
    • Version update from 3.42.2 to 3.42.3 (jsc#PED-2235): * Fix build with meson 0.61.0 and newer * window: Use a normal menu for the popup menu

    gnome-user-docs:
    • Version update from 41.1 to 41.5 (jsc#PED-2235): * Added missing icon for network-wired-symbolic

    gspell:
    • Version update from 1.8.4 to 1.10.0 (jsc#PED-2235): * Build: distribute more files in tarballs * Documentation improvements

    gtkmm3:
    • Version update from 3.24.5 to 3.24.6 (jsc#PED-2235): * Build with Meson: MSVC build: Support Visual Studio 2022 * Check if Perl is required for building documentation * Don't use deprecated python3.path() and execute (..., gui_app...) * GTK: TreeValueProxy: Declare copy constructor = default, avoiding warnings from the claing++ compiler * Object::_release_c_instance(): Unref orphan managed widgets * SizeGroup demo: Set active items in the combo boxs, so something is shown * Specify 'check' option in run_command()

    gtk-vnc:
    • Version update from 1.3.0 to 1.3.1 (jsc#PED-2235): * Add 'check' arg to meson run_command() * Fix invalid use of subprojects with meson * Support ZRLE encoding for zero size alpha cursors

    gupnp-av:
    • Version update from 0.12.11 to 0.14.1 (jsc#PED-2235): * Add utility function to format GDateTime to the iso variant DIDL expects * Allow to be used as a subproject * Drop autotools * Fix stripping @refID * Fix unsetting subtitleFileType * Make Feature derivable again * Obsolete code removal. * Port to modern GObject * Remove hand-written ref-counting, use RcBox/AtomicRcBox instead. * Switch to meson build system, following upstream
    • Rename libgupnp-av-1_0-2 subpackage to libgupnp-av-1_0-3, correcting the package name to match the provided library
    • Conflict with the wrongly provided libgupnp-av-1_0-2
    gvfs:
    • Version update from 1.48.1 to 1.48.2 (jsc#PED-2235): * sftp: Adapt on new OpenSSH password prompts * smb: Rework anonymous handling to avoid EINVAL * smb: Ignore EINVAL for kerberos/ccache login

    libgsf:
    • Version update from 1.14.48 to 1.14.50 (jsc#PED-2235): * Fix error handling problem when writing ole files * Fix problems with non-western text in OLE properties * Use g_date_time_new_from_iso8601 and g_date_time_format_iso8601 when available

    libmediaart:
    • Version update from 1.9.5 to 1.9.6 (jsc#PED-2235): * build: Add introspection/vapi/tests options * build: Use library() to optionally build a static library

    libnma:
    • Version update from 1.8.32 to 1.8.40 (jsc#PED-2235): * Ad-Hoc networks now default to using WPA2 instead of WEP * Add possibility of building libnma-gtk4 library with Gtk4 support * Do not allow setting empty 802.1x domain for EAP TLS * Fixed keyboard accelerator for certificate chooser * Fixed libnma-gtk4 version of mobile-wizard * Include OWE wireless security option * The GtkBuilder files for Gtk4 are now included in the release tarball * WEP is no longer provided as an option for connecting to hidden networks due to its deprecated status
    • New sub-packages libnma-gtk4-0, typelib-1_0-NMA4-1_0 and libnma-gtk4-devel
    • Split out documentation files in own docs sub-package

    libnotify:
    • Version update from 0.7.10 to 0.7.12 (jsc#PED-2235): * Delete unused notifynotification.xml * Fix potential build errors with old glib version we require * docs/notify-send: Add --transient option to manpage * notification: Bookend calling NotifyActionCallback with temporary reference * notification: Include sender-pid hint by default if not provided * notify-send: Add debug message about server not supporting persistence * notify-send: Add explicit option to create transient notifications * notify-send: Add support for boolean hints * notify-send: Move server capabilities check to a separate function * notify-send: Support passing any hint value, by parsing variant strings

    libpeas:
    • Version update from 1.30.0 to 1.32.0 (jsc#PED-2235): * Icon licenses have been corrected * Parallel build system operation fixes * Use gi-docgen for documentation * Various build warnings squashed * Various GIR data that should not have been exported was removed
    • Stop packaging the demo files/sub-package

    librsvg:
    • Version update from 2.52.6 to 2.52.9 (jsc#PED-2235): * Catch circular references when rendering patterns * Fix regressions when computing element geometries * Fix regression outputting all text as paths

    libsecret:
    • Version update from 0.20.4 to 0.20.5 (jsc#PED-2235): * Add bash-completion for secret-tool * Add locking capabilities to secret tool * Add support for TPM2 based secret storage * Create default collection after DBus.Error.UnknownObject * Detect local storage in snaps in the same way as flatpaks * Drop autotools-based build * GI annotation and documentation fixes * Port documentation to gi-docgen * Use G_GNUC_NULL_TERMINATED where appropriate collection, methods, prompt: Port to GTask * secret-file-backend: Avoid closing the same file descriptor twice

    mutter:
    • Version update from 41.5 to 41.9 (jsc#PED-2235): * Fix '--replace option' * Fix missing root window properties after XWayland start * Fix night light without GAMMA_LUT property * KMS: Survive missing GAMMA_LUT property * wayland: Fix rotation transform * Misc. bug fixes

    nautilus:
    • Version update from 41.2 to 41.5(jsc#PED-2235): * Drag-and-drop bugfixes * HighContrast style fixes

    orca:
    • Version update from 41.1 to 41.3 (jsc#PED-2235): * Add more event-flood detection and handling for improved performance * Fix bug causing accessing preferences to fail for Esperanto * Web: Fix bug causing widgets descending from off-screen label elements to be skipped over * Web: Fix presentation of the FluentUI react dialog (and any other dialog which has an ARIA document-role descendant) * WebKitGtk: Fail gracefully when structural navigation commands are used in WebKitGtk 2.36.x

    python-cairo:
    • Add python3-cairo to SUSE Linux Enterprise Micro 5.3 as it is now required by python3-gobject-cairo

    python-gobject:
    • Add dependency on python-cairo to python-gobject-cairo: The introspection wrapper needs pycairo (bsc#1179584)
    • Version update from 3.42.0 to 3.42.2 (jsc#PED-2235): * Add a workaround for a PyPy 3.9+ bug when threads are used * Do not error out for unknown scopes * Prompt an error instead of crashing when marshaling unsupported fundamental types in some cases * Fix a crash/refcounting error in case marshaling a hash table fails * Fix crashes when marshaling zero terminated arrays for certain item types * Implement DynamicImporter.find_spec() to silence deprecation warning * Make the test suite pass again with PyPy * Some test/CI fixes * gtk overrides: Do not override Treeview.enable_model_drag_xx for GTK4 * gtk overrides: restore Gtk.ListStore.insert_with_valuesv with newer GTK4 * interface: Fix leak when overriding GInterfaceInfo * setup.py: look up pycairo headers without importing the module

    trackers-python:
    • Allow system calls used by gstreamer (bsc#1196205)
    • Version update from 3.2.2 to 3.2.1 (jsc#PED-2235): * Backport seccomp rules for rseq and mbind syscalls

    vala:
    • Version update from 0.54.6 to 0.54.8 (jsc#PED-2235): * Add missing TraverseVisitor.visit_data_type() * Add support for 'copy_/free_function' metadata for compact classes * Catch and throw possible inner error of lock statements * Clear SemanticAnalyzer.current_{symbol,source_file} when not needed anymore * Don't count instance-parameter when checking for backwards closure reference * Fix a few binding errors * Free empty stack list for code contexts * Handle duplicated and unnamed symbols. * Improve UI parsing and handling of nested objects and properties * Make sure to drop our 'trap' jump target in case of an error * Move dynamic property errors to semantic analyzer pass * Require lvalue access of delegate target/destroy 'fields' * Show source location when reporting deprecations * Transform assignment of an array element as needed * manual: Update from wiki.gnome.org * parser: Improve handling of nullable VarType in with-statement * parser: Reduce the source reference of main block method to its beginning

    xdg-desktop-portal-gnome:
    • Version update from 0.54.6 to 0.54.8 (jsc#PED-2235): * Properly bind property in Lockdown portal


    Advisory IDSUSE-SU-2022:4628-1
    ReleasedWed Dec 28 09:23:13 2022
    SummarySecurity update for sqlite3
    Typesecurity
    Severitymoderate
    References1206337,CVE-2022-46908
    Description:

    This update for sqlite3 fixes the following issues:

    • CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism, when relying on --safe for execution of an untrusted CLI script (bsc#1206337).


    Advisory IDSUSE-SU-2022:4629-1
    ReleasedWed Dec 28 09:24:07 2022
    SummarySecurity update for systemd
    Typesecurity
    Severityimportant
    References1200723,1205000,CVE-2022-4415
    Description:

    This update for systemd fixes the following issues:

    • CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).

    Bug fixes:
    • Support by-path devlink for multipath nvme block devices (bsc#1200723).


    Advisory IDSUSE-RU-2023:25-1
    ReleasedThu Jan 5 09:51:41 2023
    SummaryRecommended update for timezone
    Typerecommended
    Severitymoderate
    References1177460
    Description:

    This update for timezone fixes the following issues:
    Version update from 2022f to 2022g (bsc#1177460):

    • In the Mexican state of Chihuahua: * The border strip near the US will change to agree with nearby US locations on 2022-11-30. * The strip's western part, represented by Ciudad Juarez, switches from -06 all year to -07/-06 with US DST rules, like El Paso, TX. * The eastern part, represented by Ojinaga, will observe US DST next year, like Presidio, TX. * A new Zone America/Ciudad_Juarez splits from America/Ojinaga.
    • Much of Greenland, represented by America/Nuuk, stops observing winter time after March 2023, so its daylight saving time becomes standard time.
    • Changes for pre-1996 northern Canada
    • Update to past DST transition in Colombia (1993), Singapore (1981)
    • 'timegm' is now supported by default


    Advisory IDSUSE-RU-2023:48-1
    ReleasedMon Jan 9 10:37:54 2023
    SummaryRecommended update for libtirpc
    Typerecommended
    Severitymoderate
    References1199467
    Description:

    This update for libtirpc fixes the following issues:

    • Consider /proc/sys/net/ipv4/ip_local_reserved_ports, before binding to a random port (bsc#1199467)


    Advisory IDSUSE-RU-2023:50-1
    ReleasedMon Jan 9 10:42:21 2023
    SummaryRecommended update for shadow
    Typerecommended
    Severitymoderate
    References1205502
    Description:

    This update for shadow fixes the following issues:

    • Fix issue with user id field that cannot be interpreted (bsc#1205502)


    Advisory IDSUSE-SU-2023:110-1
    ReleasedFri Jan 20 10:18:16 2023
    SummarySecurity update for git
    Typesecurity
    Severityimportant
    References1207032,1207033,CVE-2022-23521,CVE-2022-41903
    Description:

    This update for git fixes the following issues:

    • CVE-2022-41903: Fixed a heap overflow in the 'git archive' and 'git log --format' commands (bsc#1207033).
    • CVE-2022-23521: Fixed an integer overflow that could be triggered when parsing a gitattributes file (bsc#1207032).


    Advisory IDSUSE-SU-2023:119-1
    ReleasedFri Jan 20 10:28:07 2023
    SummarySecurity update for mozilla-nss
    Typesecurity
    Severityimportant
    References1204272,1207038,CVE-2022-23491,CVE-2022-3479
    Description:

    This update for mozilla-nss fixes the following issues:

    • CVE-2022-3479: Fixed a potential crash that could be triggered when a server requested a client authentication certificate, but the client had no certificates stored (bsc#1204272).
    • Updated to version 3.79.3 (bsc#1207038): - CVE-2022-23491: Removed trust for 3 root certificates from TrustCor.


    Advisory IDSUSE-RU-2023:179-1
    ReleasedThu Jan 26 21:54:30 2023
    SummaryRecommended update for tar
    Typerecommended
    Severitylow
    References1202436
    Description:

    This update for tar fixes the following issue:

    • Fix hang when unpacking test tarball (bsc#1202436)


    Advisory IDSUSE-SU-2023:201-1
    ReleasedFri Jan 27 15:24:15 2023
    SummarySecurity update for systemd
    Typesecurity
    Severitymoderate
    References1204944,1205000,1207264,CVE-2022-4415
    Description:

    This update for systemd fixes the following issues:

    • CVE-2022-4415: Fixed an issue where users could access coredumps with changed uid, gid or capabilities (bsc#1205000).

    Non-security fixes:
    • Enabled the pstore service (jsc#PED-2663).
    • Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944).
    • Fixed an issue where a pamd file could get accidentally overwritten after an update (bsc#1207264).


    Advisory IDSUSE-SU-2023:348-1
    ReleasedFri Feb 10 15:08:41 2023
    SummarySecurity update for less
    Typesecurity
    Severitymoderate
    References1207815,CVE-2022-46663
    Description:

    This update for less fixes the following issues:
    - CVE-2022-46663: Fixed denial-of-service by printing specially crafted escape sequences to the terminal (bsc#1207815).


    Advisory IDSUSE-SU-2023:429-1
    ReleasedWed Feb 15 17:41:22 2023
    SummarySecurity update for curl
    Typesecurity
    Severityimportant
    References1207990,1207991,1207992,CVE-2023-23914,CVE-2023-23915,CVE-2023-23916
    Description:

    This update for curl fixes the following issues:

    • CVE-2023-23914: Fixed HSTS ignored on multiple requests (bsc#1207990).
    • CVE-2023-23915: Fixed HSTS amnesia with --parallel (bsc#1207991).
    • CVE-2023-23916: Fixed HTTP multi-header compression denial of service (bsc#1207992).


    Advisory IDSUSE-SU-2023:430-1
    ReleasedWed Feb 15 17:42:25 2023
    SummarySecurity update for git
    Typesecurity
    Severityimportant
    References1208027,1208028,CVE-2023-22490,CVE-2023-23946
    Description:

    This update for git fixes the following issues:
    - CVE-2023-22490: Fixed incorrectly usable local clone optimization even when using a non-local transport (bsc#1208027). - CVE-2023-23946: Fixed issue where a path outside the working tree can be overwritten as the user who is running 'git apply' (bsc#1208028).


    Advisory IDSUSE-RU-2023:432-1
    ReleasedWed Feb 15 18:48:25 2023
    SummaryRecommended update for graphite2
    Typerecommended
    Severitymoderate
    References1207676
    Description:

    This update for graphite2 fixes the following issue:

    • Correct license string to LGPL-2.1-or-later OR MPL-2.0 OR GPL-2.0-or-later (bsc#1207676)


    Advisory IDSUSE-SU-2023:434-1
    ReleasedThu Feb 16 09:08:05 2023
    SummarySecurity update for mozilla-nss
    Typesecurity
    Severityimportant
    References1208138,CVE-2023-0767
    Description:

    This update for mozilla-nss fixes the following issues:
    Updated to NSS 3.79.4 (bsc#1208138):
    - CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.


    Advisory IDSUSE-SU-2023:463-1
    ReleasedMon Feb 20 16:33:39 2023
    SummarySecurity update for tar
    Typesecurity
    Severitymoderate
    References1202436,1207753,CVE-2022-48303
    Description:

    This update for tar fixes the following issues:

    • CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753).

    Bug fixes:
    • Fix hang when unpacking test tarball (bsc#1202436).


    Advisory IDSUSE-RU-2023:464-1
    ReleasedMon Feb 20 18:11:37 2023
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for systemd fixes the following issues:

    • Merge of v249.15
    • Drop workaround related to systemd-timesyncd that addressed a Factory issue.
    • Conditionalize the use of /lib/modprobe.d only on systems with split usr support enabled (i.e. SLE).
    • Make use of the %systemd_* rpm macros consistently. Using the upstream variants will ease the backports of Factory changes to SLE since Factory systemd uses the upstream variants exclusively.
    • machines.target belongs to systemd-container, do its init/cleanup steps from the scriptlets of this sub-package.
    • Make sure we apply the presets on units shipped by systemd package.
    • systemd-testsuite: move the integration tests in a dedicated sub directory.
    • Move systemd-cryptenroll into udev package.


    Advisory IDSUSE-RU-2023:617-1
    ReleasedFri Mar 3 16:49:06 2023
    SummaryRecommended update for jitterentropy
    Typerecommended
    Severitymoderate
    References1207789
    Description:

    This update for jitterentropy fixes the following issues:

    • build jitterentropy library with debuginfo (bsc#1207789)


    Advisory IDSUSE-SU-2023:668-1
    ReleasedWed Mar 8 11:17:33 2023
    SummarySecurity update for libX11
    Typesecurity
    Severitymoderate
    References1204425,1208881,CVE-2022-3555
    Description:

    This update for libX11 fixes the following issues:

    • Fixed a regression introduced with security update for CVE-2022-3555 (bsc#1204425, bsc#1208881)


    Advisory IDSUSE-RU-2023:714-1
    ReleasedMon Mar 13 10:53:25 2023
    SummaryRecommended update for rpm
    Typerecommended
    Severityimportant
    References1207294
    Description:

    This update for rpm fixes the following issues:

    • Fix missing python(abi) for 3.XX versions (bsc#1207294)


    Advisory IDSUSE-RU-2023:732-1
    ReleasedTue Mar 14 18:06:09 2023
    SummaryRecommended update for jsoup, jsr-305
    Typerecommended
    Severitylow
    References
    Description:

    This update for jsoup, jsr-305 fixes the following issues:

    • Redistribute packages to fix dependency inconsistencies in some products.


    Advisory IDSUSE-SU-2023:752-1
    ReleasedThu Mar 16 08:40:03 2023
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severitymoderate
    References1206549,1207246,1207248,CVE-2023-21835,CVE-2023-21843
    Description:

    This update for java-11-openjdk fixes the following issues:

    • CVE-2023-21843: Fixed soundbank URL remote loading (bsc#1207248).
    • CVE-2023-21835: Fixed handshake DoS attack against DTLS connections (bsc#1207246).

    Bugfixes:
    • Remove broken accessibility sub-package (bsc#1206549).


