The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3659-1
Released
Wed Oct 16 15:12:47 2024
Summary
Recommended update for gcc14
Type
recommended
Severity
moderate
References
1188441,1210959,1214915,1219031,1220724,1221601
Description:
This update for gcc14 fixes the following issues:
This update ships the GNU Compiler Collection GCC 14.2. (jsc#PED-10474)
The compiler runtime libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 13 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP5 and SP6, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.
To use gcc14 compilers use:
install 'gcc14' or 'gcc14-c++' or one of the other 'gcc14-COMPILER' frontend packages.
override your Makefile to use CC=gcc14, CXX=g++14 and similar overrides for the other languages.
For a full changelog with all new GCC14 features, check out
https://gcc.gnu.org/gcc-14/changes.html
Add libquadmath0-devel-gcc14 sub-package to allow installing
quadmath.h and SO link without installing the fortran frontend
Avoid combine spending too much compile-time and memory doing nothing on s390x. [bsc#1188441]
Remove timezone Recommends from the libstdc++6 package. [bsc#1221601]
Revert libgccjit dependency change. [bsc#1220724]
Fix libgccjit-devel dependency, a newer shared library is OK.
Fix libgccjit dependency, the corresponding compiler isn't required.
Add cross-X-newlib-devel requires to newlib cross compilers.
[bsc#1219031]
Re-enable AutoReqProv for cross packages but filter files processed
via __requires_exclude_from and __provides_exclude_from.
[bsc#1219031]
Package m2rte.so plugin in the gcc14-m2 sub-package rather than
in gcc13-devel. [bsc#1210959]
Require libstdc++6-devel-gcc14 from gcc14-m2 as m2 programs
are linked against libstdc++6.
SUSE-CU-2024:5081-1
Container Advisory ID
SUSE-CU-2024:5081-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-33.1
Container Release
33.1
The following patches have been included in this update:
SUSE-CU-2024:5010-1
Container Advisory ID
SUSE-CU-2024:5010-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-32.9
Container Release
32.9
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3597-1
Released
Fri Oct 11 10:39:52 2024
Summary
Recommended update for bash
Type
recommended
Severity
moderate
References
1227807
Description:
This update for bash fixes the following issues:
Load completion file eveh if a brace expansion is in the
command line included (bsc#1227807).
SUSE-CU-2024:4976-1
Container Advisory ID
SUSE-CU-2024:4976-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-32.8
Container Release
32.8
The following patches have been included in this update:
SUSE-CU-2024:4853-1
Container Advisory ID
SUSE-CU-2024:4853-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-32.7
Container Release
32.7
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3527-1
Released
Fri Oct 4 15:27:07 2024
Summary
Recommended update for e2fsprogs
Type
recommended
Severity
moderate
References
1230145
Description:
This update for e2fsprogs fixes the following issue:
resize2fs: Check number of group descriptors only if meta_bg is disabled
(bsc#1230145).
SUSE-CU-2024:4746-1
Container Advisory ID
SUSE-CU-2024:4746-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-32.4
Container Release
32.4
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3503-1
Released
Tue Oct 1 16:13:07 2024
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1228661
Description:
This update for glibc fixes the following issue:
fix memory malloc problem: Initiate tcache shutdown even
without allocations (bsc#1228661).
SUSE-CU-2024:4671-1
Container Advisory ID
SUSE-CU-2024:4671-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-31.3
Container Release
31.3
The following patches have been included in this update:
SUSE-CU-2024:4647-1
Container Advisory ID
SUSE-CU-2024:4647-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-31.2
Container Release
31.2
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3477-1
Released
Fri Sep 27 15:22:22 2024
Summary
Recommended update for curl
Type
recommended
Severity
moderate
References
1230516
Description:
This update for curl fixes the following issue:
Make special characters in URL work with aws-sigv4 (bsc#1230516).
SUSE-CU-2024:4581-1
Container Advisory ID
SUSE-CU-2024:4581-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-31.1
Container Release
31.1
The following patches have been included in this update:
SUSE-CU-2024:4525-1
Container Advisory ID
SUSE-CU-2024:4525-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-29.5
Container Release
29.5
The following patches have been included in this update:
SUSE-CU-2024:4466-1
Container Advisory ID
SUSE-CU-2024:4466-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-29.3
Container Release
29.3
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:3300-1
Released
Wed Sep 18 14:27:53 2024
Summary
Recommended update for ncurses
Type
recommended
Severity
moderate
References
1229028
Description:
This update for ncurses fixes the following issues:
Allow the terminal description based on static fallback entries to be freed (bsc#1229028)
SUSE-CU-2024:4435-1
Container Advisory ID
SUSE-CU-2024:4435-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-29.1
Container Release
29.1
The following patches have been included in this update:
SUSE-CU-2024:4306-1
Container Advisory ID
SUSE-CU-2024:4306-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-28.2
Container Release
28.2
The following patches have been included in this update:
Document unexpected side effects of lazy destruction (bsc#1159034).
Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
Document unexpected side effects of lazy destruction (bsc#1159034).
Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
Document unexpected side effects of lazy destruction (bsc#1159034).
Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
Advisory ID
SUSE-SU-2024:2891-1
Released
Tue Aug 13 11:39:53 2024
Summary
Security update for openssl-1_1
Type
security
Severity
moderate
References
1226463,1227138,CVE-2024-5535
Description:
This update for openssl-1_1 fixes the following issues:
CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
Build with no-afalgeng (bsc#1226463)
SUSE-CU-2024:3586-1
Container Advisory ID
SUSE-CU-2024:3586-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-26.2
Container Release
26.2
The following patches have been included in this update:
SUSE-CU-2024:3499-1
Container Advisory ID
SUSE-CU-2024:3499-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-25.4
Container Release
25.4
The following patches have been included in this update:
SUSE-CU-2024:3498-1
Container Advisory ID
SUSE-CU-2024:3498-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-25.3
Container Release
25.3
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:2791-1
Released
Tue Aug 6 16:35:06 2024
Summary
Recommended update for various 32bit packages
Type
recommended
Severity
moderate
References
1228322
Description:
This update of various packages delivers 32bit variants to allow running Wine
on SLE PackageHub 15 SP6.
SUSE-CU-2024:3431-1
Container Advisory ID
SUSE-CU-2024:3431-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-25.1
Container Release
25.1
The following patches have been included in this update:
SUSE-CU-2024:3333-1
Container Advisory ID
SUSE-CU-2024:3333-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-24.8
Container Release
24.8
The following patches have been included in this update:
This update for java-11-openjdk fixes the following issues:
Updated to version 11.0.24+8 (July 2024 CPU):
CVE-2024-21131: Fixed a potential UTF8 size overflow (bsc#1228046).
CVE-2024-21138: Fixed an infinite loop due to excessive symbol
length (bsc#1228047).
CVE-2024-21140: Fixed a pre-loop limit overflow in Range Check
Elimination (bsc#1228048).
CVE-2024-21147: Fixed an out-of-bounds access in 2D image handling
(bsc#1228052).
CVE-2024-21145: Fixed an index overflow in RangeCheckElimination
(bsc#1228051).
CVE-2024-21144: Fixed an excessive loading time in Pack200 due to
improper header validation (bsc#1228050).
Advisory ID
SUSE-SU-2024:2656-1
Released
Tue Jul 30 15:36:08 2024
Summary
Security update for git
Type
security
Severity
important
References
1219660,CVE-2024-24577
Description:
This update for git fixes the following issues:
CVE-2024-24577: Fixed arbitrary code execution due to heap corruption in git_index_add (bsc#1219660)
Advisory ID
SUSE-RU-2024:2667-1
Released
Tue Jul 30 16:14:01 2024
Summary
Recommended update for libxkbcommon
Type
recommended
Severity
moderate
References
1218640,1228322
Description:
This update of libxkbcommon fixes the following issue:
ship libxkbregistry0-32bit and libxbkregistry-devel-32bit for use by Wine. (bsc#1218640 bsc#1228322)
Advisory ID
SUSE-RU-2024:2679-1
Released
Wed Jul 31 09:47:44 2024
Summary
Recommended update for patterns-base
Type
recommended
Severity
moderate
References
Description:
This update for patterns-base fixes the following issues:
Added a fips-certified pattern matching the exact certified FIPS
versions of the Linux Kernel, openssl 1.1.1, gnutls/nettle, mozilla-nss
and libgcrypt.
Note that applying this pattern might cause downgrade of various packages
and so deinstall security and bugfix updates released after the certified
binaries.
This update for procps fixes the following issues:
procps was updated to 3.3.15. (bsc#1092100)
Following security issues were fixed:
CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
with HOME unset in an attacker-controlled directory, the attacker could have
achieved privilege escalation by exploiting one of several vulnerabilities in
the config_file() function (bsc#1092100).
CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
Inbuilt protection in ps maped a guard page at the end of the overflowed
buffer, ensuring that the impact of this flaw is limited to a crash (temporary
denial of service) (bsc#1092100).
CVE-2018-1124: Prevent multiple integer overflows leading to a heap
corruption in file2strvec function. This allowed a privilege escalation for a
local attacker who can create entries in procfs by starting processes, which
could result in crashes or arbitrary code execution in proc utilities run by
other users (bsc#1092100).
CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
truncation/integer overflow issues (bsc#1092100).
Also this non-security issue was fixed:
Fix CPU summary showing old data. (bsc#1121753)
The update to 3.3.15 contains the following fixes:
library: Increment to 8:0:1
No removals, no new functions
Changes: slab and pid structures
library: Just check for SIGLOST and don't delete it
library: Fix integer overflow and LPE in file2strvec CVE-2018-1124
library: Use size_t for alloc functions CVE-2018-1126
ps: Fix buffer overflow in output buffer, causing DOS CVE-2018-1123
ps: Increase command name selection field to 64
top: Don't use cwd for location of config CVE-2018-1122
update translations
library: build on non-glibc systems
free: fix scaling on 32-bit systems
Revert 'Support running with child namespaces'
library: Increment to 7:0:1
No changes, no removals
New fuctions: numa_init, numa_max_node, numa_node_of_cpu, numa_uninit, xalloc_err_handler
doc: Document I idle state in ps.1 and top.1
free: fix some of the SI multiples
kill: -l space between name parses correctly
library: dont use vm_min_free on non Linux
library: don't strip off wchan prefixes (ps & top)
pgrep: warn about 15+ char name only if -f not used
pgrep/pkill: only match in same namespace by default
pidof: specify separator between pids
pkill: Return 0 only if we can kill process
pmap: fix duplicate output line under '-x' option
ps: avoid eip/esp address truncations
ps: recognizes SCHED_DEADLINE as valid CPU scheduler
ps: display NUMA node under which a thread ran
ps: Add seconds display for cputime and time
ps: Add LUID field
sysctl: Permit empty string for value
sysctl: Don't segv when file not available
sysctl: Read and write large buffers
top: add config file support for XDG specification
top: eliminated minor libnuma memory leak
top: show fewer memory decimal places (configurable)
top: provide command line switch for memory scaling
top: provide command line switch for CPU States
top: provides more accurate cpu usage at startup
top: display NUMA node under which a thread ran
top: fix argument parsing quirk resulting in SEGV
top: delay interval accepts non-locale radix point
top: address a wishlist man page NLS suggestion
top: fix potential distortion in 'Mem' graph display
top: provide proper multi-byte string handling
top: startup defaults are fully customizable
watch: define HOST_NAME_MAX where not defined
vmstat: Fix alignment for disk partition format
watch: Support ANSI 39,49 reset sequences
Advisory ID
SUSE-RU-2020:225-1
Released
Fri Jan 24 06:49:07 2020
Summary
Recommended update for procps
Type
recommended
Severity
moderate
References
1158830
Description:
This update for procps fixes the following issues:
Fix for 'ps -C' allowing to accept any arguments longer than 15 characters anymore. (bsc#1158830)
Advisory ID
SUSE-RU-2020:2958-1
Released
Tue Oct 20 12:24:55 2020
Summary
Recommended update for procps
Type
recommended
Severity
moderate
References
1158830
Description:
This update for procps fixes the following issues:
Fixes an issue when command 'ps -C' does not allow anymore an argument longer than 15 characters. (bsc#1158830)
Advisory ID
SUSE-RU-2021:1169-1
Released
Tue Apr 13 15:01:42 2021
Summary
Recommended update for procps
Type
recommended
Severity
low
References
1181976
Description:
This update for procps fixes the following issues:
Corrected a statement in the man page about processor pinning via taskset (bsc#1181976)
Advisory ID
SUSE-RU-2021:1549-1
Released
Mon May 10 13:48:00 2021
Summary
Recommended update for procps
Type
recommended
Severity
moderate
References
1185417
Description:
This update for procps fixes the following issues:
Support up to 2048 CPU as well. (bsc#1185417)
Advisory ID
SUSE-SU-2021:2555-1
Released
Thu Jul 29 08:29:55 2021
Summary
Security update for git
Type
security
Severity
moderate
References
1168930,1183026,1183580,CVE-2021-21300
Description:
This update for git fixes the following issues:
Update from version 2.26.2 to version 2.31.1 (jsc#SLE-18152)
Security fixes:
CVE-2021-21300: On case-insensitive file systems with support for symbolic links, if Git is configured globally
to apply delay-capable clean/smudge filters (such as Git LFS), Git could run remote code during a clone. (bsc#1183026)
Non security changes:
Add `sysusers` file to create `git-daemon` user.