    Advisory IDSUSE-feature-2023:775-1
    ReleasedThu Mar 16 15:58:55 2023
    SummaryFeature for updating the Java stack
    Typefeature
    Severitycritical
    References1047218,1062631,1120360,1133997,1134001,1145693,1171696,1172961,1173600,1177180,1177488,1177568,1179926,1180215,1182284,1182708,1182748,1182754,1184356,1184357,1184755,1186328,1187446,1188468,1188469,1188529,1190660,1190663,1193795,1195108,1195557,1198279,1198404,1198739,1198833,1201081,1201316,1201317,1203154,1203515,1203516,1203672,1203673,1203674,1203868,1204173,1204284,1204918,1205138,1205142,1205647,1206018,1206400,1206401,CVE-2019-17566,CVE-2020-11022,CVE-2020-11023,CVE-2020-11979,CVE-2020-11987,CVE-2020-11988,CVE-2020-13956,CVE-2020-15522,CVE-2020-1945,CVE-2020-26945,CVE-2020-28052,CVE-2020-2875,CVE-2020-2933,CVE-2020-2934,CVE-2020-8908,CVE-2021-2471,CVE-2021-26291,CVE-2021-27807,CVE-2021-27906,CVE-2021-29425,CVE-2021-33813,CVE-2021-36373,CVE-2021-36374,CVE-2021-37533,CVE-2021-42550,CVE-2021-43980,CVE-2022-2047,CVE-2022-2048,CVE-2022-23437,CVE-2022-24839,CVE-2022-28366,CVE-2022-29599,CVE-2022-37865,CVE-2022-37866,CVE-2022-38398,CVE-2022-38648,CVE-2022-38752,CVE-2022-40146,CVE-2022-40149,CVE-2022-40150,CVE-2022-42252,CVE-2022-42889,CVE-2022-45685,CVE-2022-45693
    Description:

    This feature update for the Java stack provides:
    ant:

    • Update ant from version 1.10.7 to version 1.10.12. (jsc#SLE-23217) * CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469) * CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468) * Do not follow redirects if the 'followRedirects' attribute is set to 'false'. * Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the same effect as using the shorter alias names. * Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper. * Avoid file name canonicalization when possible. * Upgraded AntUnit to 1.4.1. * CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180) * CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696) * sshexec, sshsession and scp now support a new sshConfig parameter. It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to be used per host. * Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001) * Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in optional tasks. (bsc#1133997) * Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar. * Do not build against the log4j12 packages, use the new reload4j

    ant-antlr:
    • Update ant-antlr from version 1.10.7 to version 1.10.12. (jsc#SLE-23217) * CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469) * CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468) * Do not follow redirects if the 'followRedirects' attribute is set to 'false'. * Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the same effect as using the shorter alias names. * Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper. * Avoid file name canonicalization when possible. * Upgraded AntUnit to 1.4.1. * CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180) * CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696) * sshexec, sshsession and scp now support a new sshConfig parameter. It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to be used per host. * Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001) * Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in optional tasks. (bsc#1133997) * Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar. * Do not build against the log4j12 packages, use the new reload4j

    ant-contrib:
    • Fix build with apache-ivy 2.5.1 (jsc#SLE-23217)

    ant-junit:
    • Update ant-junit from version 1.10.7 to version 1.10.12. (jsc#SLE-23217) * CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469) * CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468) * Do not follow redirects if the 'followRedirects' attribute is set to 'false'. * Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the same effect as using the shorter alias names. * Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper. * Avoid file name canonicalization when possible. * Upgraded AntUnit to 1.4.1. * CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180) * CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696) * sshexec, sshsession and scp now support a new sshConfig parameter. It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to be used per host. * Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001) * Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in optional tasks. (bsc#1133997) * Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar. * Do not build against the log4j12 packages, use the new reload4j

    ant-junit5:
    • Update ant-junit5 from version 1.10.7 to version 1.10.12. (jsc#SLE-23217) * CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469) * CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468) * Do not follow redirects if the 'followRedirects' attribute is set to 'false'. * Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the same effect as using the shorter alias names. * Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper. * Avoid file name canonicalization when possible. * Upgraded AntUnit to 1.4.1. * CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180) * CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696) * sshexec, sshsession and scp now support a new sshConfig parameter. It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to be used per host. * Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001) * Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in optional tasks. (bsc#1133997) * Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar.
    • Do not build against the log4j12 packages, use the new reload4j

    antlr:
    • Build antlr-manual package without examples files. (bsc#1120360)

    antlr3:
    • Build with source and target levels 8 (jsc#SLE-23217)

    antlr4:
    • Update antlr4 from version 4.7.2 to version 4.9.3. (jsc#SLE-23217) * The libantlr4-runtime-devel now requires utfcpp-devel * For more details check: https://github.com/antlr/antlr4/compare/4.7.2...4.9.3

    aopalliance:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-beanutils:
    • Provide apache-commons-beanutils 1.9.4 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    apache-commons-cli:
    • Update apache-commons-cli from version 1.4 to version 1.5.0. (jsc#SLE-23217) * Replace deprecated FindBugs with SpotBugs * Replace CLIRR with JApiCmp. * Update Java from version 5 to 7 * Remove deprecated sudo setting * Bump junit:junit to 4.13.2 * Bump commons-parent to 52 * Bump maven-pmd-plugin to 3.15.0 * Bump actions/checkout to v2.3.5 * Bump actions/setup-java to v2 * Bump maven-antrun-plugin to 3.0.0 * Bump maven-checkstyle-plugin to 3.1.2 * Bump checkstyle to 9.0.1 * Bump actions/cache to 2.1.6 * Bump commons.animal-sniffer.version to 1.20 * Bump maven-bundle-plugin to 5.1.2 * Bump biz.aQute.bndlib.version to 6.0.0 * Bump spotbugs to 4.4.2 * Bump spotbugs-maven-plugin to 4.4.2.2 * Add OSGi manifest to the build files. * Set java source/target levels to 6

    apache-commons-codec:
    • Update apache-commons-codec from version 1.11 to version 1.15. (jsc#SLE-23217) * Do not alias the artifact to itself * Base16Codec and Base16Input/OutputStream. * Hex encode/decode with existing arrays. * Base32/Base64 Input/OutputStream: Added strict decoding property to control handling of trailing bits. Default lenient mode discards them without error. Strict mode raise an exception. * Update tests from JUnit to 4.13. * Update actions/checkout to v2.3.2 * Update actions/setup-java to v1.4.1. * MurmurHash3: Deprecate hash64 methods and hash methods accepting a String that use the default encoding. * Allow repeat calls to MurmurHash3.IncrementalHash32.end() to generate the same value. * Add RandomAccessFile digest methods * Add Path APIs to org.apache.commons.codec.digest.DigestUtils similar to File APIs. * Add SHA-512/224 and SHA-512/256 to DigestUtils for Java 9 and up. * Deprecate Charset constants in org.apache.commons.codec.Charsets in favor of java.nio.charset.StandardCharsets. * Reject any decode request for a value that is impossible to encode to for Base32/Base64. * MurmurHash2 for 32-bit or 64-bit value. * MurmurHash3 for 32-bit or 128-bit value. * Update from Java 6 to Java 7. * Add Percent-Encoding Codec (described in RFC3986 and RFC7578) * Add SHA-3 methods in DigestUtils.

    apache-commons-collections4:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-collections:
    • Do not use a dummy pom that only declares dependencies for the testframework artifact

    apache-commons-compress:
    • Remove support for pack200 which depends on old asm3. (jsc#SLE-23217)

    apache-commons-configuration:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-csv:
    • Provide apache-commons-csv version 1.9.0 (jsc#SLE-23217)

    apache-commons-daemon:
    • Update apache-commons-daemon from version 1.0.15 to version 1.2.4. (jsc#SLE-23217) * Build with source/target levels 8 * Ensure that log messages written to stdout and stderr are not lost during start-up. * Enable the service to start if the Options value is not present in the registry. * jsvc. Don't fail if the CAP_DAC_READ_SEARCH capability is not available. Fall back to using argv[0] rather than /proc/self/exe to determine the path for the current binary. * Improved JRE/JDK detection to support increased range of both JVM versions and vendors * Correct multiple issues related to enabling a service to interact with the desktop. Provide a better error message if this option is used with an invalid user, install the service with the option enabled if requested and correctly save the setting if it is enabled in the GUI. * Update the list of paths searched for libjvm.so to include the path used by OpenJDK 11. * Add additional debug logging for Java start mode. * Remove incorrect definition 'supported_os' which defined in psupport.m4 file to fix jsvc build error on s390, arm, aarch64, mipsel and mips. * More debug logging in prunsrv.c and javajni.c. * Update arguments.c to support Java 11 --enable-preview. * jsvc and Procrun: ad support for Java native memory tracking. * Procrun. Add a new command, print, that outputs the command to (re-)configure the service with the current settings. This is intended to be used to save settings such as before an upgrade. * Update: Update Commons-Parent to version 49. * Add AArch64 support to src/native/unix/support/apsupport.m4. * Procrun. When running in jre mode, if the standard Java registry entries for JavaHome and RuntimeLib are not present, attempt to use the Procrun JavaHome key to find the runtime library. * Procrun. Add an option to configure the service to use the 'Automatic (Delayed Start)' startup mode. * jsvc. Include the full path to the jsvc executable in the debug log. * Remove support for building Procrun for the Itanium platform.

    apache-commons-dbcp:
    • Provide apache-commons-dbcp version 2.1.1 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    apache-commons-digester:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-el:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-exec:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-fileupload:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-io:
    • Update apache-commons-io from version 2.6 to version 2.11.0. (jsc#SLE-23217) * CVE-2021-29425: Limited path traversal in Apache Commons IO (bsc#1184755) * Java 8 or later is required * This update provides several fixes and enhancements. For a full overview please, visit: https://commons.apache.org/proper/commons-io/changes-report.html

    apache-commons-jexl:
    • Build with source and target levels 8 (jsc#SLE-23217)

    apache-commons-lang3:
    • Update apache-commons-lang3 from version 3.8.1 to version 3.12.0. (jsc#SLE-23217) * Remove the junit bom dependency as it breaks the build of other packages like log4j. * Fix component version in default.properties to 3.12 * Add BooleanUtils.booleanValues(). * Add BooleanUtils.primitiveValues(). * Add StringUtils.containsAnyIgnoreCase(CharSequence, CharSequence...). * Add StopWatch.getStopTime(). * Add fluent-style ArraySorter. * Add and use LocaleUtils.toLocale(Locale) to avoid NPEs. * Add FailableShortSupplier, handy for JDBC APIs. * Add JavaVersion.JAVA_17. * Add missing boolean[] join method. * Add StringUtils.substringBefore(String, int). * Add Range.INTEGER. * Add DurationUtils. * Introduce the use of @Nonnull, and @Nullable, and the Objects class as a helper tool. * Add and use true and false String constants. * Add and use ObjectUtils.requireNonEmpty(). * Correct implementation of RandomUtils.nextLong(long, long). * Restore handling of collections for non-JSON ToStringStyle. * ContextedException Javadoc add missing semicolon. * Resolve JUnit pioneer transitive dependencies using JUnit BOM. * NumberUtilsTest - incorrect types in min/max tests. * Improve StringUtils.stripAccents conversion of remaining accents. * StringUtils.countMatches - clarify Javadoc. * Remove redundant argument from substring call. * BigDecimal is created when you pass it the min and max values. * TypeUtils.isAssignable returns wrong result for GenericArrayType and ParameterizedType. * testGetAllFields and testGetFieldsWithAnnotation sometimes fail. * TypeUtils. containsTypeVariables does not support GenericArrayType. * Refine StringUtils.lastIndexOfIgnoreCase. * Refine StringUtils.abbreviate. * Refine StringUtils.isNumericSpace. * Refine StringUtils.deleteWhitespace. * MethodUtils.invokeMethod NullPointerException in case of null in args list. * Fix 2 digit week year formatting. * Add and use ThreadUtils.sleep(Duration). * Add and use ThreadUtils.join(Thread, Duration). * Add ObjectUtils.wait(Duration). * ArrayUtils.toPrimitive(Object) does not support boolean and other types. * Processor.java: check enum equality with == instead of .equals() method. * Use own validator ObjectUtils.anyNull to check null String input. * Add ArrayUtils.isSameLength() to compare more array types. * Added the Locks class as a convenient possibility to deal with locked objects. * Add to Functions: FailableBooleanSupplier, FailableIntSupplier, FailableLongSupplier, FailableDoubleSupplier... * Add ArrayUtils.get(T[], index, T) to provide an out-of-bounds default value. * Add JavaVersion enum constants for Java 14, 15 and 16. * Use Java 8 lambdas and Map operations. * Change removeLastFieldSeparator to use endsWith. * Change a Pattern to a static final field, for not letting it compile each time the function invoked. * Add ImmutablePair factory methods left() and right(). * Add ObjectUtils.toString(Object, Supplier). * Add org.apache.commons.lang3.StringUtils.substringAfter(String, int). * Add org.apache.commons.lang3.StringUtils.substringAfterLast(String, int). * Use StandardCharsets.UTF_8. * Use Collections.singletonList insteadof Arrays.asList when there be only one element. * Change array style from `int a[]` to `int[] a`. * Change from addAll to constructors for some List. * Simplify if as some conditions are covered by others. * Fixed Javadocs for setTestRecursive(). * ToStringBuilder.reflectionToString - Wrong JSON format when object has a List of Enum. * Make org.apache.commons.lang3.CharSequenceUtils.toCharArray(CharSequence) public. * Update actions/cache from v2 to v2.1.4. * Update actions/checkout from v2.3.1 to v2.3.4. * Update actions/setup-java from v1.4.0 to v1.4.2. * Update biz.aQute.bndlib from 5.1.1 to 5.3.0. * Update com.puppycrawl.tools:checkstyle to 8.34. * Update commons.jacoco.version 0.8.5 to 0.8.6 (Fixes Java 15 builds). * Update commons.japicmp.version to 0.15.2. * Update jmh.version from 1.21 to 1.27. * Update junit-bom from 5.7.0 to 5.7.1. * Update junit-jupiter to 5.7.0. * Update junit-pioneer to 1.3.0. * Update maven-checkstyle-plugin to 3.1.2. * Update maven-pmd-plugin from 3.13.0 to 3.14.0. * Update maven-surefire-plugin 2.22.2 -> 3.0.0-M5. * Update org.apache.commons:commons-parent to 51. * Update org.easymock:easymock to 4.2. * Update org.hamcrest:hamcrest 2.1 -> 2.2. * Update org.junit.jupiter:junit-jupiter to 5.6.2. * Update spotbugs to 4.2.1. * Update spotbugs-maven-plugin from 4.0.0 to 4.2.0. * Add ExceptionUtils.throwableOfType(Throwable, Class) and friends. * Add EMPTY_ARRAY constants to classes in org.apache.commons.lang3.tuple. * Add null-safe StringUtils APIs to wrap String#getBytes([Charset|String]). * Add zero arg constructor for org.apache.commons.lang3.NotImplementedException. * Add ArrayUtils.addFirst() methods. * Add Range.fit(T) to fit a value into a range. * Added Functions.as*, and tests thereof, as suggested by Peter Verhas * Add getters for lhs and rhs objects in DiffResult. * Generify builder classes Diffable, DiffBuilder, and DiffResult. * Add ClassLoaderUtils with toString() implementations. * Add null-safe APIs as StringUtils.toRootLowerCase(String) and StringUtils.toRootUpperCase(String). * Add org.apache.commons.lang3.time.Calendars. * Add EnumUtils getEnum() methods with default values. * Added indexesOf methods and simplified removeAllOccurences. * Add support of lambda value evaluation for defaulting methods. * Add factory methods to Pair classes with Map.Entry input. * Add StopWatch convenience APIs to format times and create a simple instance. * Allow a StopWatch to carry an optional message. * Add ComparableUtils. * Add org.apache.commons.lang3.SystemUtils.getUserName(). * Add ObjectToStringComparator. * Add org.apache.commons.lang3.arch.Processor.Arch.getLabel(). * Add IS_JAVA_14 and IS_JAVA_15 to org.apache.commons.lang3.SystemUtils. * ObjectUtils: Get first non-null supplier value. * Added the Streams class, and Functions.stream() as an accessor thereof. * Make test more stable by wrapping assertions in hashset. * Use synchronize on a set created with Collections.synchronizedSet before iterating. * StringUtils.unwrap incorrect throw StringIndexOutOfBoundsException. * StringIndexOutOfBoundsException in StringUtils.replaceIgnoreCase. * StringUtils.removeIgnoreCase('?a', 'a') throws IndexOutOfBoundsException. * StringUtils abbreviate returns String of length greater than maxWidth. * Deprecate org.apache.commons.lang3.ArrayUtils.removeAllOccurences(*) for org.apache.commons.lang3.ArrayUtils.removeAllOccurrences(*). * Requires jdk >= 1.8 * Add more SystemUtils.IS_JAVA_XX variants * Adding the Functions class * Add @FunctionalInterface to ThreadPredicate and ThreadGroupPredicate * Add isEmpty method to ObjectUtils * null-safe StringUtils.valueOf(char[]) to delegate to String.valueOf(char[]). * Add API org.apache.commons.lang3.SystemUtils.isJavaVersionAtMost(JavaVersion) * Consolidate the StringUtils equals and equalsIgnoreCase * Add OSGi manifest

    apache-commons-logging:
    • Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)

    apache-commons-math:
    • Provide apache-commons-math version 3.6.1 (jsc#SLE-23217)

    apache-commons-net:
    • Update from version 3.6 to version 3.9.0 (jsc#SLE-23217) * CVE-2021-37533: FTP client trusts the host from PASV response by default (bsc#1206018) * Build with source and target levels 8

    apache-commons-ognl:
    • Provide apache-commons-ognl version 4.0-20191021git51cf8f4. (jsc#SLE-23217)

    apache-commons-parent:
    • Update apache-commons-parent from version 47 to version 52. (jsc#SLE-23217) * For a full changelog, please visit: https://github.com/apache/commons-parent/compare/commons-parent-47...rel/commons-parent-52

    apache-commons-pool2:
    • Provide apache-commons-pool2 2.4.2 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    apache-commons-text:
    • Provide apache-commons-text version 1.10.0 (jsc#SLE-23217) * CVE-2022-42889: code execution when processing untrusted input due to insecure interpolation defaults. (bsc#1204284) * This is a new dependency of maven-javadoc-plugin. * Build with ant in order to avoid build cycles.

    apache-ivy:
    • Upgrade from version 2.4.0 to version 2.5.1. (jsc#SLE-23217) * CVE-2022-37866: path traversal via user-supplied pattern (bsc#1205142) * CVE-2022-37865: apache-ivy: Apache Ivy allow create/overwrite any file on the system. (bsc#1205138) * Breaking: + Removed old `fr\jayasoft\ivy\ant\antlib.xml` AntLib definition file. * Force building with JDK < 14, since it imports statically a class removed in JDK14. * Change dependencies for the httpclient to httpcomponents-client instead of apache-commons-httpclient.


    apache-logging-parent:
    • Update apache-logging-parent from version 2 to version 5. (jsc#SLE-23217) * Do not require maven-local, since it can be handled by javapackages-local

    apache-parent:
    • Check upstream source signature

    apache-pdfbox:
    • Update apache-pdfbox from version 1.8.16 to version 2.0.23. (jsc#SLE-23217) * CVE-2021-27807: infinite loop while loading a crafted PDF file. (bsc#1184356) * CVE-2021-27906: OutOfMemory-Exception while loading a crafted PDF file. (bsc#1184357) * Fix build with bouncycastle 1.71 and the new bcutil artifact * Build with source/target levels 8 * Package all resources in pdfbox module * Improve document signing * Allow reuse of subsetted fonts by inverting the ToUnicode CMap * Improve performance in signature validation * Add more checks to PDFXrefStreamParser and reduce memory footprint * Use StringBuilder for key in PDDeviceN.toRGBWithTintTransform() * Don't use RGB loop in PDDeviceN.toRGBWithTintTransform() * Add source signature and keyring * Move from 1.x release line to the 2.x one. This is a ABI change * Generate the ant build system from the maven one and customize it.

    apache-resource-bundles:
    • Provide apache-resource-bundles version 2 (jsc#SLE-23217) * This package contains templates for generating necessary license files and notices for all Apache releases. * This is a build dependency of apache-sshd

    apache-sshd:
    • Provide apache-sshd version 2.7.0 as dependency of eclipse-jgit (jsc#SLE-23217)

    apiguardian:
    • Build with source and target levels 8 (jsc#SLE-23217)

    aqute-bnd:
    • Update aqute-bnd from version 3.5.0 to version 5.2.0. (jsc#SLE-23217) * ant plugin is in separate artifact. * Produce bytecode compatible with Java 8 * Port to OSGI 7.0.0 * Require aqute-bndlib

    args4j:
    • Build with source and target levels 8 (jsc#SLE-23217)

    asm3:
    • Build with source and target levels 8 (jsc#SLE-23217)

    atinject:
    • Update atinject from version 1+20100611git1f74ea7 to version 1+20160610git1f74ea7. (jsc#SLE-23217) * Alias to the new jakarta name * Fetch the sources using a source service * Do not use the upstream build.sh, but use it to write a necessary part directly to the spec file * Build with source/target levels 8 * Fix build with javadoc 17.

    auto:
    • Update auto from version 1.3 to version 1.6.1. (jsc#SLE-23217) * Provide the auto-value-annotations artifact needed by google-errorprone * Provide auto-service-annotations and fix dependencies issues.

    avalon-framework:
    • Do not build against the log4j12 packages, use the new reload4j. (jsc#SLE-23217)

    avalon-logkit:
    • Do not build against the log4j12 packages, use the new reload4j. (jsc#SLE-23217)
    • Do not build the org.apache.log.output.lf5 package

    aws-sdk-java:
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Build against the standalone JavaEE modules unconditionally
    • Double the maximum memory for javadoc to avoid out-of-memory on certain architectures
    • Force generating javadoc with maven-javadoc-plugin, since the xmvn javadoc mojo doesn't work here.