Remove `perl-base` and `openssh-server` dependency on `git-core`and provide a `perl-Git` package. (jsc#SLE-17838)
`fsmonitor` bug fixes
Fix `git bisect` to take an annotated tag as a good/bad endpoint
Fix a corner case in `git mv` on case insensitive systems
Require only `openssh-clients` where possible (like Tumbleweed or SUSE Linux Enterprise >= 15 SP3). (bsc#1183580)
Drop `rsync` requirement, not necessary anymore.
Use of `pack-redundant` command is discouraged and will trigger a warning. The replacement is `repack -d`.
The `--format=%(trailers)` mechanism gets enhanced to make it easier to design output for machine consumption.
No longer give message to choose between rebase or merge upon pull if the history `fast-forwards`.
The configuration variable `core.abbrev` can be set to `no` to force no abbreviation regardless of the hash algorithm
`git rev-parse` can be explicitly told to give output as absolute or relative path with the
`--path-format=(absolute|relative)` option.
Bash completion update to make it easier for end-users to add completion for their custom `git` subcommands.
`git maintenance` learned to drive scheduled maintenance on platforms whose native scheduling methods are not 'cron'.
After expiring a reflog and making a single commit, the reflog for the branch would record a single entry that
knows both `@{0}` and `@{1}`, but we failed to answer 'what commit were we on?', i.e. `@{1}`
`git bundle` learns `--stdin` option to read its refs from the standard input.
Also, it now does not lose refs when they point at the same object.
`git log` learned a new `--diff-merges=` option.
`git ls-files` can and does show multiple entries when the index is unmerged, which is a source for confusion
unless `-s/-u` option is in use. A new option `--deduplicate` has been introduced.
`git worktree list` now annotates worktrees as prunable, shows locked and prunable attributes
in `--porcelain mode`, and gained a `--verbose` option.
`git clone` tries to locally check out the branch pointed at by HEAD of the remote repository after it
is done, but the protocol did not convey the information necessary to do so when copying an empty repository.
The protocol v2 learned how to do so.
There are other ways than `..` for a single token to denote a `commit range', namely `^!`
and `^-`, but `git range-diff` did not understand them.
The `git range-diff` command learned `--(left|right)-only` option to show only one side of the compared range.
`git mergetool` feeds three versions (base, local and remote) of a conflicted path unmodified.
The command learned to optionally prepare these files with unconflicted parts already resolved.
The `.mailmap` is documented to be read only from the root level of a working tree, but a stray file
in a bare repository also was read by accident, which has been corrected.
`git maintenance` tool learned a new `pack-refs` maintenance task.
Improved error message given when a configuration variable that is expected to have a boolean value.
Signed commits and tags now allow verification of objects, whose two object names
(one in SHA-1, the other in SHA-256) are both signed.
`git diff`, `git log` `--{skip,rotate}-to=` allows the user to discard diff output for early
paths or move them to the end of the output.
`git difftool` learned `--skip-to=` option to restart an interrupted session from an arbitrary path.
`git grep` has been tweaked to be limited to the sparse checkout paths.
`git rebase --[no-]fork-point` gained a configuration variable `rebase.forkPoint` so that users do not have
to keep specifying a non-default setting.
`git stash` did not work well in a sparsely checked out working tree.
Newline characters in the host and path part of `git://` URL are now forbidden.
`Userdiff` updates for PHP, Rust, CSS
Avoid administrator error leading to data loss with `git push --force-with-lease[=]` by
introducing `--force-if-includes`
only pull `asciidoctor` for the default ruby version
The `--committer-date-is-author-date` option of `rebase` and `am` subcommands lost the e-mail address by
mistake in 2.29
The transport protocol v2 has become the default again
`git worktree` gained a `repair` subcommand, `git init --separate-git-dir` no longer corrupts administrative data
related to linked worktrees
`git maintenance` introduced for repository maintenance tasks
`fetch.writeCommitGraph` is deemed to be still a bit too risky and is no longer part of the
`feature.experimental` set.
The commands in the `diff` family honors the `diff.relative` configuration variable.
`git diff-files` has been taught to say paths that are marked as `intent-to-add` are new files,
not modified from an empty blob.
`git gui` now allows opening work trees from the start-up dialog.
`git bugreport` reports what shell is in use.
Some repositories have commits that record wrong committer timezone; `git fast-import` has an option to pass
these timestamps intact to allow recreating existing repositories as-is.
`git describe` will always use the `long` version when giving its output based misplaced tags
`git pull` issues a warning message until the `pull.rebase` configuration variable is explicitly given
Advisory ID
SUSE-RU-2021:3766-1
Released
Tue Nov 23 07:07:43 2021
Summary
Recommended update for git
Type
recommended
Severity
moderate
References
1192023
Description:
This update for git fixes the following issues:
Installation of the 'git-daemon' package needs nogroup group dependency (bsc#1192023)
Advisory ID
SUSE-RU-2022:227-1
Released
Mon Jan 31 06:05:25 2022
Summary
Recommended update for git
Type
recommended
Severity
moderate
References
1193722
Description:
This update for git fixes the following issues:
update to 2.34.1 (bsc#1193722):
* 'git grep' looking in a blob that has non-UTF8 payload was
completely broken when linked with certain versions of PCREv2
library in the latest release.
* 'git pull' with any strategy when the other side is behind us
should succeed as it is a no-op, but doesn't.
* An earlier change in 2.34.0 caused JGit application (that abused
GIT_EDITOR mechanism when invoking 'git config') to get stuck with
a SIGTTOU signal; it has been reverted.
* An earlier change that broke .gitignore matching has been reverted.
* SubmittingPatches document gained a syntactically incorrect mark-up,
which has been corrected.
git 2.33.0:
* 'git send-email' learned the '--sendmail-cmd' command line option
and the 'sendemail.sendmailCmd' configuration variable, which is a
more sensible approach than the current way of repurposing the
'smtp-server' that is meant to name the server to instead name the
command to talk to the server.
* The userdiff pattern for C# learned the token 'record'.
* 'git rev-list' learns to omit the 'commit ' header
lines from the output with the `--no-commit-header` option.
* 'git worktree add --lock' learned to record why the worktree is
locked with a custom message.
* internal improvements including performance optimizations
* a number of bug fixes
git 2.32.0:
* '.gitattributes', '.gitignore', and '.mailmap' files that are
symbolic links are ignored
* 'git apply --3way' used to first attempt a straight
application, and only fell back to the 3-way merge algorithm
when the straight application failed. Starting with this
version, the command will first try the 3-way merge algorithm
and only when it fails (either resulting with conflict or the
base versions of blobs are missing), falls back to the usual
patch application.
* 'git stash show' can now show the untracked part of the stash
* Improved 'git repack' strategy
* http code can now unlock a certificate with a cached password
respectively.
* 'git clone --reject-shallow' option fails the clone as soon as
we notice that we are cloning from a shallow repository.
* 'gitweb' learned 'e-mail privacy' feature
* Multiple improvements to output and configuration options
* Bug fixes and developer visible fixes
Advisory ID
SUSE-RU-2022:808-1
Released
Fri Mar 11 06:07:58 2022
Summary
Recommended update for procps
Type
recommended
Severity
moderate
References
1195468
Description:
This update for procps fixes the following issues:
Stop registering signal handler for SIGURG, to avoid `ps` failure if
someone sends such signal. Without the signal handler, SIGURG will
just be ignored. (bsc#1195468)
Advisory ID
SUSE-SU-2022:1484-1
Released
Mon May 2 16:47:10 2022
Summary
Security update for git
Type
security
Severity
important
References
1181400,1198234,CVE-2022-24765
Description:
This update for git fixes the following issues:
Updated to version 2.35.3:
- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).
Advisory ID
SUSE-SU-2022:2566-1
Released
Wed Jul 27 15:04:49 2022
Summary
Security update for pcre2
Type
security
Severity
important
References
1199235,CVE-2022-1587
Description:
This update for pcre2 fixes the following issues:
CVE-2022-1587: Fixed out-of-bounds read due to bug in recursions (bsc#1199235).
Advisory ID
SUSE-RU-2022:2944-1
Released
Wed Aug 31 05:39:14 2022
Summary
Recommended update for procps
Type
recommended
Severity
important
References
1181475
Description:
This update for procps fixes the following issues:
Fix 'free' command reporting misleading 'used' value (bsc#1181475)
Advisory ID
SUSE-SU-2022:3931-1
Released
Thu Nov 10 11:26:01 2022
Summary
Security update for git
Type
security
Severity
moderate
References
1204455,1204456,CVE-2022-39253,CVE-2022-39260
Description:
This update for git fixes the following issues:
- CVE-2022-39260: Fixed overflow in split_cmdline() (bsc#1204456).
- CVE-2022-39253: Fixed dereference issue with symbolic links via the `--local` clone mechanism (bsc#1204455).
Advisory ID
SUSE-SU-2023:110-1
Released
Fri Jan 20 10:18:16 2023
Summary
Security update for git
Type
security
Severity
important
References
1207032,1207033,CVE-2022-23521,CVE-2022-41903
Description:
This update for git fixes the following issues:
CVE-2022-41903: Fixed a heap overflow in the 'git archive' and
'git log --format' commands (bsc#1207033).
CVE-2022-23521: Fixed an integer overflow that could be triggered
when parsing a gitattributes file (bsc#1207032).
Advisory ID
SUSE-RU-2023:181-1
Released
Thu Jan 26 21:55:43 2023
Summary
Recommended update for procps
Type
recommended
Severity
low
References
1206412
Description:
This update for procps fixes the following issues:
Improve memory handling/usage (bsc#1206412)
Make sure that correct library version is installed (bsc#1206412)
Advisory ID
SUSE-SU-2023:348-1
Released
Fri Feb 10 15:08:41 2023
Summary
Security update for less
Type
security
Severity
moderate
References
1207815,CVE-2022-46663
Description:
This update for less fixes the following issues:
- CVE-2022-46663: Fixed denial-of-service by printing specially crafted escape sequences to the terminal (bsc#1207815).