    axis:
    • Require glassfish-activation-api in order to prevent missing APIs when running the ant task. (jsc#SLE-23217)
    • Unify the dependency on glassfish-activation-api instead of jaf and gnu-jaf. (jsc#SLE-23217)
    • On systems where the JavaEE modules exist, allow building against newer versions of APIs (jsc#SLE-23217)
    • Alias relevant artifacts to org.apache.axis (jsc#SLE-23217)
    • Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
    • Require Java >= 1.8 (jsc#SLE-23217)

    base64coder:
    • Provide base64coder 20101219 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    beust-jcommander:
    • Provide beust-jcommander 1.71 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    bnd-maven-plugin:
    • Update bnd-maven-plugin from version 3.5.2 to version 5.2.0. (jsc#SLE-23217) * Produce bytecode compatible with Java 8 * Port to OSGI 7.0.0 * Require maven-mapping

    bouncycastle:
    • Update bouncycastle from version 1.64 to version 1.71. (jsc#SLE-23217) * Relevant fixes - CVE-2020-28052: OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password. (bsc#1180215) - CVE-2020-15522: Timing issue within the EC math library. (bsc#1186328) - Blake 3 output limit is enforced. - The PKCS12 KeyStore was relying on default precedence for its key Cipher implementation so was sometimes failing if used from the keytool. The KeyStore class now makes sure it uses the correct Cipher implementation. - ASN.1: More robust handling of high tag numbers and definite-length forms. - BCJSSE: Don't log sensitive system property values (GH#976). - The IES AlgorithmParameters object has been re-written to properly support all the variations of IESParameterSpec. - PGPPublicKey.getBitStrength() now properly recognises EdDSA keys. - In line with GPG the PGP API now attempts to preserve comments containing non-ascii UTF8 characters. - An accidental partial dependency on Java 1.7 has been removed from the TLS API. - Lightweight and JCA conversion of Ed25519 keys in the PGP API could drop the leading byte as it was zero. This has been fixed. - Marker packets appearing at the start of PGP public key rings could cause parsing failure. This has been fixed. - ESTService could fail for some valid Content-Type headers. This has been fixed. - CertificateFactory.generateCertificates()/generateCRLs() would throw an exception if extra data was found at the end of a PEM file even if valid objects had been found. Extra data is now ignored providing at least one object found. - PGP ArmoredInputStream now fails earlier on malformed headers. - Ed25519 keys being passed in via OpenSSH key spec are now validated in the KeyFactory. - Blowfish keys are now range checked on cipher construction. - The BasicConstraintsValidation class in the BC cert path validation tools has improved conformance to RFC 5280. - Fix various conversions and interoperability for XDH and EdDSA between BC and SunEC providers. - TLS: Prevent attempts to use KeyUpdate mechanism in versions before TLS 1.3. - Some BigIntegers utility methods would fail for BigInteger.ZERO. This has been fixed. - PGPUtil.isKeyRing() was not detecting secret sub-keys in its input. This has been fixed. - BCJSSE: Lock against multiple writers - a possible synchronization issue has been removed. - Certificates/CRLs with short signatures could cause an exception in toString() in the BC X509 Certificate implmentation - In line with latest changes in the JVM, SignatureSpis which don't require parameters now return null on engineGetParameters() - The RSA KeyFactory now always preferentially produces RSAPrivateCrtKey where it can on requests for a KeySpec based on an RSAPrivateKey - CMSTypedStream$FullReaderStream now handles zero length reads correctly - CMS with Ed448 using a direct signature was using id-shake256-len rather than id-shake256. - Use of GCMParameterSpec could cause an AccessControlException under some circumstances. - DTLS: Fixed high-latency HelloVerifyRequest handshakes. - An encoding bug for rightEncoded() in KMAC has been fixed. - For a few values the cSHAKE implementation would add unnecessary pad bytes where the N and S strings produced encoded data that was block aligned. - DLExternal would encode using DER encoding for tagged SETs. - ChaCha20Poly1305 could fail for large (>~2GB) files. - ChaCha20Poly1305 could fail for small updates when used via the provider. - Properties.getPropertyValue could ignore system property when other local overrides set. - The entropy gathering thread was not running in daemon mode, meaning there could be a delay in an application shutting down due to it. - A recent change in Java 11 could cause an exception with the BC Provider's implementation of PSS. - BCJSSE: TrustManager now tolerates having no trusted certificates. - BCJSSE: Choice of credentials and signing algorithm now respect the peer's signature_algorithms extension properly. * Additional Features and Functionality - Missing PGP CRC checksums can now be optionally ignored using setDetectMissingCRC() (default false) on ArmoredInputStream. - PGPSecretKey.copyWithNewPassword() now has a variant which uses USAGE_SHA1 for key protection if a PGPDigestCalculator is passed in. - PGP ASCII armored data now skips '\t', '\v', and '\f'. - PKCS12 files with duplicate localKeyId attributes on certificates will now have the incorrect attributes filtered out, rather than the duplicate causing an exception. - PGPObjectFactory will now ignore packets representing unrecognised signature versions in the input stream. - The X.509 extension generator will now accumulate some duplicate X.509 extensions into a single extension where it is possible to do so. - Removed support for maxXofLen in Kangaroo digest. - Ignore marker packets in PGP Public and Secret key ring collection. - An implementation of LEA has been added to the low-level API. - Access, recovery, and direct use for PGP session keys has been added to the OpenPGP API for processing encrypted data. - A PGPCanonicalizedDataGenerator has been added which converts input into canonicalized literal data for text and UTF-8 mode. - A getUserKeyingMaterial() method has been added to the KeyAgreeRecipientInformation class. - ASN.1: Tagged objects (and parsers) now support all tag classes. Special code for ApplicationSpecific has been deprecated and re-implemented in terms of TaggedObject. - ASN.1: Improved support for nested tagging. - ASN.1: Added support for GraphicString, ObjectDescriptor, RelativeOID. - ASN.1: Added support for constructed BitString encodings, including efficient parsing for large values. - TLS: Added support for external PSK handshakes. - TLS: Check policy restrictions on key size when determining cipher suite support. - A performance issue in KeccakDigest due to left over debug code has been identified and dealt with. - BKS key stores can now be used for collecting protected keys (note: any attempt to store such a store will cause an exception). - A method for recovering user keying material has been added to KeyAgreeRecipientInformation. - Support has been added to the CMS API for SHA-3 based PLAIN-ECDSA. - The low level BcDefaultDigestProvider now supports the SHAKEfamily of algorithms and the SM3 alogirthm. - PGPKeyRingGenerator now supports creation of key-rings with direct-key identified keys. - The PQC NIST candidate, signature algorithm SPHINCS+ has been added to the low-level API. - ArmoredInputStream now explicitly checks for a '\n' if in crLF mode. - Direct support for NotationDataOccurances, Exportable,Revocable, IntendedRecipientFingerPrints, and AEAD algorithm preferences has been added to PGPSignatureSubpacketVector. - Further support has been added for keys described using S-Expressions in GPG 2.2.X. - Support for OpenPGP Session Keys from the (draft) Stateless OpenPGP CLI has been added. - Additional checks have been added for PGP marker packets in the parsing of PGP objects. - A CMSSignedData.addDigestAlgorithm() has been added to allow for adding additional digest algorithm identifiers to CMS SignedData structures when required. - Support has been added to CMS for the LMS/HSS signature algorithm. - The system property 'org.bouncycastle.jsse.client.assumeOriginalHostName' (default false) has been added for dealing with SNI problems related to the host name not being propagate by the JVM. - The JcePKCSPBEOutputEncryptorBuilder now supports SCRYPT with ciphers that do not have algorithm parameters (e.g. AESKWP). - Support is now added for certificates using ETSI TS 103 097, 'Intelligent Transport Systems (ITS)' in the bcpkix package. - Added support for OpenPGP regular expression signature packets. - added support for OpenPGP PolicyURI signature packets. - A utility method has been added to PGPSecretKeyRing to allow for inserting or replacing a PGPPublicKey. - The NIST PQC Finalist, Classic McEliece has been added to the low level API and the BCPQC provider. - The NIST PQC Alternate Candidate, SPHINCS+ has been added to the BCPQC provider. - The NIST PQC Alternate Candidate, FrodoKEM has been added to the low level API and the BCPQC provider. - The NIST PQC Finalist, SABER has been added to the low level API and the BCPQC provider. - KMAC128, KMAC256 has been added to the BC provider (empty customization string). - TupleHash128, TupleHash256 has been added to the BC provider (empty customization string). - ParallelHash128, ParallelHash256 has been added to the BC provider (empty customization string, block size 1024 bits). - Two new properties: 'org.bouncycastle.rsa.max_size' (default 15360) and 'org.bouncycastle.ec.fp_max_size' (default 1042) have been added to cap the maximum size of RSA and EC keys. - RSA modulus are now checked to be provably composite using the enhanced MR probable prime test. - Imported EC Fp basis values are now validated against the MR prime number test before use. The certainty level of the prime test can be determined by 'org.bouncycastle.ec.fp_certainty' (default 100). - The BC entropy thread now has a specific name: 'BC-ENTROPY-GATHERER'. - Utility methods have been added for joining/merging PGP public keys and signatures. - Blake3-256 has been added to the BC provider. - DTLS: optimisation to delayed handshake hash. - Further additions to the ETSI 102 941 support in the ETSI/ITS package: certification request, signed message generation and verification now supported. - CMSSignedDataGenerator now supports the direct generation of definite-length data. - The NetscapeCertType class now has a hasUsages() method on it for querying usage settings on its bit string. - Support for additional input has been added for deterministic (EC)DSA. - The OpenPGP API provides better support for subkey generation. - BCJSSE: Added boolean system properties 'org.bouncycastle.jsse.client.dh.disableDefaultSuites' and 'org.bouncycastle.jsse.server.dh.disableDefaultSuites'. Default 'false'. Set to 'true' to disable inclusion of DH cipher suites in the default cipher suites for client/server respectively. - GCM-SIV has been added to the lightweight API and the provider. - Blake3 has been added to the lightweight API. - The OpenSSL PEMParser can now be extended to add specialised parsers. - Base32 encoding has now been added, the default alphabet is from RFC 4648. - The KangarooTwelve message digest has been added to the lightweight API. - An implementation of the two FPE algorithms, FF1 and FF3-1 in SP 800-38G has been added to the lightweight API and the JCE provider. - An implementation of ParallelHash has been added to the lightweight API. - An implementation of TupleHash has been added to the lightweight API. - RSA-PSS now supports the use of SHAKE128 and SHAKE256 as the mask generation function and digest. - ECDSA now supports the use of SHAKE128 and SHAKE256. - PGPPBEEncryptedData will now reset the stream if the initial checksum fails so another password can be tried. - Iterators on public and secret key ring collections in PGP now reflect the original order of the public/secret key rings they contain. - KeyAgreeRecipientInformation now has a getOriginator() method for retrieving the underlying orginator information. - PGPSignature now has a getDigestPrefix() method for people wanting exposure to the signature finger print details. - The old BKS-V1 format keystore is now disabled by default. If you need to use BKS-V1 for legacy reasons, it can be re-enabled by adding: org.bouncycastle.bks.enable_v1=true to the java.security file. We would be interested in hearing from anyone that needs to do this. - PLAIN-ECDSA now supports the SHA3 digests. - Some highlevel support for RFC 4998 ERS has been added for ArchiveTimeStamp and EvidenceRecord. The new classes are in the org.bouncycastle.tsp.ers package. - ECIES has now also support SHA256, SHA384, and SHA512. - digestAlgorithms filed in CMS SignedData now includes counter signature digest algorithms where possible. - A new property 'org.bouncycastle.jsse.config' has been added which can be used to configure the BCJSSE provider when it is created using the no-args constructor. - In line with changes in OpenSSL 1.1.0, OpenSSLPBEParametersGenerator can now be configured with a digest. - PGPKeyRingGenerator now includes a method for adding a subkey with a primary key binding signature. - Support for ASN.1 PRIVATE tags has been added. - Performance enhancements to Nokeon, AES, GCM, and SICBlockCipher. - Support for ecoding/decoding McElieceCCA2 keys has been added to the PQC API - BCJSSE: Added support for jdk.tls.maxCertificateChainLength system property (default is 10). - BCJSSE: Added support for jdk.tls.maxHandshakeMessageSize system property (default is 32768). - BCJSSE: Added support for jdk.tls.client.enableCAExtension (default is 'false'). - BCJSSE: Added support for jdk.tls.client.cipherSuites system property. - BCJSSE: Added support for jdk.tls.server.cipherSuites system property. - BCJSSE: Extended ALPN support via standard JSSE API to JDK 8 versions after u251/u252. - BCJSSE: Key managers now support EC credentials for use with TLS 1.3 ECDSA signature schemes (including brainpool). - TLS: Add TLS 1.3 support for brainpool curves per RFC 8734. - BCJSSE: Added support for system property com.sun.net.ssl.requireCloseNotify. Note that we are using a default value of 'true'. - BCJSSE: 'TLSv1.3' is now a supported protocol for both client and server. For now it is only enabled by default for the 'TLSv1.3' SSLContext, but can be explicitly enabled using 'setEnabledProtocols' on an SSLSocket or SSLEngine, or via SSLParameters. - BCJSSE: Session resumption is now also supported for servers in TLS 1.2 and earlier. For now it is disabled by default, and can be enabled by setting the boolean system property org.bouncycastle.jsse.server.enableSessionResumption to 'true'. - The provider RSA-PSS signature names that follow the JCA naming convention. - FIPS mode for the BCJSSE now enforces namedCurves for any presented certificates. - PGPSignatureSubpacketGenerator now supports editing of a pre-existing sub-packet list. - Performance improvement of Argon2 and Noekeon - A setSessionKeyObfuscation() method has been added to PublicKeyKeyEncryptionMethodGenerator to allow turning off of session key obfuscation (default is on, method primarily to get around early version GPG issues with AES-128 keys) - Implemented 'safegcd' constant-time modular inversion (as well as a variable-time variant). It has replaced Fermat inversion in all our EC code, and BigInteger.modInverse in several other places, particularly signers. This improves side-channel protection, and also gives a significant performance boost - Performance of custom binary ECC curves and Edwards Curves has been improved - BCJSSE: New boolean system property 'org.bouncycastle.jsse.keyManager.checkEKU' allows to disable ExtendedKeyUsage restrictions when selecting credentials (although the peer may still complain) - Initial support has been added for 'Composite Keys and Signatures For Use In Internet PKI' using the test OID. Please note there will be further refinements to this as the draft is standardised - The BC EdDSA signature API now supports keys implementing all methods on the EdECKey and XECKey interfaces directly - Further optimization work has been done on GCM - A NewHope based processor, similar to the one for Key Agreement has been added for trying to 'quantum hard' KEM algorithms - PGP clear signed signatures now support SHA-224 - Treating absent vs NULL as equivalent can now be configured by a system property. By default this is not enabled - Mode name checks in Cipher strings should now make sure an improper mode name always results in a NoSuchAlgorithmException - In line with changes in OpenSSL, the OpenSSLPBKDF now uses UTF8 encoding - The qTESLA signature algorithm has been updated to v2.8 (20191108). - BCJSSE: Client-side OCSP stapling now supports status_request_v2 extension. - Support has been added for 'ocsp.enable', 'ocsp.responderURL' and PKIXRevocationChecker for users of Java 8 and later. - Support has been added for 'org.bouncycastle.x509.enableCRLDP' to the PKIX validator. - BCJSSE: Now supports system property 'jsse.enableFFDHE' - BCJSSE: Now supports system properties 'jdk.tls.client.SignatureSchemes' and 'jdk.tls.server.SignatureSchemes'. - Multi-release support has been added for Java 11 XECKeys. - Multi-release support has been added for Java 15 EdECKeys. - The MiscPEMGenerator will now output general PrivateKeyInfo structures. - A new property 'org.bouncycastle.pkcs8.v1_info_only' has been added to make the provider only produce version 1 PKCS8 PrivateKeyInfo structures. - The PKIX CertPathBuilder will now take the target certificate from the target constraints if a specific certificate is given to the selector. - BCJSSE: A range of ARIA and CAMELLIA cipher suites added to supported list. - BCJSSE: Now supports the PSS signature schemes from RFC 8446 (TLS 1.2 onwards). - Performance of the Base64 encoder has been improved. - The PGPPublicKey class will now include direct key signatures when checking for key expiry times. - LMS and HSS (RFC 8554) support has been added to the low level library and the PQC provider. - SipHash128 support has been added to the low level library and the JCE provider. - BCJSSE: BC API now supports explicitly specifying the session to resume. - BCJSSE: Ed25519, Ed448 are now supported when TLS 1.2 or higher is negotiated (except in FIPS mode). - BCJSSE: Added support for extended_master_secret system properties: jdk.tls.allowLegacyMasterSecret, jdk.tls.allowLegacyResumption, jdk.tls.useExtendedMasterSecret. - BCJSSE: Ed25519, Ed448 are now supported when TLS 1.2 or higher is negotiated (except in FIPS mode). - BCJSSE: KeyManager and TrustManager now check algorithm constraints for keys and certificate chains. - BCJSSE: KeyManager selection of server credentials now prefers matching SNI hostname (if any). - BCJSSE: KeyManager may now fallback to imperfect credentials (expired, SNI mismatch). - BCJSSE: Client-side OCSP stapling support (beta version: via status_request extension only, provides jdk.tls.client.enableStatusRequestExtension, and requires CertPathBuilder support). - TLS: DSA in JcaTlsCrypto now falls back to stream signing to work around NoneWithDSA limitations in default provider. * Notes - The deprecated QTESLA implementation has been removed from the BCPQC provider. - The submission update to SPHINCS+ has been added. This changes the generation of signatures - particularly deterministic ones. - While this release should maintain source code compatibility, developers making use of some parts of the ASN.1 library will find that some classes need recompiling. Apologies for the inconvenience. - There is a small API change in the PKIX package to the DigestAlgorithmIdentifierFinder interface as a find() method that takes an ASN1ObjectIdentifier has been added to it. For people wishing to extend their own implementations, see DefaultDigestAlgorithmIdentifierFinder for a sample implementation. - A version of the bcmail API supporting Jakarta Mail has now been added (see bcjmail jar). - Some work has been done on moving out code that does not need to be in the provider jar. This has reduced the size of the provider jar and should also make it easier for developers to patch the classes involved as they no longer need to be signed. bcpkix and bctls are both dependent on the new bcutil jar. - The qTESLA update breaks compatibility with previous versions. Private keys now include a hash of the public key at the end, and signatures are no longer interoperable with previous versions.
    • Add build dependencies on mvn(jakarta.activation:jakarta.activation-api) and mvn(jakarta.mail:jakarta.mail-api)
    • Remove unneeded script bouncycastle_getpoms.sh from sources
    • Build against the standalone JavaEE modules unconditionally
    • Build with source/target levels 8
    • Add glassfish-activation-api dependency so that we can build with JDK that does not contain the JavaEE modules
    • Add bouncycastle_getpoms.sh to get pom files from Maven repos
    • Add OSGi manifests to the distributed jars so that they can be used from eclipse (default enabled protocols).

    bsf:
    • Provide bsf 2.4.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    bsh2:
    • Provide bsh2 2.0.0.b6 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    cal10n:
    • Update cal10n from version 0.7.7 to version 0.8.1.10. (jsc#SLE-23217) * Fetch sources using source service from ch.qos git * Upgrade to the 10th commit after 0.8.1 calling it 0.8.1.10 * Add the cal10n-ant-task to built artifacts * This release adds JSR-269 support. In other words, verification of bundles can be performed at compilation time. See the related documentation for more details. * Fix issue with Eclipse not finding existing resources. Eclipse will find bundles located under 'src/main/resources' but still fail to find bundles located under 'src/test/resources/'. * When reading in bundles, the verify method in MessageKeyVerifier now uses the locale passed as parameter instead of always Locale.FR. * Update build.xml-0.7.7.tar.xz to build.xml-0.8.1.tar.xz with references to version 0.8.1 to build correctly versioned jar files.