Advisory ID
SUSE-SU-2023:430-1
Released
Wed Feb 15 17:42:25 2023
Summary
Security update for git
Type
security
Severity
important
References
1208027,1208028,CVE-2023-22490,CVE-2023-23946
Description:
This update for git fixes the following issues:
- CVE-2023-22490: Fixed incorrectly usable local clone optimization even when using a non-local transport (bsc#1208027).
- CVE-2023-23946: Fixed issue where a path outside the working tree can be overwritten as the user who is running 'git apply' (bsc#1208028).
Allow - as leading character to ignore possible errors on systctl entries (bsc#1209122)
Advisory ID
SUSE-SU-2023:3327-1
Released
Wed Aug 16 08:45:25 2023
Summary
Security update for pcre2
Type
security
Severity
moderate
References
1213514,CVE-2022-41409
Description:
This update for pcre2 fixes the following issues:
- CVE-2022-41409: Fixed integer overflow vulnerability in pcre2test that allows attackers to cause a denial of service via negative input (bsc#1213514).
Advisory ID
SUSE-SU-2023:3440-1
Released
Mon Aug 28 08:57:10 2023
Summary
Security update for gawk
Type
security
Severity
low
References
1214025,CVE-2023-4156
Description:
This update for gawk fixes the following issues:
CVE-2023-4156: Fix a heap out of bound read by validating the index into argument list. (bsc#1214025)
Advisory ID
SUSE-SU-2023:3472-1
Released
Tue Aug 29 10:55:16 2023
Summary
Security update for procps
Type
security
Severity
low
References
1214290,CVE-2023-4016
Description:
This update for procps fixes the following issues:
- CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290).
Advisory ID
SUSE-RU-2023:3994-1
Released
Fri Oct 6 13:44:15 2023
Summary
Recommended update for git
Type
recommended
Severity
moderate
References
1215533
Description:
This update for git fixes the following issues:
Downgrade openssh dependency to recommends (bsc#1215533)
Advisory ID
SUSE-RU-2023:4716-1
Released
Mon Dec 11 18:38:23 2023
Summary
Recommended update for git
Type
recommended
Severity
moderate
References
1216501
Description:
This update for git fixes the following issues:
Add rule for /etc/gitconfig in gitweb.cgi apparmor profile (bsc#1216501).
gitweb.cgi AppArmor profile
- make the profile a named profile
- add local/include to make custom additions easier
Advisory ID
SUSE-RU-2024:11-1
Released
Tue Jan 2 13:24:52 2024
Summary
Recommended update for procps
Type
recommended
Severity
moderate
References
1029961,1158830,1206798,1209122
Description:
This update for procps fixes the following issues:
Update procps to 3.3.17 (jsc#PED-3244 jsc#PED-6369)
For support up to 2048 CPU as well (bsc#1185417)
Allow `-´ as leading character to ignore possible errors on systctl entries (bsc#1209122)
Get the first CPU summary correct (bsc#1121753)
Enable pidof for SLE-15 as this is provided by sysvinit-tools
Use a check on syscall __NR_pidfd_open to decide if
the pwait tool and its manual page will be build
Do not truncate output of w with option -n
Prefer logind over utmp (jsc#PED-3144)
Don't install translated man pages for non-installed binaries
(uptime, kill).
Fix directory for Ukrainian man pages translations.
Move localized man pages to lang package.
Update to procps-ng-3.3.17
* library: Incremented to 8:3:0
(no removals or additions, internal changes only)
* all: properly handle utf8 cmdline translations
* kill: Pass int to signalled process
* pgrep: Pass int to signalled process
* pgrep: Check sanity of SG_ARG_MAX
* pgrep: Add older than selection
* pidof: Quiet mode
* pidof: show worker threads
* ps.1: Mention stime alias
* ps: check also match on truncated 16 char comm names
* ps: Add exe output option
* ps: A lot more sorting available
* pwait: New command waits for a process
* sysctl: Match systemd directory order
* sysctl: Document directory order
* top: ensure config file backward compatibility
* top: add command line 'e' for symmetry with 'E'
* top: add '4' toggle for two abreast cpu display
* top: add '!' toggle for combining multiple cpus
* top: fix potential SEGV involving -p switch
* vmstat: Wide mode gives wider proc columns
* watch: Add environment variable for interval
* watch: Add no linewrap option
* watch: Support more colors
* free,uptime,slabtop: complain about extra ops
Package translations in procps-lang.
Fix pgrep: cannot allocate 4611686018427387903 bytes when ulimit -s is unlimited.
Enable pidof by default
Update to procps-ng-3.3.16
* library: Increment to 8:2:0
No removals or functions
Internal changes only, so revision is incremented.
Previous version should have been 8:1:0 not 8:0:1
* docs: Use correct symbols for -h option in free.1
* docs: ps.1 now warns about command name length
* docs: install translated man pages
* pgrep: Match on runstate
* snice: Fix matching on pid
* top: can now exploit 256-color terminals
* top: preserves 'other filters' in configuration file
* top: can now collapse/expand forest view children
* top: parent %CPU time includes collapsed children
* top: improve xterm support for vim navigation keys
* top: avoid segmentation fault at program termination
* 'ps -C' does not allow anymore an argument longer than 15 characters (bsc#1158830)
Advisory ID
SUSE-RU-2024:960-1
Released
Thu Mar 21 09:35:14 2024
Summary
Recommended update for git
Type
recommended
Severity
moderate
References
1216545
Description:
This update for git fixes the following issues:
Do not replace apparmor configuration (bsc#1216545)
CVE-2024-32002: Fixed recursive clones on case-insensitive filesystems that support symbolic links are susceptible to case confusion (bsc#1224168).
CVE-2024-32004: Fixed arbitrary code execution during local clones (bsc#1224170).
CVE-2024-32020: Fixed file overwriting vulnerability during local clones (bsc#1224171).
CVE-2024-32021: Fixed git may create hardlinks to arbitrary user-readable files (bsc#1224172).
CVE-2024-32465: Fixed arbitrary code execution during clone operations (bsc#1224173).