    cbi-plugins:
    • Build only on architectures where eclipse is supported. (jsc#SLE-23217)
    • Do not build against the legacy version of guava any more. (jsc#SLE-23217)
    • Fix build with newer auto version by adding the auto-value-annotations artifact to the dependencies

    cdi-api:
    • Update cdi-api from version 1.2 to version 2.0.2. (jsc#SLE-23217) * Build with java source and target levels 8 * Remove dependency on glassfish-el

    cglib:
    • Update cglib from version 3.2.4 to version 3.3.0. (jsc#SLE-23217) * Remove links between artifacts and their parent since we are not building with maven * Don't inject true in cglib pom, as 3.3.0 already provides that option and it makes the POM xml incorrect.

    checker-qual:
    • Provide checker-qual version 3.22.0. (jsc#SLE-23217) * Checker Qual contains annotations (type qualifiers) that a programmer writes to specify Java code for type-checking by the Checker Framework. * This is a dependency of Guava

    classmate:
    • Provide classmate version 1.5.1 (jsc#SLE-23217)

    codemodel:
    • Provide codemodel version 2.6 (jsc#SLE-23217)

    codenarc:
    • Do not generate test stubs by gmavenplus-plugin, since we are not building or running tests during build.
    • Build with source and target levels 8 (jsc#SLE-23217)

    concurrentlinkedhashmap-lru:
    • Provide concurrentlinkedhashmap-lru version 1.3.2 (jsc#SLE-23217)

    decentxml:
    • Build with source and target levels 8 (jsc#SLE-23217)

    dom4j:
    • Build against the standalone JavaEE modules unconditionally. (jsc#SLE-23217)
    • Add alias to the new artifact coordinates org.dom4j:dom4j. (jsc#SLE-23217)
    • Add jaxb-api dependency for relevant distribution versions so that we can build with JDKs that do not include the JavaEE modules. (jsc#SLE-23217)

    ecj:
    • Update ecj from version 4.12 to version 4.18. (jsc#SLE-23217) * the encoding needs to be set for all JDK versions * Upgrade to eclipse 4.18 ecj * Switch java14api to java15api to be compatible to JDK 15 * Switch to JDK 11 for build a JDK 8 is not supported anymore by ecj * Switch java10api to java14api to be compatible to JDK 14

    eclipse:
    • Update eclipse from version 4.9.0 to version 4.15. (jsc#SLE-23217) * Force building with Java 11, since tycho is not knowing about any Java >= 15 * Add support for riscv64 * Allow building with objectweb-asm 9.x * Do not require Java10 APIs artifact when building with java 11 * Fix unresolved symbols when trying to load libkeystorelinuxnative.so on platforms that have it * Build only on 64-bit architectures, since 32-bit support was dropped upstream * Fix build with gcc 10 * Build against jgit, since jgit-bootstrap does not exist * The dependencies of felix-scr changed. So stop linking xpp3 and kxml and link osgi.cmpn as symlink plugins. * Filter out the *SUNWprivate_1.1* symbols from requires

    eclipse-ecf:
    • Update eclipse-ecffrom version 3.14.1 to version 3.14.8. (jsc#SLE-23217) * Build against jgit, since jgit-bootstrap does not exist * Allow building with objectweb-asm 9.x * Force building with Java 11, since tycho is not knowing about any Java >= 15

    eclipse-egit:
    • Update eclipse-egit from version 5.1.3 to version 5.11.0. (jsc#SLE-23217) * Needed because of change of eclipse-jgit to 5.11.0 * Force building with Java 11, since tycho is not knowing about any Java >= 15 * Build only on 64-bit architectures, since 32-bit support was dropped upstream

    eclipse-emf:
    • Update eclipse-emf from version 2.15.0~gitd1e5fdd to version 2.22.0. (jsc#SLE-23217) * Build against jgit, since jgit-bootstrap does not exist * Force building with Java 11, since tycho is not knowing about any Java >= 15 * Build only on 64-bit architectures, since 32-bit support was dropped upstream

    eclipse-jgit:
    • Update eclipse-jgit from version 5.1.3 to version 5.11.0. (jsc#SLE-23217) * Fix build against apache-sshd 2.7.0 * Restore java 8 compatibility when building with java 9+ * Split the build into two spec files instead of multibuild. One produces the maven artifacts, the jgit command-line and the other produces eclipse features.
    eclipse-license:
    • Update eclipse-license from version 2.0.1 to version 2.0.2. (jsc#SLE-23217) * Build only on architectures where eclipse is supported * Force building with Java 11, since tycho is not knowing about any Java >= 15 * Update the eclipse-license2 feature to 2.0.0

    eclipse-swt:
    • Provide eclipse-swt version 4.9.0 for i586 architecture. (jsc#SLE-23217)

    ed25519-java:
    • Provide ed25519-java version 0.3.0. (jsc#SLE-23217)

    ee4j:
    • Provide ee4j veersion 1.0.7

    exec-maven-plugin:
    • Update exec-maven-plugin from version 1.6.0 to version 3.0.0. (jsc#SLE-23217)

    extra166y:
    • Build with source and target levels 8 (jsc#SLE-23217)

    ezmorph:
    • Do not build against the log4j12 packages. (jsc#SLE-23217)
    • Build with source and target levels 8. (jsc#SLE-23217)

    felix-bundlerepository:
    • Provide felix-bundlerepository version 2.0.10. (jsc#SLE-23217)

    felix-gogo-command:
    • Remove forcing of maven.compiler.release, since it is not needed anymore. (jsc#SLE-23217)

    felix-gogo-runtime:
    • Rewrite the build system to ant so that is it possible to eventually avoid build cycles with maven-plugin-bundle built against felix-bundlerepository. (jsc#SLE-23217)

    felix-osgi-compendium:
    • Build with source and target levels 8 (jsc#SLE-23217)

    felix-osgi-foundation:
    • Build with source and target levels 8 (jsc#SLE-23217)

    felix-osgi-obr:
    • Provide felix-osgi-obr version 1.0.2. (jsc#SLE-23217)

    felix-scr:
    • Update felix-scr from version 2.0.14 to version 2.1.16. (jsc#SLE-23217) * Drop dependencies on kxml and xpp, use the system SAX implementation instead * Do not embed dependencies, use import-package instead

    felix-shell:
    • Rewrite the build system to ant so that is it possible to eventually avoid build cycles with maven-plugin-bundle built against felix-bundlerepository. (jsc#SLE-23217)
    • Build against OSGi R7 APIs

    felix-utils:
    • Update felix-utils from version 1.10.4 to version 1.11.4. (jsc#SLE-23217) * Migrate away from the old felix-osgi implementation

    fmpp:
    • Build with source and target levels 8 (jsc#SLE-23217)

    freemarker:
    • Update freemarker from version 2.3.28 to version 2.3.31. (jsc#SLE-23217) * Fix build with javacc 7.0.11 * Package the manual. Add build dependency on docbook5-xsl-stylesheets * On supported platforms, avoid building with OpenJ9, in order to prevent build cycles

    geronimo-specs:
    • Set version for the specs comming from tag 1_1_1 in order to avoid unexpanded version macros in pom files.
    • On supported platforms, avoid building with OpenJ9, in order to prevent build cycles.

    glassfish-activation:
    • Provide glassfish-activation version 1.2.0. (jsc#SLE-23217)

    glassfish-annotation-api:
    • Build with source and target levels 8 (jsc#SLE-23217)

    glassfish-dtd-parser:
    • Provide glassfish-dtd-parser version 1.4 (jsc#SLE-23217)

    glassfish-fastinfoset:
    • Provide glassfish-fastinfoset version 1.2.15. (jsc#SLE-23217)

    glassfish-jaxb-api:
    • Provide glassfish-activation version 2.4.0. (jsc#SLE-23217)

    glassfish-jaxb:
    • Provide glassfish-jaxb version 2.3.1. (jsc#SLE-23217)

    glassfish-jax-rs-api:
    • Change the tarball location, since the old location does not work anymore

    glassfish-jsp:
    • Build with source and target levels 8 (jsc#SLE-23217)

    glassfish-servlet-api:
    • Provide glassfish-servlet-api 3.1.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    glassfish-transaction-api:
    • Build with target source and target levels 8. (jsc#SLE-23217)
    • Specify specMode=javaee to be able to use newer spec-version-maven-plugin.

    gmavenplus-plugin:
    • Update gmavenplus-plugin from version 1.5 to version 1.13.1. (jsc#SLE-23217) * Relevant fixes: + Using bindAllProjectProperties and bindSessionUserOverrideProperties together can cause an NPE. + Certain AST transformations had classloader issues because 1.12.0 was no longer setting the context classloader. + The classloader project dependencies are loaded onto is reused between modules, so each module was a superset of all modules that preceded it. Also, the console, execute, and shell mojos didn't pass the classloader to use into the instantiated GroovyConsole/GroovyShell, so it accidentally was using the plugin classloader, even when configured to use PROJECT_ONLY classpath. Potentially breaking changes: This should be a non-breaking change (except for unusual situations that were relying on the previous incorrect behavior). However, since it's a significant change, there's a version bump for highlighitng the potential issue. + Disable system exits by default, to avoid potential thread safety issues. * Potentially breaking changes: changes the default of not allowing System.exits to allowing them. * Enhancements: + Add support for targetting Java 10, 11, 13, 14, 15, 17, 18. + Update Ant from 1.10.8 to 1.10.11. + Update Jansi to 2.x. + Change JDK compatibility check to also account for Java 16. + Some tweaks for Groovy 4 (most notably, invokedynamic is enabled by default for Groovy 4 and cannot be disabled). + New parameter (attachGroovyDocAnnotation) to enable attaching GroovyDoc annotation. + New parameter (parallelParsing) to enable parallel parsing (enabled by default with Groovy 4). + Remove previewFeatures parameter from stub generation goals, since it's not used there. + Ability to override classes used to generate GroovyDoc (#91) + Ability to override GStringTemplates used for GroovyDoc (#105) + Ability to bind overridden properties (by binding project properties and/or session user properties) (#72) + Ability to load a script when launching GroovyConsole (#165) + Change default GroovyDoc jar artifact type to javadoc, so its extension gets set to 'jar' by the artifact handler instead of 'groovydoc' by the default handler logic which uses the type for the extension in the case of unknown types (#151). + Add skipBytecodeCheck property and parameter, so if a Java version comes out the plugin doesn't recognize, you can use it without having to wait for an update. + Use groovy.ant.AntBuilder instead of groovy.util.AntBuilder (if available). + Support Java preview features (#125) + New goals to create GroovyDoc jars (#124) + Use the new 'groovy.console.ui.Console' package, if available, fall back to 'groovy.ui.Console' + [36] - Allow script files to be executed as filenames as well as URLs (see Significant changes of note for an example) + [41] - Verify Groovy version supports target bytecode (See Potentially breaking changes for a description) + [46] - Remove scriptExtensions config option + [31/58] - Goals not consistantly named / IntelliJ improperly adding stub directories to sources + [61] - You can now skip Groovydoc generation with new skipGroovyDoc property (Thanks rvenutolo!) + [45] - GROOVY-7423 (JEP 118) Support (requires Groovy 2.5.0-alpha-1 or newer and enabled with new parameters boolean property) * Potentially breaking changes: + 46 will break your build if you are using scriptExtensions. But the fix is simple, just the delete the configuration option and GMavenPlus will automatically do the right thing. + 41 will break your build if you were passing an invalid target bytecode. GMavenPlus will no longer allow Groovy to silently default to 1.4 or 1.5. It will verify that the bytecode is supported by your Groovy version (that is, the option exists in org.codehaus.groovy.control.CompilerConfiguration), and fail if it isn't. + 58 will require renaming goals testGenerateStubs to generateTestStubs and testCompile to compileTests. IntelliJ has hard-coded the goal names in their plugin, and these names will make IntelliJ work with both GMaven and GMavenPlus. + In order to support using the latest Maven plugins (and to make GMavenPlus easier to maintain), GMavenPlus now requires Java 6 or newer and Maven 3.0.1 or newer (previously was Java 5 or newer and Maven 2.2.1 or newer). + testStubsOutputDirectory and stubsOutputDirectory inadvertently got renamed to outputDirectory, which conflicts with the configuration in the compile and compileTests goals. You may need to setup separate executions with separate configurations for each if you need to set that configuration option. + The Jansi upgrade should generally be compatible, but could cause issues with scripts that were using Jansi 1.x specific classes. + If you were using the previewFeatures parameter without also including a compilation goal that would make that config valid, the build will fail because it's no longer a valid parameter. The fix would be to move that configuration to the appropriate execution(s). + GroovyDoc jars and test GroovyDoc jars will now be of type 'javadoc' and have extension 'jar'. Rather than type and extension 'groovydoc'. If you do not wish to transition to this new behavior, set the new artifactType or testArtifactType property to 'groovydoc' to revert to the previous behavior. Notes: while the artifact type of GroovyDoc jars has changed, the Maven classifier has not. It remains 'groovydoc', and you can still override that, just as before. + maven.groovydoc.skip property was renamed to skipGroovydoc so it matches the pattern of the other properties and won't seem to imply it's a property for a standard Maven plugin. + Using groovy.ant.AntBuilder instead of groovy.util.AntBuilder (when available on classpath). + Bundling Ant 1.10.7 instead of 1.10.5. + Bundling Ivy 2.5.0 instead of 2.4.0. + If you were using useSharedClasspath before, you will need to replace it with new values. Please, check the docuemntation for the full details. + Another notable difference is that when using this new configuration parameter in compile, compileTests, generateStubs, or generateTestStubs goals, now also uses the configurator to add the project dependencies to the classpath with the plugin's dependencies. Previously, this only happened in the goals other than the ones mentioned. + corrects an inadvertent breaking change made in 1.6.0 Please, check the documentation the full list of changes. + In addition, unused parameters have been removed: * addSources * -> skipTests * -> testSources * addStubSources * -> skipTests * -> sources * -> testSources * addTestSources * -> outputDirectory * -> skipTests * -> sources * addTestStubSources * -> sources * -> testSources * compile * -> skipTests * -> testSources * compileTests * -> sources * console * -> skipTests * execute * -> skipTests * generateStubs * -> skipTests * -> testSources * generateTestStubs * -> sources * groovydoc * -> skipTests * -> testSources * -> testGroovyDocOutputDirectory * groovydocTests * -> skipTests * -> sources * removeStubs * -> skipTests * -> sources * -> testSources * removeTestStubs * -> sources * -> testSources * shell * -> skipTests + Lastly, addTestStubSources and removeTestStubs now respect the skipTests flag, for consistency. * Notes: + Now officially requires Java 7 instead of 6. This is not a breaking change, however, since this was actually already required because of plexus-classworlds. This just wasn't discovered until an enforcer rule was added to check bytecode versions of dependencies.

    gmetrics:
    • Do not generate test stubs by gmavenplus-plugin, since we are not building or running tests during build. (jsc#SLE-23217)

    google-errorprone-annotations:
    • Provide google-errorprone-annotations 2.11.0. (jsc#SLE-23217) * This is a new dependency of Guava

    google-gson:
    • Update google-gson to version 2.8.9. (jsc#SLE-24261) * Make OSGi bundle's dependency on sun.misc optional. * Deprecate Gson.excluder() exposing internal Excluder class. * Prevent Java deserialization of internal classes. * Improve number strategy implementation. * Fix LongSerializationPolicy null handling being inconsistent with Gson. * Support arbitrary Number implementation for Object and Number deserialization. * Bump proguard-maven-plugin from 2.4.0 to 2.5.1. * Fix RuntimeTypeAdapterFactory depending on internal Streams class. * Build with Java >= 9 in order to produce a modular jar by compiling the module-info.java sources with all other classes built with release 8 and still compatible with Java 8

    google-guice:
    • Avoid using xmvn-resolve and xmvn-install in order to avoid build cycles with new dependencies in dependent packages
    • Build only the NO_AOP version of the guice.jar and alias accordingly so that it provides both (jsc#SLE-23217)
    • Build with source/target 8 so that the default override from the interface can be used
    • Build javadoc with source level 8
    • Do not build against the compatibility guava20 (jsc#SLE-23217)

    google-http-java-client:
    • Build with source and target levels 8 (jsc#SLE-23217)

    google-oauth-java-client:
    • Build with source and target levels 8 (jsc#SLE-23217)

    gpars:
    • Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
    • Build against the org.jboss.netty:netty artifact, since the compat versions are not existing any more
    • Build with source and target levels 8

    gradle-bootstrap:
    • Update gradle-bootstrap from version 2.4.16 to version 2.4.21. (jsc#SLE-23217) * Regenerate to account for changes in gradle and groovy packages * Modify the launcher so that gradle-bootstrap can work with Java 17 * Adapt to the change in jline/jansi dependencies of gradle * The org.jboss.netty:netty artifact does not exist any more under compatibility versions * Regenerate to account for maven-resolver upgrade to 1.7.3 and the new added maven-resolver-named-locks artifact * Regenerate to account for aqute-bnd upgrade to 5.1.1 and related changes in other libraries * Regenerate to account for guava upgrade to 30.1.1 * Regenerate to account for groovy upgrade to 2.4.21

    gradle:
    • Allow actually build gradle using Java 16+
    • Modify the launcher so that gradle can work with Java 17
    • Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
    • Build against jansi 2.x
    • Remove the jansi-native and hawtjni-runtime dependencies, since jansi 2.x does not depend on them
    • Fix build with maven-resolver 1.7.x
    • Remove from build dependencies some artifacts that are not needed
    • Add osgi-compendium to the dependencies, since newer qute-bnd uses it
    • Do not build against the legacy guava20 package any more
    • Port gradle 4.4.1 to guava 30.1.1
    • Set source level to 1.8, since guava 30 uses default functions in interfaces, which is Java 8+ feature

    groovy:
    • Solve illegal reflective access with Java 16+
    • Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
    • Add the content of org.gradle.jvmargs to to the forked jvm in root compileJava task
    • Fixes build with Java 17
    • Port to build against jansi 2.4.0
    • Build the whole with java source and target levels 8
    • Resolve parameter ambiguities with recent Java versions
    • Remove a bogus dependency on old asm3

    groovy18:
    • Fix build against jansi 2.4.0
    • Port to use jline 2.x instead of 1.x
    • Do not fork the groovyc and java tasks in the ant build.xml file, so that the ANT_OPTS are propagated to the tasks
    • Fix build with jdk17
    • Build with source and target levels 8. (jsc#SLE-23217)
    • Cast to Collection to help compiler to resolve ambiguities with new JDKs
    • Remove dependency on the old asm3

    guava20:
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Add bundle manifest to the guava jar so that it might be usable from eclipse

    guava:
    • Update Guava from version 25.0 to version 30.1.1. (jsc#SLE-23217) * CVE-2020-8908: A temp directory creation vulnerability allows an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). (bsc#1179926) * Remove parent reference from ALL distributed pom files

    hamcrest:
    • Build with source/target levels 8
    • Fix build with jdk17

    hawtjni-maven-plugin:
    • Update hawtjni-maven-pluginfrom version 1.17 to version 1.18. (jsc#SLE-23217) * Build with java source and target levels 8 * Use commons-lang3 instead of the old commons-lang

    hawtjni-runtime:
    • Update hawtjni-runtime from version 1.17 to version 1.18. (jsc#SLE-23217) * Build with java source and target levels 8 * Use commons-lang3 instead of the old commons-lang * Use in the path of hawtjni-generator the asm-all.jar that is not modular. This solves some problems with ASM version mismatch.