Advisory ID
SUSE-OU-2024:2282-1
Released
Tue Jul 2 22:41:28 2024
Summary
Optional update for openscap, scap-security-guide
Type
optional
Severity
moderate
References
Description:
This update for scap-security-guide and openscap provides the SCAP tooling
for SLE Micro 5.3, 5.4, 5.5.
This includes shipping openscap dependencies libxmlsec1-1 and libxmlsec1-openssl for SLE Micro.
Advisory ID
SUSE-SU-2024:2302-1
Released
Thu Jul 4 16:21:10 2024
Summary
Security update for krb5
Type
security
Severity
important
References
1227186,1227187,CVE-2024-37370,CVE-2024-37371
Description:
This update for krb5 fixes the following issues:
CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).
SUSE-CU-2024:3113-1
Container Advisory ID
SUSE-CU-2024:3113-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-23.1
Container Release
23.1
The following patches have been included in this update:
SUSE-CU-2024:2981-1
Container Advisory ID
SUSE-CU-2024:2981-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-22.7
Container Release
22.7
The following patches have been included in this update:
SUSE-CU-2024:2891-1
Container Advisory ID
SUSE-CU-2024:2891-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-22.6
Container Release
22.6
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:2086-1
Released
Wed Jun 19 11:48:24 2024
Summary
Recommended update for gcc13
Type
recommended
Severity
moderate
References
1188441
Description:
This update for gcc13 fixes the following issues:
Update to GCC 13.3 release
Removed Fiji support from the GCN offload compiler as that is requiring
Code Object version 3 which is no longer supported by llvm18.
Avoid combine spending too much compile-time and memory doing nothing
on s390x. [bsc#1188441]
Make requirement to lld version specific to avoid requiring the
meta-package.
SUSE-CU-2024:2782-1
Container Advisory ID
SUSE-CU-2024:2782-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-21.5
Container Release
21.5
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:2051-1
Released
Tue Jun 18 09:16:01 2024
Summary
Security update for openssl-1_1
Type
security
Severity
important
References
1225551,CVE-2024-4741
Description:
This update for openssl-1_1 fixes the following issues:
CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
SUSE-CU-2024:2704-1
Container Advisory ID
SUSE-CU-2024:2704-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-21.3
Container Release
21.3
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:2024-1
Released
Thu Jun 13 16:15:18 2024
Summary
Recommended update for jitterentropy
Type
recommended
Severity
moderate
References
1209627
Description:
This update for jitterentropy fixes the following issues:
Fixed a stack corruption on s390x: [bsc#1209627]
* Output size of the STCKE command on s390x is 16 bytes, compared
to 8 bytes of the STCK command. Fix a stack corruption in the
s390x version of jent_get_nstime(). Add some more detailed
information on the STCKE command.
Updated to 3.4.1
add FIPS 140 hints to man page
simplify the test tool to search for optimal configurations
fix: jent_loop_shuffle: re-add setting the time that was lost with 3.4.0
enhancement: add ARM64 assembler code to read high-res timer
SUSE-CU-2024:2638-1
Container Advisory ID
SUSE-CU-2024:2638-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-21.1
Container Release
21.1
The following patches have been included in this update:
SUSE-CU-2024:2569-1
Container Advisory ID
SUSE-CU-2024:2569-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-20.1
Container Release
20.1
The following patches have been included in this update:
SUSE-CU-2024:2516-1
Container Advisory ID
SUSE-CU-2024:2516-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-19.1
Container Release
19.1
The following patches have been included in this update:
SUSE-CU-2024:2466-1
Container Advisory ID
SUSE-CU-2024:2466-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-18.15
Container Release
18.15
The following patches have been included in this update:
This update for java-11-openjdk fixes the following issues:
CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)
CVE-2024-21012: Fixed unauthorized data modification due HTTP/2 client improper reverse DNS lookup (JDK-8315708,bsc#1222987)
CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)
CVE-2024-21085: Fixed denial of service due to Pack200 excessive memory allocation (JDK-8322114,bsc#1222984)
CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with 'Exceeded _node_regs array' (JDK-8317507,JDK-8325348,bsc#1222986)
Other fixes:
Upgrade to upstream tag jdk-11.0.23+9 (April 2024 CPU)
* Security fixes
+ JDK-8318340: Improve RSA key implementations
* Other changes
+ JDK-6928542: Chinese characters in RTF are not decoded
+ JDK-7132796: [macosx] closed/javax/swing/JComboBox/4517214/
/bug4517214.java fails on MacOS
+ JDK-7148092: [macosx] When Alt+down arrow key is pressed,
the combobox popup does not appear.