    http-builder:
    • Build with source and target levels 8. (jsc#SLE-23217)
    • Do not require gmavenplus-plugin, since it is only necessary to generate test stubs, but we do not run tests during build

    httpcomponents-client:
    • Update httpcomponents-client from version 4.5.6 to version 4.5.12. (jsc#SLE-23217) * Build with source/target levels 8

    httpcomponents-core:
    • Update httpcomponents-core from version 4.4.10 to version 4.4.13. (jsc#SLE-23217) * Build with source/target levels 8

    icu4j:
    • Update icu4j from version 63.1 to version 71.1. (jsc#SLE-23217) * Remove build-dependency on java-javadoc, since it is not necessary with this version. * Updates to CLDR 41 locale data with various additions and corrections. * Adds phrase-based line breaking for Japanese. Existing line breaking methods follow standards and conventions for body text but do not work well for short Japanese text, such as in titles and headings. This new feature is optimized for these use cases. * Adds support for Hindi written in Latin letters (hi_Latn). The CLDR data for this increasingly popular locale has been significantly revised and expanded. Note that based on user expectations, hi_Latn incorporates a large amount of English, and can also be referred to as 'Hinglish'. * ICU 71 and CLDR 41 are minor releases, mostly focused on bug fixes and small enhancements. * Updates to the time zone data version 2022a. Note that pre-1970 data for a number of time zones has been removed, as has been the case in the upstream tzdata release since 2021b. * Unicode 13 (ICU-20893, same as in ICU 66) * CLDR 37 + New language at Modern coverage: Nigerian Pidgin + New languages at Basic coverage: Fulah (Adlam), Maithili, Manipuri, Santali, Sindhi (Devanagari), Sundanese + Unicode 13 root collation data and Chinese data for collation and transliteration * DateTimePatternGenerator now obeys the 'hc' preference in the locale identifier (ICU-20442) * Various other improvements for ECMA-402 conformance * Number skeletons have a new 'concise' form that can be used in MessageFormat strings (ICU-20418) * Currency formatting options for formal and other currency display name variants (ICU-20854) * ListFormatter: new public API to select the style and type * Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272) * LocaleMatcher: New option to ignore one-way matches, and other tweaks to the code and data

    isorelax:
    • Build with java target and source version 1.8 (jsc#SLE-23217)

    istack-commons:
    • Provide istack-commons version 3.0.7 (jsc#SLE-23217)

    j2objc-annotations:
    • Provide j2objc-annotations version 2.2 (jsc#SLE-23217) * This is a new dependency of Guava

    jackson-modules-base:
    • Provide jackson-modules-base version 2.13.3 (jsc#SLE-23217)

    jackson-parent:
    • Update jackson-parent from version 2.10 to version 2.13. (jsc#SLE-23217) * Add 'mvnw' wrapper * 'JsonSubType.Type' should accept array of names * Jackson version alignment with Gradle 6 * Add '@JsonIncludeProperties' * Add '@JsonTypeInfo(use=DEDUCTION)' * Ability to use '@JsonAnyGetter' on fields * Add '@JsonKey' annotation * Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping * Add 'namespace' property for '@JsonProperty' (for XML module) * Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue' (was missing for some reason) * 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null' * Remove `jackson-annotations` baseline dependency, version * Upgrade to oss-parent 43 (jacoco, javadoc plugin versions) * Remove managed junit version (due to [jackson-bom#43]), promoted higher up on parent pom stack (to 'jackson-base') * JDK baseline now JDK 8

    jackson:
    • Remove all dependencies on asm3
    • Build with java source and target levels 1.8 (jsc#SLE-23217)
    • Do not hardcode source and target levels, so that they can be overriden on command-line
    • Set classpath correctly so that the project builds with standalone JavaEE modules too

    jakarta-activation:
    • Provide jakarta-activation version 2.1.0. (jsc#SLE-23217) * Required by bouncycastle-jmail.

    jakarta-commons-discovery:
    • Distribute commons-discovery as maven artifact
    • Build with source and target levels 8
    • Added build support for Enterprise Linux.


    jakarta-commons-modeler:
    • Update jakarta-commons-modeler from version 2.0 to version 2.0.1. (jsc#SLE-23217) * Build with java source and target levels 8 * Modeler 2.0.1 is binary and source compatible with Modeler 2.0

    jakarta-mail:
    • Provide jakarta-mail version 2.1.0. (jsc#SLE-23217) * Requrired by bouncycastle-jmail.

    jakarta-taglibs-standard:
    • Provide jakarta-taglibs-standard 1.1.1 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    jandex:
    • Provide jandex version 2.4.2. (jsc#SLE-23217)

    janino:
    • Update janino from version 2.7.8 to version 3.1.6. (jsc#SLE-23217) * Build with source and target levels 8 * Require javapackages-tools * Provide commons-compiler subpackage that is needed by gradle

    jansi-native:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jansi:
    • Update jansi from version 1.17.1 to version 2.4.0. (jsc#SLE-23217) * Build with source and target levels 8 * Give a possibility to load the native libjansi.so from system * Make the jansi package archful since it installs a native library and jni jar * Do not depend on jansi-native and hawtjni-runtime * Integrates jansi-native libraries

    jarjar:
    • Filter out the distributionManagement section from pom files, since we use aliases and not relocations
    • Drop maven2-plugin. (jsc#SLE-23217)

    jatl:
    • Build with source and target levels 8 (jsc#SLE-23217)

    javacc-maven-plugin:
    • Build with source and target levels 8 (jsc#SLE-23217)

    javacc:
    • Update javacc from version 7.0.4 to version 7.0.11. (jsc#SLE-23217) * The following changes are not upward compatible with the previous 7.0.5 version but have a very little impact on existing grammars. Main advantage is to prepare a more smooth upgrade with the upcoming javacc-8.0.0 major release. * C++ generation: renaming the option TOKEN_EXTENDS by TOKEN_SUPER_CLASS * C++ generation: renaming the option TOKEN_INCLUDES by TOKEN_INCLUDE * C++ generation: renaming the option PARSER_INCLUDES by PARSER_INCLUDE * C++ generation: renaming the option TOKEN_MANAGER_INCLUDES by TOKEN_MANAGER_INCLUDE * Add support for Java7 language features. * Allow empty type parameters in Java code of grammar files. * LookaheadSuccess creation performance improved. * Removing IDE specific files. * Declare trace_indent only if debug parser is enabled. * CPPParser.jj grammar added to grammars. * Build with Maven is working again. * WARNING: Required Java Platform: Standard Edition 7.0: known under Eclipse as JavaSE-1.7 * Build with source/target levels 8

    java-cup:
    • Update java-cup from version 11a to version 11b. (jsc#SLE-23217) * Regenerate the generated files with newer flex * Fetch sources using source service

    java-cup-bootstrap:
    • Update java-cup-bootstrap from version 11a to version 11b. (jsc#SLE-23217) * Regenerate the generated files with newer flex * Fetch sources using source service

    javaewah:
    • Build with source and target levels 8 (jsc#SLE-23217)

    javamail:
    • Add alias to com.sun.mail:jakarta.mail needed by ant-javamail
    • Remove all parents, since this package is not built with maven
    • Assure that every dependency has a version, or at least 'any' and fixes use with gradle. (jsc#SLE-23217)
    • Build against the standalone JavaEE modules unconditionally
    • Build with source/target levels 8
    • Add glassfish-activation-api dependency for relevant distribution versions to make buildable with JDK that does not contain the JavaEE modules

    javapackages-meta:
    • Fix requires not to have to redo the package on each javapackages-tools update. (jsc#SLE-23217)

    javapackages-tools:
    • Update javapackages-tools from version 5.3.0 to version 5.3.1. (jsc#SLE-23217) * Let maven_depmap.py generate metadata with dependencies under certain circumstances * Fix the python subpackage generation with python-rpm-macro * Support python subpackages for each flavor * Replace old nose with pytest gh#fedora-java/javapackages#86 * when building extra flavor, BuildRequire javapackages-filesystem: /etc/java is being cleaned out of the filesystems package.

    javaparser:
    • Update javaparser from version 3.3.5 to version 3.24.2. (jsc#SLE-23217) * Upgrade needed to be able to upgrade jctools and make them not depend hard on Java 8. For the full changelog, please refer to the official documentation.

    javassist:
    • Update javassist from version 3.23.1 to version 3.29.0. (jsc#SLE-23217) * Requires java >= 1.8 * Add OSGi manifest to the javassist.jar * For the full changelog, please check the official documentation.

    jboss-interceptors-1.2-api:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jboss-websocket-1.0-api:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jcache:
    • Provide jcache version 1.1.0 (jsc#SLE-23217)

    jcifs:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jcip-annotations:
    • Provide jcip-annotations 1.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    jcsp:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jctools:
    • Update jctools from version 2.1.2 to version 3.3.0. (jsc#SLE-23217) * Build with java source and target levels 8 * API Changes: * Removed MpscLinkedQueue7 and MpscLinkedQueue8 and consolidated into parent. This removes the need for the builder method on MpscLinkedQueue. * Deprecated QueueFactory and spec package classes. These are not used by any users and are only used for testing internally. * Removed some internal classes and reduced visibility of internal utilities where practical. The @InternalAPI tagging annotation is also used more extensively to discourage dependency. * XADD unbounded mpsc/mpmc queue: highly scalable linked array queues * New blocking consumer MPSC * Enhancements: * Xadd queues consumers can help producers * Update to latest JCStress * New features: * MpscBlockingConsumerArrayQueue * After long incubation and following a user request we move counters into core * Merging some experimental utils and we add a 'PaddedAtomicLong' * MpscBlockingConsumerArrayQueue::offerIfBelowThreshold is added

    jdependency:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jdepend:
    • Update jdepend from version 2.9.1 to version 2.10. (jsc#SLE-23217) * Specify the source/target levels 8 on ant invocation * Official release that includes support for Java 8 constants * Updated license from BSD-3 Clause to MIT (as per LICENSE.md file).

    jdom:
    • Update jdom from version 1.1.1 to version 1.1.6. (jsc#SLE-23217) * CVE-2021-33813: XXE issue in SAXBuilder can cause a denial of service via a crafted HTTP request (bsc#1187446) * Remove unneeded dependency on glassfish-jaxb-api * Build against the standalone JavaEE modules unconditionally * Build with source/target levels 8 * Build against standalone jaxb-api on distributions that have JDK without the JavaEE modules * Alias the xom artifact to the new com.io7m.xom groupId * Update jaxen to version 1.1.6 * Increase java stack size to avoid overflow

    jdom2:
    • Update jdom2 from version 2.0.6 to version 2.0.6.1. (jsc#SLE-23217) * CVE-2021-33813: Fixed XXE issue in SAXBuilder that can cause a denial of service via a crafted HTTP request. (bsc#1187446) * Build with java-devel >= 1.7

    jettison:
    • Update from version 1.3.7 to version 1.5.3 (jsc#SLE-23217)
    • CVE-2022-45685: Fixed stack overflow on malformed input. (bsc#1206400)
    • CVE-2022-45693: Fixed stack overflow when creating a JSON from a HashMap. (bsc#1206401)
    • CVE-2022-40149: Fixed stack overflow on malformed JSONs. (bsc#1203515)
    • CVE-2022-40150: Fixed infinite loop on non-terminated comments. (bsc#1203516)
    • Introducing new static methods to set the recursion depth limit
    • Incorrect recursion depth check in JSONTokener
    • Build with source and target levels 8

    jetty-minimal:
    • Update jetty-minimal from version 9.4.43.v20210629 to version 9.4.48.v20220622 (jsc#SLE-23217) * CVE-2022-2047: Invalid URI parsing may produce invalid HttpURI.authority. (bsc#1201317) * CVE-2022-2048: Invalid HTTP/2 requests can lead to denial of service (bsc#1201316) * Make importing of package sun.misc optional since not all jdk versions export it * Build with java source and target levels 8 * Fix javadoc generation on JDK >= 13 * Option --write-module-graph produces wrong .dot file * ArrayTrie getBest fails to match the empty string entry in certain cases * For the full set of changes, please check the official documentation.

    jetty-websocket:
    • Update jetty-websocket from version 9.4.43.v20210629 to version 9.4.48.v20220622 (jsc#SLE-23217) * CVE-2022-2047: Invalid URI parsing may produce invalid HttpURI.authority. (bsc#1201317) * CVE-2022-2048: Invalid HTTP/2 requests can lead to denial of service (bsc#1201316) * Make importing of package sun.misc optional since not all jdk versions export it * Build with java source and target levels 8 * Fix javadoc generation on JDK >= 13 * Option --write-module-graph produces wrong .dot file * Make importing of package sun.misc optional since not all jdk versions export it

    jeuclid:
    • Update jeuclid from version 3.1.3 to version 3.1.9. (jsc#SLE-23217) * Build with source and target levels 8 * This version includes several changes and improvements. For the full overview please check the changelog.

    jflex:
    • Update jflex from version 1.4.3 to version 1.8.2. (jsc#SLE-23217) * Build against the standalone JavaEE modules unconditionally * Build against standalone glassfish-annotation-api for relevant distribution versions that have JDK that does not contain the JavaEE modules * Fix build with recent java-cup * Build the bootstrap package using ant with a generated build.xml * Build the non-bootstrap package using maven, since its dependency auto is already built with maven * Do not process auto-value-annotations in bootstrap build

    jflex-bootstrap:
    • Update jflex-bootstrap from version 1.4.3 to version 1.8.2. (jsc#SLE-23217) * Build against the standalone JavaEE modules unconditionally * Build against standalone glassfish-annotation-api for relevant distribution versions that have JDK that does not contain the JavaEE modules * Fix build with recent java-cup * Build the bootstrap package using ant with a generated build.xml * Build the non-bootstrap package using maven, since its dependency auto is already built with maven * Do not process auto-value-annotations in bootstrap build
    jformatstring:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jgit:
    • Provide jgit version 5.11.0. (jsc#SLE-23217) * Fix build against apache-sshd 2.7.0 * Restore java 8 compatibility when building with java 9+ * Split the build into two spec files instead of multibuild. One produces the maven artifacts, the jgit command-line and the other produces eclipse features.

    jhighlight:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jing-trang:
    • Update jing-trang from version 20151127 to version 20181222. (jsc#SLE-23217) * Avoid building old saxon validator in order to avoid dependency on old saxon6 * Do not use xmvn-tools, since this is a ring package * Package maven metadata * Use testng in build process * Require com.github.relaxng:relaxngDatatype >= 2011.1 * Require xml-resolver:xml-resolver

    jline:
    • Build with source and target levels 8 (jsc#SLE-23217)
    • Remove dependency on jansi-native and hawtjni-runtime
    • Fix jline build against jansi 2.4.x

    jline1:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jna:
    • Update jna from version 5.4.0 to version 5.5.0. (jsc#SLE-23217) * Build with java source/target levels 8 * Features: * Add CoreFoundation, IOKit, and DiskArbitration mappings in c.s.j.p.mac. * c.s.j.p.mac.SystemB now extends c.s.j.p.unix.LibCAPI. * Add additional OSGi headers for the JNA bundle to support 32bit ARM (hardfloat) * Include Win32 COM utils (c.s.j.p.win32.com.util and c.s.j.p.win32.com.annotation) in OSGI bundle

    joda-convert:
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Do not use the legacy guava20 any more

    joda-time:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jsch-agent-proxy:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jsch:
    • Build with source and target levels 8 (jsc#SLE-23217)

    json-lib:
    • Do not build against the log4j12 packages
    • Build with source and target levels 8 (jsc#SLE-23217)
    • Do not depend on the old asm3
    • Fix build with jdk17
    • Specify source and target levels 8 for maven-antrun-plugin and for groovyc ant task

    jsonp:
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Build against standalone annotation api

    jsr-311:
    • Build with source and target levels 8 (jsc#SLE-23217)

    jtidy:
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Rewamp and simplify the build system

    junit:
    • Update junit from version 4.12 to version 4.13.2. (jsc#SLE-23217) * CVE-2020-1945: insecure temporary file vulnerability (bsc#1171696) * Build with source/target levels 8

    junit5:
    • Update from version 5.5.2 to version 5.8.2. (jsc#SLE-23217) * This is a bugfix update. For the complete overview please check the documentation.

    jython:
    • Change dependencies to Python 3. (jsc#SLE-23217)
    • Build with java source and tartget level 1.8

    jzlib:
    • Build with source and target levels 8 (jsc#SLE-23217)

    kryo:
    • Provide kryo 4.0.2 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    kxml:
    • Fetch the sources using https instead of http protocol. (bsc#1182284)
    • Specify java source and target levels 1.8

    libreadline-java:
    • Provide libreadline-java 0.8.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    log4j:
    • Add dependency on standalone javax.activation-api that is not included in newer JDKs. (jsc#SLE-23217)

    logback:
    • Update logback from version 1.2.8 to version 1.2.11. (jsc#SLE-23217) * CVE-2021-42550: remote code execution through JNDI call from within its configuration file. (bsc#1193795) * Hardened logback's JNDI lookup mechanism to only honor requests in the java: namespace. All other types of requests are ignored. * SMTPAppender was hardened. * Temporarily removed DB support for security reasons. * Removed Groovy configuration support. As logging is so pervasive and configuration with Groovy is probably too powerful, this feature is unlikely to be reinstated for security reasons. * Set project.build.sourceEncoding property to ISO-8859-1 to avoid the new maven-resources-plugin chocking on trying to filter in UTF-8 encoding JKS (binary) resources * Do not build against the log4j12 packages

    lucene:
    • Update lucene from version 7.1.0 to version 8.5.0. (jsc#SLE-23217) * Do not abort compilation on html5 errors with javadoc 17 * Upgrade forbiddenapis to version 2.7; upgrade Groovy to 2.4.17. * Upgrade ecj to 3.19.0 to fix sporadic precommit javadoc issues * This update includes several API changes, runtime behavior, bugfixes and new features. For a full overview, please check the official documentation.

    maven:
    • Update maven from version 3.6.3 to version 3.8.5. (jsc#SLE-23217) * CVE-2021-26291: block repositories using http by default. (bsc#1188529) * CVE-2020-13956: incorrect handling of malformed URI authority component. (bsc#1177488) * Upgrade Maven Wagon to 3.5.1 * Upgrade Maven JAR Plugin to 3.2.2 * Upgrade Maven Parent to 35 * Upgrade Maven Resolver to 1.6.3 * Upgrade Maven Shared Utils to 3.3.4 * Upgrade Plexus Utils to 3.3.0 * Upgrade Plexus Interpolation to 1.26 * Upgrade Plexus Cipher and Sec Dispatcher to 2.0 * Upgrade Sisu Inject/Plexus to 0.3.5 * Upgrade SLF4J to 1.7.32 * Upgrade Jansi to 2.4.0 * Upgrade Guice to 4.2.2 * Fix syntax error with qdox 2.0.1 and method declarations containing the new keyword 'record' as name of variables * Fix build with modello-2.0.0 * Remove using of alternatives, since the symlinks are in a separate package that one can decide not to install and this is the only provider for mvn and mvnDebug links * Use libalternatives instead of update-alternatives. * Remove dependency on cglib and aopalliance, since the no_aop version of guice does not really depend on them * Fix build with the API incompatible maven-resolver 1.7.3 * Link the new maven-resolver-named-locks artifact too * Add upstream signing key and verify source signature * Do not build against the compatibility version guava20 any more, but use the default guava package * This update includes several bugfixes and new features. For a full overview, please check the official documentation.