+ JDK-8054022: HttpURLConnection timeouts with Expect:
100-Continue and no chunking
+ JDK-8054572: [macosx] JComboBox paints the border incorrectly
+ JDK-8058176: [mlvm] tests should not allow code cache
exhaustion
+ JDK-8067651: LevelTransitionTest.java, fix trivial methods
levels logic
+ JDK-8068225: nsk/jdi/EventQueue/remove_l/remove_l005
intermittently times out
+ JDK-8156889: ListKeychainStore.sh fails in some virtualized
environments
+ JDK-8166275: vm/mlvm/meth/stress/compiler/deoptimize keeps
timeouting
+ JDK-8166554: Avoid compilation blocking in
OverloadCompileQueueTest.java
+ JDK-8169475: WheelModifier.java fails by timeout
+ JDK-8180266: Convert sun/security/provider/KeyStore/DKSTest.sh
to Java Jtreg Test
+ JDK-8186610: move ModuleUtils to top-level testlibrary
+ JDK-8192864: defmeth tests can hide failures
+ JDK-8193543: Regression automated test '/open/test/jdk/java/
/awt/TrayIcon/SystemTrayInstance/SystemTrayInstanceTest.java'
fails
+ JDK-8198668: MemoryPoolMBean/isUsageThresholdExceeded/
/isexceeded001/TestDescription.java still failing
+ JDK-8202282: [TESTBUG] appcds TestCommon
.makeCommandLineForAppCDS() can be removed
+ JDK-8202790: DnD test DisposeFrameOnDragTest.java does not
clean up
+ JDK-8202931: [macos] java/awt/Choice/ChoicePopupLocation/
/ChoicePopupLocation.java fails
+ JDK-8207211: [TESTBUG] Remove excessive output from
CDS/AppCDS tests
+ JDK-8207214: Broken links in JDK API serialized-form page
+ JDK-8207855: Make applications/jcstress invoke tests in
batches
+ JDK-8208243: vmTestbase/gc/lock/jni/jnilock002/
/TestDescription.java fails in jdk/hs nightly
+ JDK-8208278: [mlvm] [TESTBUG] vm.mlvm.mixed.stress.java
.findDeadlock.INDIFY_Test Deadlocked threads are not always
detected
+ JDK-8208623: [TESTBUG] runtime/LoadClass/LongBCP.java fails
in AUFS file system
+ JDK-8208699: remove unneeded imports from runtime tests
+ JDK-8208704: runtime/appcds/MultiReleaseJars.java timed out
often in hs-tier7 testing
+ JDK-8208705: [TESTBUG] The -Xlog:cds,cds+hashtables vm option
is not always required for appcds tests
+ JDK-8209549: remove VMPropsExt from TEST.ROOT
+ JDK-8209595: MonitorVmStartTerminate.java timed out
+ JDK-8209946: [TESTBUG] CDS tests should use '@run driver'
+ JDK-8211438: [Testbug] runtime/XCheckJniJsig/XCheckJSig.java
looks for libjsig in wrong location
+ JDK-8211978: Move testlibrary/jdk/testlibrary/
/SimpleSSLContext.java and testkeys to network testlibrary
+ JDK-8213622: Windows VS2013 build failure - ''snprintf':
identifier not found'
+ JDK-8213926: WB_EnqueueInitializerForCompilation requests
compilation for NULL
+ JDK-8213927: G1 ignores AlwaysPreTouch when
UseTransparentHugePages is enabled
+ JDK-8214908: add ctw tests for jdk.jfr and jdk.management.jfr
modules
+ JDK-8214915: CtwRunner misses export for jdk.internal.access
+ JDK-8216408: XMLStreamWriter setDefaultNamespace(null) throws
NullPointerException
+ JDK-8217475: Unexpected StackOverflowError in 'process
reaper' thread
+ JDK-8218754: JDK-8068225 regression in JDIBreakpointTest
+ JDK-8219475: javap man page needs to be updated
+ JDK-8219585: [TESTBUG] sun/management/jmxremote/bootstrap/
/JMXInterfaceBindingTest.java passes trivially when it
shouldn't
+ JDK-8219612: [TESTBUG] compiler.codecache.stress.Helper
.TestCaseImpl can't be defined in different runtime package as
its nest host
+ JDK-8225471: Test utility jdk.test.lib.util.FileUtils
.areAllMountPointsAccessible needs to tolerate duplicates
+ JDK-8226706: (se) Reduce the number of outer loop iterations
on Windows in java/nio/channels/Selector/RacyDeregister.java
+ JDK-8226905: unproblem list applications/ctw/modules/* tests
on windows
+ JDK-8226910: make it possible to use jtreg's -match via
run-test framework
+ JDK-8227438: [TESTLIB] Determine if file exists by
Files.exists in function FileUtils.deleteFileIfExistsWithRetry
+ JDK-8231585: java/lang/management/ThreadMXBean/
/MaxDepthForThreadInfoTest.java fails with
java.lang.NullPointerException
+ JDK-8232839: JDI AfterThreadDeathTest.java failed due to
'FAILED: Did not get expected IllegalThreadStateException on a
StepRequest.enable()'
+ JDK-8233453: MLVM deoptimize stress test timed out
+ JDK-8234309: LFGarbageCollectedTest.java fails with parse
Exception
+ JDK-8237222: [macos] java/awt/Focus/UnaccessibleChoice/
/AccessibleChoiceTest.java fails
+ JDK-8237777: 'Dumping core ...' is shown despite claiming
that '# No core dump will be written.'
+ JDK-8237834: com/sun/jndi/ldap/LdapDnsProviderTest.java
failing with LDAP response read timeout
+ JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel
+ JDK-8239801: [macos] java/awt/Focus/UnaccessibleChoice/
/AccessibleChoiceTest.java fails
+ JDK-8244679: JVM/TI GetCurrentContendedMonitor/contmon001
failed due to '(IsSameObject#3) unexpected monitor object:
0x000000562336DBA8'
+ JDK-8246222: Rename javac test T6395981.java to be more
informative
+ JDK-8247818: GCC 10 warning stringop-overflow with symbol code
+ JDK-8249087: Always initialize _body[0..1] in Symbol
constructor
+ JDK-8251349: Add TestCaseImpl to
OverloadCompileQueueTest.java's build dependencies
+ JDK-8251904: vmTestbase/nsk/sysdict/vm/stress/btree/btree010/
/btree010.java fails with ClassNotFoundException:
nsk.sysdict.share.BTree0LLRLRLRRLR
+ JDK-8253543: sanity/client/SwingSet/src/
/ButtonDemoScreenshotTest.java failed with 'AssertionError:
All pixels are not black'
+ JDK-8253739: java/awt/image/MultiResolutionImage/
/MultiResolutionImageObserverTest.java fails
+ JDK-8253820: Save test images and dumps with timestamps from
client sanity suite
+ JDK-8255277: randomDelay in DrainDeadlockT and
LoggingDeadlock do not randomly delay
+ JDK-8255546: Missing coverage for
javax.smartcardio.CardPermission and ResponseAPDU
+ JDK-8255743: Relax SIGFPE match in in
runtime/ErrorHandling/SecondaryErrorTest.java
+ JDK-8257505: nsk/share/test/StressOptions stressTime is
scaled in getter but not when printed
+ JDK-8259801: Enable XML Signature secure validation mode by
default
+ JDK-8264135: UnsafeGetStableArrayElement should account for
different JIT implementation details
+ JDK-8265349: vmTestbase/../stress/compiler/deoptimize/
/Test.java fails with OOME due to CodeCache exhaustion.