    maven2:
    • Fix build with modello 2.0.0. (jsc#SLE-23217)
    • Build with source and target levels 8

    maven-antrun-plugin:
    • Update maven-antrun-plugin from version 1.8 to version 3.0.0. (jsc#SLE-23217) * Removal of tasks (use target instead), sourceRoot and testSourceRoot parameters * Compatibility with new JDK versions * Build with java source and target levels 8

    maven-archiver:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-artifact-resolver:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-artifact-transfer:
    • Update maven-artifact-transfer from version 0.11.0 to version 0.13.1. (jsc#SLE-23217) * Remove the old org.sonatype.aether dependencies, since we don't need maven 3.0.x * Build with source and target levels 8 * Do not use the legacy guava20 any more * Fix build against newer maven

    maven-assembly-plugin:
    • Update maven-assembly-plugin from version 3.2.0 to version 3.3.0. (jsc#SLE-23217) * Add Documentation for duplicateBehaviour option * Allow to override UID/GID for files stored in TAR * Apply try-with-resources * Use HTTPS instead of HTTP to resolve dependencies * Support concatenation of files

    maven-clean-plugin:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-common-artifact-filters:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-compiler-plugin:
    • Update maven-compiler-plugin from version 3.8.1 to version 3.10.1. (jsc#SLE-23217) * Remove deprecated mojos * Add flag to enable-preview java compiler feature * Add a boolean to generate missing package-info classes by default * Check jar files when determining if dependencies changed * Compile module descriptors with TestCompilerMojo * Changed dependency detection

    maven-dependency-analyzer:
    • Build with source and target levels 8. (jsc#SLE-23217)
    • Do not build against the legacy guava20 any more

    maven-dependency-plugin:
    • Update maven-dependency-plugin from version 3.1.1 to version 3.1.2. (jsc#SLE-23217) * Add a TOC to ease navigating to each goal usage * Add note on dependecy:tree -Dverbose support in 3.0+ * Perform transformation to artifact keys just once * Remove @param for a parameter which does not exists. * Remove newline and trailing space from log line. * Replace CapturingLog class with Mockito usage * Rewrite go-offline so it resembles resolve-plugins * Switch to asfMavenTlpPlgnBuild * Update ASM so it works with Java 13 * Upgrade maven-artifact-transfer to 0.11.0 * Upgrade maven-common-artifact-filters to 3.1.0 * Upgrade maven-dependency-analyzer to 1.11.1 * Upgrade maven-plugins parent to version 32 * Upgrade maven-shared-utils 3.2.1 * Upgrade parent POM from 32 to 33 * Upgrade plexus-archiver to 4.1.0 * Upgrade plexus-io to 3.1.0 * Upgrade plexus-utils to 3.3.0 * Use https for sigs, hashes and KEYS * Use sha512 checksums instead of sha1

    maven-dependency-tree:
    • Update maven-dependency-tree from version 3.0 to version 3.0.1. (jsc#SLE-23217) * Build with java source and target levels 8 * Do not build against the legacy guava20 any more * Fixed JavaDoc issue for JDK 8 * maven-dependency-tree removes optional flag from managed dependencies * Change characters used to diplay trees to make relationships clearer * Pass source+target to m-invoker-p, easiest way to override default values of maven-compiler-plugin * Upgrade org.codehaus.plexus:plexus-component-metadata to 1.7.1

    maven-doxia:
    • Fix build with modello 2.0.0 (jsc#SLE-23217)
    • Do not build against the log4j12 packages. (jsc#SLE-23217)
    • Fix the version of the log4j that doxia-module-fo needs at runtime. (jsc#SLE-23217)
    • Do not build against the legacy guava20 any more. (jsc#SLE-23217)

    maven-doxia-sitetools:
    • Fix build with modello 2.0.0 (jsc#SLE-23217)
    • Build with source and target levels 8 (jsc#SLE-23217)
    • Do not build against the legacy guava20 any more. (jsc#SLE-23217)

    maven-enforcer:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-file-management:
    • Build with java source and target levels 8 (jsc#SLE-23217)
    • Fix build with modello 2.0.0

    maven-filtering:
    • Update maven-filtering from version 3.1.1 to version 3.2.0 (jsc#SLE-23217) * Allow using a different encoding when filtering properties files * Upgrade plexus-interpolation to 1.25 * Upgrade maven-shared-utils to 3.2.1 * Upgrade plexus-utils to 3.1.0 * Upgrade parent to 32 * Upgrade maven-surefire/failsafe-plugin to 2.21.0 for JDK 10 * Upgrade maven-artifact-transfer to version 0.9.1 * Upgrade JUnit to 4.12 * Upgrade plexus-interpolation to 1.25 * Build with java source and target levels 8 * Do not build against legacy guava20 any more

    maven-install-plugin:
    • Update maven-install-plugin from version 2.5.2 to version 3.0.0. (jsc#SLE-23217) * Upgrade plexus-utils to 3.2.0 * Upgrade maven-plugins parent version 32 * Upgrade maven-plugin-testing-harness to 1.3 * Upgrade maven-shared-utils to 3.2.1 * Upgrade maven-shared-components parent to version 33 * Upgrade of commons-io to 2.5.

    maven-invoker:
    • Update maven-invoker from version 3.0.1 to version 3.1.0. (jsc#SLE-23217) * Build with java source and target levels 8 * Fixes build with maven-shared-utils 3.3.3 * Upgrade maven-shared-utils to 3.2.1 * Upgrade parent to 31 * Upgrade to JDK 7 minimum * Refactored to use maven-shared-utils instead of plexus-utils. * Remove hardcoded versions for plexus-component-annotations/plexus-component-metadata

    maven-jar-plugin:
    • Update maven-jar-plugin from version 3.2.0 to version 3.2.2. (jsc#SLE-23217) * Upgrade Maven Archiver to 3.5.2 * Upgrade Plexus Utils to 3.3.1 * Upgrade plexus-archiver 3.7.0 * Upgrade JUnit to 4.12 * Upgrade maven-plugins parent to version 32 * Build with java source and target levels 8 * Don't log a warning when jar will be empty and creation is forced * Reproducible Builds: make entries in output jar files reproducible (order + timestamp)

    maven-javadoc-plugin:
    • Update maven-javadoc-plugin from versionn 3.1.1. to version 3.3.2. (jsc#SLE-23217) * Fix build with modello 2.0.0 * Use the same encoding when writing and getting the stale data * Fixes build with utf-8 sources on non utf-8 platforms * Do not build against the legacy guava20 package anymore

    maven-mapping:
    • Provide maven-mapping version 3.0.0. (jsc#SLE-23217) * Required by bnd-maven-plugin

    maven-plugin-build-helper:
    • Update maven-plugin-build-helper from version 1.9.1 to version 3.2.0. (jsc#SLE-23217) * Set a property based on the maven.build.timestamp * rootlocation does not correctly work * Add profile to avoid showing warnings for maven plugin plugin goals not supported in m2e * Site: Properly showing 'value' tag on regex-properties usage page * Integration test reserve-ports-with-urls fails on windows

    maven-plugin-bundle:
    • Fix building with the new maven-reporting-api . (jsc#SLE-23217)
    • Build with the osgi bundle repository by default

    maven-plugin-testing:
    • Fix build against newer maven. (jsc#SLE-23217)
    • Do not build against the legacy guava20 package any more
    • Build with source and target levels 8

    maven-plugin-tools:
    • Fix build with modello 2.0.0. (jsc#SLE-23217)
    • Do not force building with java-1_8_0-openjdk, since the package builds just fine with higher versions.
    • Do not build against the legacy guava20 package any more

    maven-remote-resources-plugin:
    • Update maven-remote-resources-plugin from version 1.5 to version 1.7.0. (jsc#SLE-23217) * use reproducible project.build.outputTimestamp * use sha512 checksums instead of sha1 * use https for sigs, hashes and KEYS * Upgrade plexus-utils from 3.0.24 to 3.1.0 * Upgrade plexus-interpolation to 1.25 * Upgrade JUnit to 4.12 * Upgrade parent to 32 * Upgrade maven-filtering to 3.1.1 * Upgrade plexus-resources from 1.0-alpha-7 to 1.0.1 * Avoid overwrite of the destination file if the produced contents is the same * Remove unused dependency maven-monitor * Upgrade to maven-plugins parent version 27 * Upgrade maven-plugin-testing-harness to 1.3 * Updated plexus-archiver * Build with source and target levels 8

    maven-reporting-api:
    • Update maven-reporting-api from version 3.0 to version 3.1.0. (jsc#SLE-23217) * Build with source and target levels 8 * make build Reproducible * Upgrade to Doxia 1.11.1

    maven-resolver:
    • Update maven-resolver from version 1.4.1 to version 1.7.3. (jsc#SLE-23217) * Build against the standalone JavaEE modules unconditionally * Remove the javax.annotation:javax.annotation-api dependency on distribution versions that do not incorporate the JavaEE modules * Add the glassfish-annotation-api jar to the build classpath * Upgrade Sisu Components to 0.3.4 * Upgrade SLF4J to 1.7.30 * Update mockito-core to 2.28.2 * Update Wagon Provider API to 3.4.0 * Update HttpComponents * Update Plexus Components * Remove synchronization in TrackingFileManager * Move GlobalSyncContextFactory to a separate module * Migrate from maven-bundle-plugin to bnd-maven-plugin * Support SHA-256 and SHA-512 as checksums * Upgrade Redisson to 3.15.6 * Change of API and incompatible with maven-resolver < 1.7

    maven-resources-plugin:
    • Update maven-resources-plugin from version 3.1.0 to version 3.2.0. (jsc#SLE-23217) * ISO8859-1 properties files get changed into UTF-8 when filtered * Upgrade plexus-interpolation 1.26 * Add m2e lifecycle Metadata to plugin * make build Reproducible * Upgrade maven-plugins parent to version 32 * Upgrade plexus-utils 3.3.0 * Make Maven 3.1.0 the minimum version * Update to maven-filtering 3.2.0 * Build with java source and target levels 8

    maven-shared-incremental:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-shared-io:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-shared-utils:
    • Update maven-shared-utils from version 3.2.1 to 3.3.3. (jsc#SLE-23217) * Commandline class shell injection vulnerabilities (bsc#1198833, CVE-2022-29599) * Build with source and target levels 8 * make build Reproducible * Upgrade maven-shared-parent to 32 * Upgrade parent to 31

    maven-source-plugin:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-surefire:
    • Build with source and target levels 8 (jsc#SLE-23217)
    • Update generate-tarball.sh to use https URL (bsc#1182708)

    maven-verifier:
    • Build with source and target levels 8 (jsc#SLE-23217)

    maven-wagon:
    • Provide maven-wagon 3.2.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    minlog:
    • Provide minlog 1.3.0 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    modello-maven-plugin:
    • Update modello-maven-plugin from version 1.10.0 to version 2.0.0. (jsc#SLE-23217) * Add Modello 2.0.0 model XSD * Build with java source and target levels 8 * Bump actions/cache to 2.1.6 * Bump actions/checkout to 2.3.4 * Bump actions/setup-java to 2.3.1 * Bump checkstyle to 9.3 * Bump jackson-bom to 2.13.1 * Bump jaxb-api to 2.3.1 * Bump jsoup to 1.14.3 * Bump junit to 4.13.1 * Bump maven-assembly-plugin to 3.3.0 * Bump maven-checkstyle-plugin to 3.1.1 * Bump maven-clean-plugin to 3.1.0 * Bump maven-compiler-plugin to 3.9.0 * Bump maven-dependency-plugin to 3.2.0 * Bump maven-enforcer-plugin to 3.0.0-M3 * Bump maven-gpg-plugin to 3.0.1 * Bump maven-jar-plugin to 3.2.2 * Bump maven-javadoc-plugin to 3.3.2 * Bump maven-jxr-plugin to 3.1.1 * Bump maven-pmd-plugin to 3.15.0 * Bump maven-project-info-reports-plugin to 3.1.2 * Bump maven-release-plugin to 3.0.0-M5 * Bump maven-resources-plugin to 3.2.0 * Bump maven-scm-publish-plugin to 3.1.0 * Bump maven-shared-resources to 4 * Bump maven-site-plugin to 3.10.0 * Bump maven-surefire-plugin to 2.22.2 * Bump maven-surefire-report-plugin to 2.22.2 * Bump maven-verifier-plugin to 1.1 * Bump mavenPluginTools to 3.6.4 * Bump org.eclipse.sisu.plexus to 0.3.5 * Bump persistence-api to 1.0.2 * Bump plexus-compiler-api to 2.9.0 * Bump plexus-compiler-javac to 2.9.0 * Bump plexus-utils to 3.4.1 * Bump plexus-velocity to 1.3 * Bump release-drafter/release-drafter to 5.18.0 * Bump snakeyaml to 1.30 * Bump stax2-api to 4.2.1 * Bump taglist-maven-plugin to 3.0.0 * Bump woodstox-core to 6.2.8 * Bump xercesImpl to 2.12.1 * Bump xercesImpl to 2.12.2 in /modello-plugins/modello-plugin-jsonschema * Bump xercesImpl to 2.12.2 in /modello-plugins/modello-plugin-xsd * Bump xml-apis to 2.0.2 * Bump xmlunit to 1.6 * Bump xmlunit-core to 2.9.0 * Depend on the jackson and jsonschema plugins too * Manage xdoc anchor name conflicts (2 classes with same anchor) * Migrate from codehaus:wstx to com.fasterxml.woodstox:woodstox-core 6.2.4 * Require Maven 3.1.1 * Security upgrade org.jsoup:jsoup to 1.14.2

    modello:
    • Update modello from version 1.10.0 to version 2.0.0. (jsc#SLE-23217) * New features and improvements + Add Modello 2.0.0 model XSD + Manage xdoc anchor name conflicts (2 classes with same anchor) + Drop unnecessary check for identical branches + Require Maven 3.1.1 + Use a caching writer to avoid overwriting identical files + Migrate from codehaus:wstx to com.fasterxml.woodstox:woodstox-core 6.2.4 + Make location handling more memory efficient + Xpp3 extended writer + Refactor some old java APIs usage + Add a new field fileComment * Bug Fixes + Fix javaSource default value + Fix modello-plugin-snakeyaml * Dependency updates + Bump actions/cache to 2.1.6 + Bump actions/checkout from 2 to 2.3.4 + Bump actions/setup-java to 2.3.1 + Bump checkstyle to 9.3 + Bump jackson-bom to 2.13.1 + Bump jaxb-api from 2.1 to 2.3.1 + Bump jsoup from 1.14.2 to 1.14.3 + Bump junit from 4.12 to 4.13.1 + Bump junit from 4.12 to 4.13.1 in /modello-maven-plugin/src/it/maven-model + Bump maven-assembly-plugin from 3.2.0 to 3.3.0 + Bump maven-checkstyle-plugin from 2.15 to 3.1.1 + Bump maven-clean-plugin from 3.0.0 to 3.1.0 + Bump maven-compiler-plugin to 3.9.0 + Bump maven-dependency-plugin to 3.2.0 + Bump maven-enforcer-plugin from to 3.0.0-M3 + Bump maven-gpg-plugin from 1.6 to 3.0.1 + Bump maven-jar-plugin from 3.2.0 to 3.2.2 + Bump maven-javadoc-plugin to 3.3.2 + Bump maven-jxr-plugin from to 3.1.1 + Bump maven-pmd-plugin to 3.15.0 + Bump maven-project-info-reports-plugin from 3.1.1 to 3.1.2 + Bump maven-release-plugin from 3.0.0-M4 to 3.0.0-M5 + Bump maven-resources-plugin from 3.0.1 to 3.2.0 + Bump maven-scm-publish-plugin from 3.0.0 to 3.1.0 + Bump maven-shared-resources from 3 to 4 + Bump maven-site-plugin to 3.10.0 + Bump maven-surefire-plugin to 2.22.2 + Bump maven-surefire-report-plugin to 2.22.2 + Bump maven-verifier-plugin from 1.0 to 1.1 + Bump mavenPluginTools to 3.6.4 + Bump org.eclipse.sisu.plexus from 0.3.4 to 0.3.5 + Bump persistence-api from 1.0 to 1.0.2 + Bump plexus-compiler-api to 2.9.0 + Bump plexus-compiler-javac to 2.9.0 + Bump plexus-utils from 3.2.0 to 3.4.1 + Bump plexus-velocity from 1.2 to 1.3 + Bump release-drafter/release-drafter to 5.18.0 + Bump snakeyaml to 1.30 + Bump stax2-api from 4.2 to 4.2.1 + Bump taglist-maven-plugin to 3.0.0 + Bump woodstox-core to 6.2.8 + Bump xercesImpl from 2.12.1 to 2.12.2 in /modello-plugins/modello-plugin-jsonschema + Bump xercesImpl from 2.12.1 to 2.12.2 in /modello-plugins/modello-plugin-xsd + Bump xml-apis from 1.3.04 to 2.0.2 + Bump xmlunit from 1.2 to 1.6 + Bump xmlunit-core to 2.9.0 + Security upgrade org.jsoup:jsoup from 1.13.1 to 1.14.2
    • Build with java source and target levels 8
    • Build the jackson and jsonschema plugins too

    mojo-parent:
    • Update mojo-parent from version 40 to version 60. (jsc#SLE-23217)

    msv:
    • Build with source and target levels 8 (jsc#SLE-23217)

    multiverse:
    • Build with source and target levels 8 (jsc#SLE-23217)

    mx4j:
    • Build against the standalone JavaEE modules unconditionally (jsc#SLE-23217)
    • Depend on glassfish-activation-api instead of on gnu-jaf (jsc#SLE-23217)
    • Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
    • Require for build gnu-jaf instead of a virtual jaf provider in order to avoid build cycles (jsc#SLE-23217)
    • On supported platforms, avoid building with OpenJ9, in order to prevent build cycles (jsc#SLE-23217)

    mybatis-parent:
    • Provide mybatis-parent version 31 (jsc#SLE-23217)

    mybatis:
    • Provide mybatis version 3.5.6 (jsc#SLE-23217) * CVE-2020-26945: remote code execution due to mishandles deserialization of object streams (bsc#1177568)

    mysql-connector-java:
    • Update mysql-connector-java from version 5.1.47 to version 8.0.29. (jsc#SLE-23217) * CVE-2021-2471: mysql-connector-java: unauthorized access (bsc#1195557) * CVE-2020-2875, CVE-2020-2933, CVE-2020-2934: Vulnerability in the MySQL Connectors product of Oracle MySQL (bsc#1173600) * Historically, MySQL has used utf8 as an alias for utf8mb3. Since release 8.0.29, utf8mb3 has become a recognized (though deprecated) character set on its own for MySQL Server. Therefore, Connector/J has added utf8mb3 to its character set mapping, and users are encouraged to update to Connector/J 8.0.29 to avoid potential issues when working with MySQL Server 8.0.29 or later. * A new connection property socksProxyRemoteDns has been added, which, when set to true, makes the SocksProxySocketFactory execute its own connect() implementation that passes the unresolved InetSocketAddress of a MySQL Server host to the created proxy socket, instead of having the address resolved locally. * The code for prepared statements has been refactored to make the code simpler and the logic for binding more consistent between ServerPreparedStatement and ClientPreparedStatement. * Connector/J now supports Fast Identity Online (FIDO) Authentication. See Connecting Using Fast Identity Online (FIDO) Authentication for details. * Do not build against the log4j12 packages, use the new reload4j * This update provide several fixes and enhancements. Please, check the chenges for a full overview.

    nailgun:
    • Build with source and target levels 8 (jsc#SLE-23217)

    native-platform:
    • Build with source and target levels 8 (jsc#SLE-23217)

    nekohtml:
    • Update nekohtml from version 1.9.22 to version 1.9.22.noko2. (jsc#SLE-23217) * CVE-2022-28366: Uncontrolled Resource Consumption in nekohtml. (bsc#1198404) * CVE-2022-24839: Denial of service via crafted Processing Instruction (PI) input. (bsc#1198739) * Use the security patched fork at https://github.com/sparklemotion/nekohtml * Build with source and target levels 8

    netty3:
    • Remove dependency on javax.activation. (jsc#SLE-23217)
    • Build again against mvn(log4j:log4j). (jsc#SLE-23217)
    • Use the standalone JavaEE modules unconditionally
    • Remove the compat versions, since the io.netty:netty artifact coordinates exist only in version 3.x. (jsc#SLE-23217)

    netty-tcnative:
    • Update netty-tcnative to version 2.0.36. (jsc#SLE-23217) * Upgrade to OpenSSL 1.1.1i * Update to latest openssl version for static build * Update to LibreSSL 3.1.4 * Update to latest stable libressl release * Cleanup BoringSSL TLSv1.3 support and consistent handle empty ciphers. * Support TLSv1.3 with compiling against boringssl * Return 0 for SSL_OP_NO_TLSv1_3 when TLSv1.3 is not supported. * Allow to load a private key from the OpenSSL engine. * Support KeyManagerFactory if compiled against OpenSSL < 1.0.2 but using OpenSSL >= 1.0.2 at runtime. * Build with java source and target levels 1.8

    objectweb-asm:
    • Update objectweb-asm from version 7.2 to version 9.3. (jsc#SLE-23217) * new Opcodes.V19 constant for Java 19 * new size() method in ByteVector * checkDataFlow option in CheckClassAdapter can now be used without valid maxStack and maxLocals values * New Maven BOM * Build asm as modular jar files to be used as such by java >= 9 * Leave asm-all.jar as a non-modular jar * JDK 18 support * Replace -debug flag in Printer with -nodebug (-debug continues to work) * New V15 constant * Experimental support for PermittedSubtypes and RecordComponent * This update provide several fixes and enhancements. Please, check the chenges for a full overview.

    objenesis:
    • Fix build with javadoc 17 (jsc#SLE-23217)

    opentest4j:
    • Update opentest4j from version 1.0.0 to version 1.2.0. (jsc#SLE-23217) * Build with java source and target levels 8 * Remove unused dependency on commons-codec * Rename serialized output file for clarity * Create an OSGi compatible MANIFEST.MF

    oro:
    • Build with source and target levels 8 (jsc#SLE-23217)

    osgi-annotation:
    • Update osgi-annotation from version 6.0.0 to version 7.0.0. (jsc#SLE-23217) * Build with source and target levels 8

    osgi-compendium:
    • Update osgi-compendium from version 6.0.0 to version 7.0.0. (jsc#SLE-23217) * Build with source and target levels 8

    osgi-core:
    • Update osgi-core from version 6.0.0 to version 7.0.0. (jsc#SLE-23217) * Build with source and target levels 8

    os-maven-plugin:
    • Update os-maven-plugin from version 1.2.3 to version 1.7.0. (jsc#SLE-23217) * Build with java source and target levels 8 * Changes: + Added a new property os.detected.arch.bitness + Added detection of RISC-V architecture, riscv + Added an abstraction layer for System property and file system access + Added thread safety information to Maven plugin metadata so that Maven doesn't warn about thread safety anymore + Added detection of z/OS operating system + Added m2e life cycle mapping metadata so os-maven-plugin works better with Eclipse m2e + Added support for MIPS and MIPSEL 32/64-bit architecture mips_32 - if the value is one of: mips, mips32 mips_64 - if the value is mips64 mipsel_32 - if the value is one of: mipsel, mips32el mipsel_64 - if the value is mips64el + Added support for PPCLE 32-bit architecture ppcle_32 - if the value is one of: ppcle, ppc32le + Added support for IA64N and IA64W architecture itanium_32 - if the value is ia64n itanium_64 - if the value is one of: ia64, ia64w (new), itanium64 + Fixed classpath conflicts due to outdated Guava version in transitive dependencies + Fixed incorrect prerequisite

    paradise:
    • Build with source and target levels 8 (jsc#SLE-23217)

    paranamer:
    • Build with source and target levels 8 (jsc#SLE-23217)

    parboiled:
    • Build with source and target levels 1.8 (jsc#SLE-23217)

    pegdown:
    • Build with source and target levels 8 (jsc#SLE-23217)

    picocli:
    • Update picocli from version 4.0.4 to version 4.6.2. (jsc#SLE-23217) * Full changes from previous versions are in https://github.com/remkop/picocli/blob/v4.6.2/RELEASE-NOTES.md

    plexus-ant-factory:
    • Build with source and target levels 8 (jsc#SLE-23217)

    plexus-archiver:
    • Do not compile the test build against the legacy guava20 any more. (jsc#SLE-23217)

    plexus-bsh-factory:
    • Build with source and target levels 8 (jsc#SLE-23217)

    plexus-build-api:
    • Build with source and target levels 8 (jsc#SLE-23217)
    • Fix an error of tag in javadoc

    plexus-cipher:
    • Update plexus-cipher from version 1.7 to version 2.0. (jsc#SLE-23217) * Switch from Sonatype to Plexus * Switch to the Eclipse sisu-maven-plugin * Bump junit from 4.12 to 4.13.1 * Bump plexus from 6.5 to 8 * Fix surefire warnings * This version is needed by maven 3.8.4 and plexus-sec-dispatcher 2.0

    plexus-classworlds:
    • Update plexus-classworlds from version 2.5.2 to version 2.6.0. (jsc#SLE-23217) * Modular java JPMS support

    plexus-cli:
    • Do not compile/run tests against the legacy guava20 package. (jsc#SLE-23217)
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Replace raw java.util.List with typed java.util.List interface
    • The GnuParser and OptionBuilder classes are deprecated in commons-cli since version 1.3

    plexus-compiler:
    • Update plexus-compiler from version 2.8.2 to version 2.11.1. (jsc#SLE-23217) * Plexus testing is a dependency with scope test * Removed: jikes compiler * New features and improvements + add paremeter to configure javac feature --enable-preview + make java 11 as project base but keep javac release 8, we will be able to upgrade ecj and errorprone + Bump plexus-components from 6.5 to 6.6 and upgrade to junit5 + add adopt-openj9 build + Fix AspectJ basics + fix methods of lint and warning + Add new showLint compiler configuration + add jdk distribution to the matrix + Added primitive support for --processor-module-path + Refactor and add unit tests for support for multiple --add-exports custom compiler arguments + Add Maven Compiler Plugin compiler it tests + Close StandardJavaFileManager + Use latest ecj from official Eclipse release * Bug fixes: + [eclipse-compiler] Resort sources to have module-info.java first + Issue #106: Retain error messages from annotation processors + Issue #147: Support module-path for ECJ + Issue #166: Fix maven dependencies + eclipse compiler: set generated source dir even if no annotation processor is configured + CSharp compiler: fix role + Eclipse compiler: close the StandardJavaFileManager + Use plexus annotations rather than doclet to fix javadoc with java11 + fix Java15 build + Update Error prone 2.4 + Rename method, now that EA of JDK 16 is available + Eclipse Compiler Support release specifier instead of source/target + Issue #73: Use configured file encoding for JSR-199 Eclipse compiler * Dependency updates + Bump actions/cache to 2.1.6 + Bump animal-sniffer-maven-plugin to 1.21 + Bump aspectj.version from 1.9.2 to 1.9.6 + Bump assertj-core from 3.21.0 to 3.22.0 + Bump ecj to 3.28.0 + Bump error_prone_core to 2.10.0 + Bump junit to 4.13.2 + Bump junit-jupiter-api from 5.8.1 to 5.8.2 + Bump maven-artifact from 2.0 to 2.2.1 + Bump maven-enforcer-plugin from 3.0.0-M3 to 3.0.0 + Bump maven-invoker-plugin from 3.2.1 to 3.2.2 + Bump maven-settings from 2.0 to 2.2.1 + Bump plexus-component-annotations to 2.1.1 + Bump plexus-components to 6.6 and upgrade to junit5 + Bump release-drafter/release-drafter to 5.18.1 * needed by the latest maven-compiler-plugin * Rewrite the plexus metadata generation in the ant build files

    plexus-component-api:
    • Build with source and target levels 8 (jsc#SLE-23217)

    plexus-component-metadata:
    • Update plexus-component-metadata from version 2.1.0 to version 2.1.1. (jsc#SLE-23217) * Build using asm >= 7 * Build with java source and target levels 8

    plexus-containers:
    • Update plexus-containers from version 2.1.0 to version 2.1.1. (jsc#SLE-23217) * This is the last version before deprecation * Security upgrade org.jdom:jdom2 from 2.0.6 to 2.0.6.1 * Build with java source and target levels 8 * Upgrade ASM to 9.2 * Requires Java 7 and Maven 3.2.5+

    plexus-i18n:
    • Build with java source and target levels 8 (jsc#SLE-23217)
    • Do not compile/run tests against the legacy guava20 package (jsc#SLE-23217)

    plexus-interactivity:
    • Build with source and target levels 8 (jsc#SLE-23217)

    plexus-interpolation:
    • Build with java source and target levels 1.8

    plexus-io:
    • Do not build/run tests against the legacy guava20 package (jsc#SLE-23217)

    plexus-languages:
    • Update plexus-languages from version 1.0.3 to version 1.1.1. (jsc#SLE-23217) * Build using java >= 9 * Build as multirelease modular jar * Fix builds with a mix of modular and classic jar files * generate-tarball.sh: use safe temporary directory, avoid accidental deletion of *.jar, *.class in the current working directory.

    plexus-metadata-generator:
    • Update plexus-metadata-generator from version 2.1.0 to version 2.1.1 (jsc#SLE-23217) * Build using asm >= 7 * Build with java source and target levels 8 * Do not use the deprecated plexus-cli functions, but port the generator to the recommended replacement

    plexus-resources:
    • Build with source and target levels 8 (jsc#SLE-23217)

    plexus-sec-dispatcher:
    • Update plexus-sec-dispatcher from version 1.4 to version 2.0. (jsc#SLE-23217) * Fix build with modello-2.0.0 * Changes: + Bump plexus-utils to 3.4.1 + Bump plexus from 6.5 to 8 + Switch from Sonatype to Plexus + Update pom to use modello source 1.4 * needed for maven 3.8.4 and plexus-cipher 2.0

    plexus-utils:
    • Update plexus-utils from version 3.3.0 to version 3.3.1. (jsc#SLE-23217) * Build with source and target levels 8 (jsc#SLE-23217) * Don't ignore valid SCM files * This is the latest version still supporting Java 8

    plexus-velocity:
    • Do not compiler/run the test build against legacy guava20 anymore. (jsc#SLE-23217)
    • Build with java source and target levels 8. (jsc#SLE-23217)
    • Simplify the build file and remove tests which depend onapache-commons-lang. (jsc#SLE-23217)

    qdox:
    • Update qdox from version 2.0.M9 to version 2.0.1. (jsc#SLE-23217) * Don't use deprecated inputstreamctor option * Add Automatic-Module-Name to the manifest * Generate ant build file from maven pom and build using ant * Update jflex-maven-plugin to 1.8.2 * Changes: * Support Lambda Expression * Add SEALED / NON_SEALED tokens * CodeBlock for Annotation with FieldReference should prefix field with canonical name * Add UnqualifiedClassInstanceCreationExpression * Add reference to grammar documentation and hints to transform it * Support Text Blocks * Support Sealed Classes * Support records * Get interface via javaProjectBuilder.getClassByName

    reflectasm:
    • Build with source and target levels 8 (jsc#SLE-23217)

    regexp:
    • Build with source and target levels 8 (jsc#SLE-23217)

    relaxngcc:
    • Provide relaxngcc version 1.12 (jsc#SLE-23217)

    relaxngDatatype:
    • Build with source and target levels 8 (jsc#SLE-23217)

    reload4j:
    • Update from version 1.2.19 to version 1.2.20. (jsc#SLE-23217) * Build with source/target levels 8 * For enabled logging statements, the performance of iterating on appenders attached to a logger has been significantly improved.

    replacer:
    • Build with source and target levels 8 (jsc#SLE-23217)

    rhino:
    • Update rhino from version 1.7R3 to version 1.7.14. (jsc#SLE-23217)

    sat4j:
    • Build with source and target levels 8 (jsc#SLE-23217)

    saxon9:
    • Build with source and target levels 8 (jsc#SLE-23217)

    sbt-launcher:
    • Build with source/target levels 8 (jsc#SLE-23217)
    • Fix build against ivy 2.5.0

    sbt:
    • Do not depend on hawtjni-runtime and jansi-native anymore (jsc#SLE-23217)
    • Fix build against maven 3.8.5
    • Fix build against apache-ivy 2.5.0
    • Override javax.inject:javax:inject artifact coordinates in order to be able to build against newer atinject versions if needed
    • Fix build with maven-resolver 1.7.3
    • Build package as noarch, since it does not have archfull binaries
    • Build with java 8

    scala-pickling:
    • Build with source and target levels 8 (jsc#SLE-23217)

    scala:
    • No longer package /usr/share/mime-info (bsc#1062631) * Drop scala.keys and scala.mime source files. (jsc#SLE-23217)
    • Fix the scala build to find correctly the jansi.jar file
    • Make the package that links the jansi.jar file archfull
    • Bootstrap the build with our own built jar instead of downloading prebuilt binaries from www.scala-lang.org

    servletapi4:
    • Provide servletapi4 4.0.4 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    signpost-core:
    • Build with source and target levels 8 (jsc#SLE-23217)

    sisu:
    • Update siu from version 0.3.3 to version 0.3.5 (jsc#SLE-23217) * Remove dependency on glassfish-servlet-api * Relax bytecode check in scanner so it can scan up to and including Java14 * Support reproducible builds by sorting generated javax.inject.Named index * Build with java source and target levels 8 * Change to generate maven meta-data using the %%add_maven_depmap so that it can be built before the xmvn-tools

    slf4j:
    • Update slf4j from version 1.7.30 to version 1.7.36. (jsc#SLE-23217) * Don't use %%mvn_artifact, but %%add_maven_depmap * In the jcl-over-slf4j module avoid Object to String conversion. * In the log4j-over-slf4j module added empty constructors for ConsoleAppender. * In the slf4j-simple module, SimpleLogger now caters for concurrent access. * Fix build against reload4j * Fix dependencies of the module slf4j-log4j12 * Depend for build on reload4j * Do not use a separate spec file for sources. * slf4j-log4j12 artifact automatically instructs Maven to use the slf4j-reload4j artifact instead. * slf4j releases are now reproducible. * Build with source/target levels 8 * Add symlink to reload4j -> log4j12 for applications that expect that name.

    snakeyaml:
    • Update snakeyaml from version 1.31 to version 1.33. (jsc#SLE-23217) * Output error grow the rhn_web_ui.log rapidly (bsc#1204173) * CVE-2022-38752: Uncaught exception in java.base/java.util.ArrayList.hashCode (bsc#1203154)

    spec-version-maven-plugin:
    • Update spec-version-maven-plugin from 1.2 version to version 2.1 (jsc#SLE-23217) * Support both the jakarta.* and the javax.* apis * Build with java source and target levels 8

    stax2-api:
    • Build with source and target levels 8 (jsc#SLE-23217)

    stax-ex:
    • Provide stax-ex version 1.8 (jsc#SLE-23217)

    stringtemplate4:
    • Build with source and target levels 8 (jsc#SLE-23217)

    string-template-maven-plugin:
    • Build with source and target levels 8 (jsc#SLE-23217)

    stringtemplate:
    tagsoup:
    • Build with source and target levels 8 (jsc#SLE-23217)

    template-resolver:
    • Build with source and target levels 8 (jsc#SLE-23217)

    tesla-polyglot:
    • Update tesla-polyglot from version 0.2.1 to version 0.4.5. (jsc#SLE-23217) * Build with source and target levels 8 * Remove upper bound for JDK version to allow Java 11 and newer * polyglot-kotlin - revert automatic source folder setting to koltin * Update xstream version in test resources to avoid security alerts * Avoid assumption about replacement pom file being readable * Upgrade scala-maven-plugin, clojure-maven-plugin and Clojure * polyglot-kotlin: Set source folders to kotlin * Upgrade to kotlin 1.3.60 * Provide a mechanism to override properties of a polyglot build * TeslaModelProcessor.locatePom(File) ignores files ending in.xml * Use platform encoding in ModelReaderSupport * Invoker plugin update * takari parent update * plexus-component-metadata update to 2.1.0 * maven-enforcer-plugin update to 3.0.0-M3 * polyglot-kotlin: Avoid IllegalStateException * polyglot-kotlin: improved support for IntelliJ Idea usage * polyglot-kotlin: kotlin update and numerous improvements to more idiomatic kotlin * polyglot-common: + Execute tasks are now installed with inheritable set to false + The ExecuteContext interface now has default implementations + The ExecuteContext now includes getMavenSession() + the ExecuteContext now includes getLog() to comport with Java bean conventions. The log() operation has been deprecated. + the ExecuteContext now includes getBasedir() to comport with Java bean conventions. The basedir() operation has been deprecated. * polyglot-kotlin: + Updates Kotlin to 1.3.21 + Includes support for Maven's ClassRealm + Includes full support for the entire Maven model + Includes support for execute tasks via as inline lambdas or as external scripts. + Resolves ClassLoader issues that affected integration with IntelliJ IDEA * polyglot-java: fixed depMgt conversion * polyglot-ruby: java9+ support improvement * added polyglot-kotlin * polyglot-scala: + Convenience methods for Dependency (classifier, intransitive, % (scope)) + Support reporting-section in pom + Added default value for pom property modelversion (4.0.0) + Updated used Scala Version (2.11.12) + Made output dir to pom.scala files compilation configurable via system property polyglot.scala.outputdir + Improved support and docs for configuration elements of plugins * Upgrade to latest takari-pom parent * polyglot-yaml: Support for xml attributes * polyglot-yaml: exclude pomFile property from serialization * polyglot-java: Linux support and test fixes * polyglot-java: Moved examples into polyglot-maven-examples * Updated Scala version * Scala warning fixes * polyglot-scala: Scala syntax friendly include preprocessor * Added link to user of yml version * polyglot-scala: Use Zinc server for Scala module * polyglot-scala: Support more valid XML element name chars in dynamic Config * Experimental addition of Java as polyglot language.

    test-interface:
    • Build with source and target levels 8 (jsc#SLE-23217)

    testng:
    • Update testng from version 6.14.3 to version 7.4.0. (jsc#SLE-23217) * CVE-2020-11022: jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (bsc#1190663) * CVE-2020-11023: jquery: Untrusted code execution while passing HTML containing

    tomcat:
    • Update from version 9.0.31 to version 9.0.43 (jsc#SLE-23217)
    • CVE-2021-43980: Improve the recycling of Processor objects to make it more robust. (bsc#1203868)
    • CVE-2022-42252: Fixed a request smuggling. (bsc#1204918)
    • set logrotate for localhost.log, manager.log, host-manager.log and localhost_access_log.txt
    • use logrotate for catalina.out and configure server.xml
    • Use catalina.out for logging (bsc#1205647)
    • Do not hardcode /usr/libexec but use %%_libexecdir during the build where /usr/libexec and %%_libexecdir are different.
    • Build with source, target and release levels 8 (bsc#1201081)

    treelayout:
    • Build with source and target levels 8 (jsc#SLE-23217)

    trilead-ssh2:
    • Build with source and target levels 8 (jsc#SLE-23217)

    tycho:
    • Update tycho from version 1.2.0 to version 1.6.0. (jsc#SLE-23217) * Fix bootstrapping with new version of maven-install-plugin * Assure that all classes in tycho are understood by Java 8 (bsc#1198279) * Force building with java 11, since there is no config in tycho for java >= 15 * Do not force building with java 1.8, but with any java >= 1.8 * Drop support for obsolete modular JVMs (10 and 12) * Plexus Utils has been updated to version 3.3.0 as a prerequisite for other dependency updates. * ECJ has been updated to version 3.19.0. This version adds support for Java 12 bytecode and features. * JGit has been updated to version 5.5.0. * Equinox and p2 has been updated to their 2019-09 versions. * ObjectWeb ASM has been updated to version 7.0 from 5.0.3 which provides Java 11 compatibility in artifactcomparator. * Java 11: JDT was updated to 3.15.1

    univocity-parsers:
    • Update univocity-parsers from version 2.5.5 to version 2.9.1. (jsc#SLE-23217) * Build with source and target levels 8

    utfcpp:
    • Provide utfcpp version 3.2.1. (jsc#SLE-23217) * Required by antlr4.

    velocity:
    • Build with java source and target levels 8 (jsc#SLE-23217)
    • Do not build against the log4j12 packages, use the new reload4j

    werken-xpath:
    • Build with source and target levels 8 (jsc#SLE-23217)

    woodstox-core:
    • Update from version 5.2.0 to version 6.2.8. (jsc#SLE-23217) * Build with java source and target levels 8

    wsdl4j:
    • Build with source and target levels 8
    • Alias to axis:axis-wsdl4j

    ws-jaxme:
    • Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
    • On relevant distributions, build against the standalone jaxb-api
    • Build with source/target levels 8
    • Build against the standalone JavaEE modules unconditionally

    xalan-j2:
    • Do not link to the java_cup* compatibility links, but to the java-cup* ones
    • Build with source/target levels 8

    xbean:
    • Update xbean from version 4.5 to version 4.20 (jsc#SLE-23217) * Do not build against the log4j12 packages, use the new reload4j * Upgrade to asm 9.1 * Remove unnecessary dependency on log4j and commons-logging

    xerces-j2:
    • Update xerces-j2 from version 2.12.0 to versionn 2.12.2 (jsc#SLE-23217) * CVE-2022-23437: Infinite loop within Apache XercesJ xml parser (bsc#1195108) * Build with source/target levels 8

    xml-commons-apis:
    • Build with source and target levels 8 (jsc#SLE-23217)

    xml-commons-resolver:
    • Build with source and target levels 8 (jsc#SLE-23217)

    xmlgraphics-batik:
    • Update from version 1.10 to version 1.15 (jsc#SLE-23217) * CVE-2022-38398: Fixed information disclosure due to Jar url not being blocked by DefaultExternalResourceSecurity (bsc#1203674) * CVE-2022-38648: Fixed information disclosure due to missing blocking of external resource before calling fop (bsc#1203673) * CVE-2022-40146: Fixed information disclosure due to Jar url not being blocked by DefaultScriptSecurity (bsc#1203672) * CVE-2020-11987: Fixed SSRF due to improper input validation by the NodePickerPanel (bsc#1182748). * CVE-2019-17566: Fixed SSRF via 'xlink:href' attributes (bsc#1172961).

    xmlgraphics-commons:
    • CVE-2020-11988: Fixed a server-side request forgery caused by improper input validation by the XMPParser. (bsc#281607)
    • Build with source/target levels 8

    xmlgraphics-fop:
    • Update xmlgraphics-fop from version 2.1 to version 2.7. (jsc#SLE-23217) * Update PDFBox to 2.0.24 * Upgrade ant to 1.9.15 * Make the build reproducible (bsc#1047218) * Build against fontbox from apache-pdfbox >= 2 * Requires batik >= 1.11 * Package xmlgraphics-fop-hyph.jar and xmlgraphics-fop-sandbox.jar (bsc#1145693)

    xml-maven-plugin:
    • Build with source and target levels 8 (jsc#SLE-23217)

    xmlstreambuffer:
    • Provide xmlstreambuffer version 1.5.4 (jsc#SLE-23217)

    xmlunit:
    • Update xmlunit from version 1.5 to version 1.6 (jsc#SLE-23217) * Build with java source and target levels 8

    xmvn-connector:
    Rename xmvn-connector-aether to xmvn-connector and provide it as version 4.0.0. (jsc#SLE-23217)
    xmvn-connector-gradle:
    • Update xmvn-connector-gradle from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Make it standalone from xmvn sources

    xmvn-connector-ivy:
    • Update xmvn-connector-ivy from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Make it standalone from xmvn sources

    xmvn-mojo:
    • Update xmvn-mojo from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Bump codecov/codecov-action to 2.0.2 * Bump commons-compress from 1.20 to 1.21 in /xmvn-parent * Bump junit from 4.12 to 4.13.1 * Update compiler source/target to JDK 11

    xmvn-parent:
    • Update xmvn-parent from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Bump codecov/codecov-action to 2.0.2 * Bump commons-compress from 1.20 to 1.21 in /xmvn-parent * Update compiler source/target to JDK 11

    xmvn-tools:
    • Update xmvn-tools from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Build with modello 2.0.0 * Bump codecov/codecov-action to 2.0.2 * Drop bisect tool * Update compiler source/target to JDK 11

    xmvn:
    • Update xmvn from version 3.1.0 to version 4.0.0. (jsc#SLE-23217) * Bump codecov/codecov-action to 2.0.2 * Bump commons-compress from 1.20 to 1.21 in /xmvn-parent * Fix Javadoc generation for non-JPMS project with JDK 11 * Remove superflous JARs from assembly * Rename xmvn-connector-aether to xmvn-connector * Move release plugins to pluginManagement * Move prerequisites on Maven version to xmvn-mojo * Bump junit 4.13.1 * Bump slf4jVersion from 1.8.0-beta4 to 2.0.0-alpha2 in /xmvn-parent * Update Maven plugin versions * Drop Ivy * Drop Gradle * Switch to SHA-256 in CacheManager * Update dependency xmlunit.assertj to xmlunit.assertj3 * Update compiler source/target to JDK 11 * Require the maven-libs we built against in order to avoid hanging symlinks

    xpp2:
    • Build with source/target levels 8

    xpp3:
    • Build with source and target levels 8 (jsc#SLE-23217)

    xsom:
    • Provide xsom version 0~20140925. (jsc#SLE-23217)

    xstream:
    • Build against the standalone JavaEE modules unconditionally
    • Build against standalone activation-api and jaxb-api on systems where the JavaEE modules are not part of JDK

    xz-java:
    • Provide xz-java 1.8 and solve installation issues. (jsc#SLE-23217)
    • There are no source changes.

    zinc:
    • Disambiguate the requirements. Require directly sbt non-bootstrap
    • Build only *.scala and *.java files


    Advisory IDSUSE-RU-2023:776-1
    ReleasedThu Mar 16 17:29:23 2023
    SummaryRecommended update for gcc12
    Typerecommended
    Severitymoderate
    References
    Description:

    This update for gcc12 fixes the following issues:
    This update ships gcc12 also to the SUSE Linux Enterprise 15 SP1 LTSS and 15 SP2 LTSS products.
    SUSE Linux Enterprise 15 SP3 and SP4 get only refreshed builds without changes

    This update ship the GCC 12 compiler suite and its base libraries.
    The compiler baselibraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 11 ones.
    The new compilers for C, C++, and Fortran are provided in the SUSE Linux Enterprise Module for Development Tools.
    To use gcc12 compilers use:

    • install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
    • override your makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.

    For a full changelog with all new GCC12 features, check out
    https://gcc.gnu.org/gcc-12/changes.html


    Advisory IDSUSE-SU-2023:1582-1
    ReleasedMon Mar 27 10:31:52 2023
    SummarySecurity update for curl
    Typesecurity
    Severitymoderate
    References1209209,1209210,1209211,1209212,1209214,CVE-2023-27533,CVE-2023-27534,CVE-2023-27535,CVE-2023-27536,CVE-2023-27538
    Description:

    This update for curl fixes the following issues:

    • CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209).
    • CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210).
    • CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211).
    • CVE-2023-27536: Fixed GSS delegation too eager connection reuse (bsc#1209212).
    • CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214).


    Advisory IDSUSE-RU-2023:1648-1
    ReleasedTue Mar 28 17:35:00 2023
    SummaryRecommended update for maven-resolver
    Typerecommended
    Severitymoderate
    References1209461
    Description:


    This update for maven-resolver fixes a issue on Leap 15.4.

    • maven-resolver-named-locks was not shipped (bsc#1209461)


    Advisory IDSUSE-RU-2023:1662-1
    ReleasedWed Mar 29 10:36:23 2023
    SummaryRecommended update for patterns-base
    Typerecommended
    Severitymoderate
    References1203537
    Description:

    This update for patterns-base fixes the following issues:

    • change label of FIPS 140-2 to 140-3 to reflect our current certifications (bsc#1203537)


    Advisory IDSUSE-SU-2023:1688-1
    ReleasedWed Mar 29 18:19:10 2023
    SummarySecurity update for zstd
    Typesecurity
    Severitymoderate
    References1209533,CVE-2022-4899
    Description:

    This update for zstd fixes the following issues:

    • CVE-2022-4899: Fixed buffer overrun in util.c (bsc#1209533).


    Advisory IDSUSE-SU-2023:1718-1
    ReleasedFri Mar 31 15:47:34 2023
    SummarySecurity update for glibc
    Typesecurity
    Severitymoderate
    References1207571,1207957,1207975,1208358,CVE-2023-0687
    Description:

    This update for glibc fixes the following issues:
    Security issue fixed:

    • CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

    Other issues fixed:
    • Fix avx2 strncmp offset compare condition check (bsc#1208358)
    • elf: Allow dlopen of filter object to work (bsc#1207571)
    • powerpc: Fix unrecognized instruction errors with recent GCC
    • x86: Cache computation for AMD architecture (bsc#1207957)


    Advisory IDSUSE-RU-2023:1779-1
    ReleasedThu Apr 6 08:16:58 2023
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1208432
    Description:

    This update for systemd fixes the following issues:

    • Fix return non-zero value when disabling SysVinit service (bsc#1208432)
    • Drop build requirement on libpci, it's not no longer needed
    • Move systemd-boot and all components managing (secure) UEFI boot into udev sub-package, so they aren't installed in systemd based containers


    Advisory IDSUSE-RU-2023:1805-1
    ReleasedTue Apr 11 10:12:41 2023
    SummaryRecommended update for timezone
    Typerecommended
    Severityimportant
    References
    Description:

    This update for timezone fixes the following issues:

    • Version update from 2022g to 2023c: * Egypt now uses DST again, from April through October. * This year Morocco springs forward April 23, not April 30. * Palestine delays the start of DST this year. * Much of Greenland still uses DST from 2024 on. * America/Yellowknife now links to America/Edmonton. * tzselect can now use current time to help infer timezone. * The code now defaults to C99 or later.


    Advisory IDSUSE-RU-2023:1831-1
    ReleasedThu Apr 13 11:06:04 2023
    SummaryRecommended update for jsr-305
    Typerecommended
    Severityimportant
    References
    Description:

    This update for jsr-305 provides the following fix: - Ship the correct versions of jsr-305 on SUSE Manager repositories (no source changes).


    Advisory IDSUSE-SU-2023:1852-1
    ReleasedFri Apr 14 15:09:39 2023
    SummarySecurity update for harfbuzz
    Typesecurity
    Severityimportant
    References1207922,CVE-2023-25193
    Description:

    This update for harfbuzz fixes the following issues:

    • CVE-2023-25193: Fixed vulnerability that allowed attackers to trigger O(n^2) growth via consecutive marks (bsc#1207922).


    Advisory IDSUSE-RU-2023:1939-1
    ReleasedFri Apr 21 11:14:30 2023
    SummaryRecommended update for mozilla-nss
    Typerecommended
    Severitymoderate
    References1191546,1207209,1208242,1208999
    Description:

    This update for mozilla-nss fixes the following issues:

    • FIPS 140-3: Adjust SLI reporting for PBKDF2 parameter validation (bsc#1208999)
    • FIPS 140-3: Update session->lastOpWasFIPS before destroying the key after derivation in the CKM_TLS12_KEY_AND_MAC_DERIVE, CKM_NSS_TLS_KEY_AND_MAC_DERIVE_SHA256, CKM_TLS_KEY_AND_MAC_DERIVE and CKM_SSL3_KEY_AND_MAC_DERIVE cases. (bsc#1191546)
    • FIPS 140-3: more changes for pairwise consistency checks. (bsc#1207209)
    • Add manpages to mozilla-nss-tools (bsc#1208242)


    Advisory IDSUSE-SU-2023:2038-1
    ReleasedWed Apr 26 11:06:20 2023
    SummarySecurity update for git
    Typesecurity
    Severitymoderate
    References1210686,CVE-2023-25652,CVE-2023-25815,CVE-2023-29007
    Description:

    This update for git fixes the following issues:

    • CVE-2023-25652: Fixed partial overwrite of paths outside the working tree (bsc#1210686).
    • CVE-2023-25815: Fixed malicious placemtn of crafted message (bsc#1210686).
    • CVE-2023-29007: Fixed arbitrary configuration injection (bsc#1210686).


    Advisory IDSUSE-SU-2023:2060-1
    ReleasedThu Apr 27 17:04:25 2023
    SummarySecurity update for glib2
    Typesecurity
    Severitymoderate
    References1209713,1209714,1210135,CVE-2023-24593,CVE-2023-25180
    Description:

    This update for glib2 fixes the following issues:

    • CVE-2023-24593: Fixed a denial of service caused by handling a malicious text-form variant (bsc#1209714).
    • CVE-2023-25180: Fixed a denial of service caused by malicious serialised variant (bsc#1209713).

    The following non-security bug was fixed:
    • Fixed regression on s390x (bsc#1210135, glgo#GNOME/glib!2978).


    Advisory IDSUSE-SU-2023:2066-1
    ReleasedFri Apr 28 13:54:17 2023
    SummarySecurity update for shadow
    Typesecurity
    Severitymoderate
    References1210507,CVE-2023-29383
    Description:

    This update for shadow fixes the following issues:

    • CVE-2023-29383: Fixed apparent /etc/shadow manipulation via chfn (bsc#1210507).


    Advisory IDSUSE-SU-2023:2097-1
    ReleasedThu May 4 09:11:06 2023
    SummarySecurity update for maven and recommended update for antlr3, minlog, sbt, xmvn
    Typesecurity
    Severityimportant
    References1193795,CVE-2021-42550
    Description:

    This update for antlr3, maven, minlog, sbt, xmvn fixes the following issues:
    maven:

    • Version update from 3.8.5 to 3.8.6 (jsc#SLE-23217): * Security fixes: + CVE-2021-42550: Update Version of (optional) Logback (bsc#1193795) * Bug fixes: + Fix resolver session containing non-MavenWorkspaceReader + Fix for multiple maven instances working on same source tree that can lock each other + Don't ignore bin/ otherwise bin/ in apache-maven module cannot be added back + Fix IllegalStateException in SessionScope during guice injection in multithreaded build + Revert MNG-7347 (SessionScoped beans should be singletons for a given session) + Fix compilation failure with relocated transitive dependency + Fix deadlock during forked lifecycle executions + Fix issue with resolving dependencies between submodules * New features and improvements: + Create a multiline message helper for boxed log messages + Display a warning when an aggregator mojo is locking other mojo executions + Align Assembly Descriptor NS versions * Dependency upgrades: + Upgrade SLF4J to 1.7.36 + Upgrade JUnit to 4.13.2 + Upgrade Plexus Utils to 3.3.1
    • Move mvn.1 from bin to man directory
    antlr3:
    • Bug fixes in this version update from 3.5.2 to 3.5.3 (jsc#SLE-23217): * Change source compatibility to 1.8 and enable github workflows * Change Wiki URLs to theantlrguy.atlassian.net in README.txt * Add Bazel support
    • Remove enforcer plugin as it is not needed in a controlled environment
    minlog:
    • Bug fixes in this version update from 1.3.0 to 1.3.1 (jsc#SLE-23217): * Use currentTimeMillis * Use 3-Clause BSD * Use Java 7 JDK.

    sbt:
    • Fix build issues with maven 3.8.6 (jsc#SLE-23217)

    xmvn:
    • Remove RPM package build dependency on easymock (jsc#SLE-23217)


    Advisory IDSUSE-SU-2023:2111-1
    ReleasedFri May 5 14:34:00 2023
    SummarySecurity update for ncurses
    Typesecurity
    Severitymoderate
    References1210434,CVE-2023-29491
    Description:

    This update for ncurses fixes the following issues:

    • CVE-2023-29491: Fixed memory corruption issues when processing malformed terminfo data (bsc#1210434).


    Advisory IDSUSE-RU-2023:2131-1
    ReleasedTue May 9 13:35:24 2023
    SummaryRecommended update for openssh
    Typerecommended
    Severityimportant
    References1207014
    Description:

    This update for openssh fixes the following issues:

    • Remove some patches that cause invalid environment assignments (bsc#1207014).


    Advisory IDSUSE-OU-2023:2165-1
    ReleasedWed May 10 20:16:54 2023
    SummaryOptional update for junit
    Typeoptional
    Severitymoderate
    References
    Description:

    This update for junit fixes the following issues:

    • Conditionalize the build instructions so that junit can be built with both hamcrest 1.3 and 2.2 from the same sources (jsc#SLE-23217)


    Advisory IDSUSE-SU-2023:2222-1
    ReleasedTue May 16 17:41:47 2023
    SummarySecurity update for java-11-openjdk
    Typesecurity
    Severityimportant
    References1210628,1210631,1210632,1210634,1210635,1210636,1210637,CVE-2023-21930,CVE-2023-21937,CVE-2023-21938,CVE-2023-21939,CVE-2023-21954,CVE-2023-21967,CVE-2023-21968
    Description:

    This update for java-11-openjdk fixes the following issues:
    Upgrade to upsteam tag jdk-11.0.19+7 (April 2023 CPU):

    • CVE-2023-21930: Fixed AES support (bsc#1210628).
    • CVE-2023-21937: Fixed String platform support (bsc#1210631).
    • CVE-2023-21938: Fixed runtime support (bsc#1210632).
    • CVE-2023-21939: Fixed Swing platform support (bsc#1210634).
    • CVE-2023-21954: Fixed object reclamation process (bsc#1210635).
    • CVE-2023-21967: Fixed TLS session negotiation (bsc#1210636).
    • CVE-2023-21968: Fixed path handling (bsc#1210637).


    Advisory IDSUSE-SU-2023:2224-1
    ReleasedWed May 17 09:53:54 2023
    SummarySecurity update for curl
    Typesecurity
    Severityimportant
    References1211230,1211231,1211232,1211233,CVE-2023-28319,CVE-2023-28320,CVE-2023-28321,CVE-2023-28322
    Description:

    This update for curl adds the following feature:
    Update to version 8.0.1 (jsc#PED-2580)

    • CVE-2023-28319: use-after-free in SSH sha256 fingerprint check (bsc#1211230).
    • CVE-2023-28320: siglongjmp race condition (bsc#1211231).
    • CVE-2023-28321: IDN wildcard matching (bsc#1211232).
    • CVE-2023-28322: POST-after-PUT confusion (bsc#1211233).


    Advisory IDSUSE-RU-2023:2240-1
    ReleasedWed May 17 19:56:54 2023
    SummaryRecommended update for systemd
    Typerecommended
    Severitymoderate
    References1203141,1207410
    Description:

    This update for systemd fixes the following issues:

    • udev-rules: fix nvme symlink creation on namespace changes (bsc#1207410)
    • Optimize when hundred workers claim the same symlink with the same priority (bsc#1203141)
    • Add nss-resolve and systemd-network to Packagehub-Subpackages (MSC-626)


    Advisory IDSUSE-feature-2023:2269-1
    ReleasedMon May 22 14:50:34 2023
    SummaryFeature update for javapackages-tools
    Typefeature
    Severitymoderate
    References
    Description:

    This update for javapackages-tools fixes the following issues:

    • Version update from 5.3.1 to 6.1.0 (jsc#SLE-23217): * Add apache-rat-plugin to skippedPlugins * Add bootstrap metadata to XMvn resolver config * Add location of java binary used by the java-1.8.0-openjdk (JRE) package so that setting JAVA_HOME will work correctly * Add lua interpreter to check and GH actions * Add Lua scripts for removing annotations * Add more tests, fix behaviour * Add separate subpackage with RPM generators * Adding ppc64le architecture support on travis-ci * Delete run_tests.py * Drop deprecated add_maven_depmap macro * Drop SCL support * Fix builddep snippet generation * Fix extra XML handling of pom_change_dep * Fix invalid in XMvn configuration * Fix provides matching * Fix running tests without coverage * Implement separate simple class name matching * Introduce common and extra subpackages * Make generated javadoc package noarch * Make scripts compatible with rpmlua * Migrate CI from TravisCI to GitHub Actions * Modularize Lua scripts * Remove dependency on Six compatibility library * Remove explicit import of Python 3 features * Remove license headers from wrapper scripts * Remove Python 3.5 from .travis.yml * Replace nose by pytest * Skip execution of various Maven plugins * Update build status badge in README.md * Update documentation * Update ivy-local-classpath * Use XMvn Javadoc MOJO by default

    • Remove requirement to python-six as it is not needed


    Advisory IDSUSE-RU-2023:2383-1
    ReleasedMon Jun 5 17:40:54 2023
    SummaryRecommended update for jansi
    Typerecommended
    Severitymoderate
    References1210877
    Description:

    This update for jansi contains the following fix:

    • Fetch sources using source_service and don't distribute legally spurious files. (bsc#1210877)


    Advisory IDSUSE-SU-2023:2484-1
    ReleasedMon Jun 12 08:49:58 2023
    SummarySecurity update for openldap2
    Typesecurity
    Severitymoderate
    References1211795,CVE-2023-2953
    Description:

    This update for openldap2 fixes the following issues:

    • CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).