+ JDK-8269025: jsig/Testjsig.java doesn't check exit code
+ JDK-8269077: TestSystemGC uses 'require vm.gc.G1' for large
pages subtest
+ JDK-8271094: runtime/duplAttributes/DuplAttributesTest.java
doesn't check exit code
+ JDK-8271224: runtime/EnclosingMethodAttr/EnclMethodAttr.java
doesn't check exit code
+ JDK-8271828: mark hotspot runtime/classFileParserBug tests
which ignore external VM flags
+ JDK-8271829: mark hotspot runtime/Throwable tests which
ignore external VM flags
+ JDK-8271890: mark hotspot runtime/Dictionary tests which
ignore external VM flags
+ JDK-8272291: mark hotspot runtime/logging tests which ignore
external VM flags
+ JDK-8272335: runtime/cds/appcds/MoveJDKTest.java doesn't
check exit codes
+ JDK-8272551: mark hotspot runtime/modules tests which ignore
external VM flags
+ JDK-8272552: mark hotspot runtime/cds tests which ignore
external VM flags
+ JDK-8273803: Zero: Handle 'zero' variant in
CommandLineOptionTest.java
+ JDK-8274122: java/io/File/createTempFile/SpecialTempFile.java
fails in Windows 11
+ JDK-8274621: NullPointerException because listenAddress[0] is
null
+ JDK-8276796: gc/TestSystemGC.java large pages subtest fails
with ZGC
+ JDK-8280007: Enable Neoverse N1 optimizations for Arm
Neoverse V1 & N2
+ JDK-8281149: (fs) java/nio/file/FileStore/Basic.java fails
with java.lang.RuntimeException: values differ by more than
1GB
+ JDK-8281377: Remove vmTestbase/nsk/monitoring/ThreadMXBean/
/ThreadInfo/Deadlock/JavaDeadlock001/TestDescription.java
from problemlist.
+ JDK-8281717: Cover logout method for several LoginModule
+ JDK-8282665: [REDO] ByteBufferTest.java: replace endless
recursion with RuntimeException in void ck(double x, double y)
+ JDK-8284090: com/sun/security/auth/module/AllPlatforms.java
fails to compile
+ JDK-8285756: clean up use of bad arguments for `@clean` in
langtools tests
+ JDK-8285785: CheckCleanerBound test fails with
PasswordCallback object is not released
+ JDK-8285867: Convert applet manual tests
SelectionVisible.java to Frame and automate
+ JDK-8286846: test/jdk/javax/swing/plaf/aqua/
/CustomComboBoxFocusTest.java fails on mac aarch64
+ JDK-8286969: Add a new test library API to execute kinit in
SecurityTools.java
+ JDK-8287113: JFR: Periodic task thread uses period for method
sampling events
+ JDK-8289511: Improve test coverage for XPath Axes: child
+ JDK-8289764: gc/lock tests failed with 'OutOfMemoryError:
Java heap space: failed reallocation of scalar replaced
objects'
+ JDK-8289948: Improve test coverage for XPath functions: Node
Set Functions
+ JDK-8290399: [macos] Aqua LAF does not fire an action event
if combo box menu is displayed
+ JDK-8290909: MemoryPoolMBean/isUsageThresholdExceeded tests
failed with 'isUsageThresholdExceeded() returned false, and is
still false, while threshold = MMMMMMM and used peak = NNNNNNN'
+ JDK-8292182: [TESTLIB] Enhance JAXPPolicyManager to setup
required permissions for jtreg version 7 jar
+ JDK-8292946: GC lock/jni/jnilock001 test failed
'assert(gch->gc_cause() == GCCause::_scavenge_alot ||
!gch->incremental_collection_failed()) failed: Twice in a row'
+ JDK-8293819: sun/util/logging/PlatformLoggerTest.java failed
with 'RuntimeException: Retrieved backing PlatformLogger level
null is not the expected CONFIG'
+ JDK-8294158: HTML formatting for PassFailJFrame instructions
+ JDK-8294254: [macOS] javax/swing/plaf/aqua/
/CustomComboBoxFocusTest.java failure
+ JDK-8294402: Add diagnostic logging to
VMProps.checkDockerSupport
+ JDK-8294535: Add screen capture functionality to
PassFailJFrame
+ JDK-8296083: javax/swing/JTree/6263446/bug6263446.java fails
intermittently on a VM
+ JDK-8296384: [TESTBUG] sun/security/provider/SecureRandom/
/AbstractDrbg/SpecTest.java intermittently timeout
+ JDK-8299494: Test vmTestbase/nsk/stress/except/except011.java
failed: ExceptionInInitializerError: target class not found
+ JDK-8300269: The selected item in an editable JComboBox with
titled border is not visible in Aqua LAF
+ JDK-8300727: java/awt/List/ListGarbageCollectionTest/
/AwtListGarbageCollectionTest.java failed with 'List wasn't
garbage collected'
+ JDK-8301310: The SendRawSysexMessage test may cause a JVM
crash
+ JDK-8301377: adjust timeout for JLI
GetObjectSizeIntrinsicsTest.java subtest again
+ JDK-8301846: Invalid TargetDataLine after screen lock when
using JFileChooser or COM library
+ JDK-8302017: Allocate BadPaddingException only if it will be
thrown
+ JDK-8302109: Trivial fixes to btree tests
+ JDK-8302149: Speed up
compiler/jsr292/methodHandleExceptions/TestAMEnotNPE.java
+ JDK-8302607: increase timeout for
ContinuousCallSiteTargetChange.java
+ JDK-8304074: [JMX] Add an approximation of total bytes
allocated on the Java heap by the JVM
+ JDK-8304314: StackWalkTest.java fails after CODETOOLS-7903373
+ JDK-8304725: AsyncGetCallTrace can cause SIGBUS on M1
+ JDK-8305502: adjust timeouts in three more M&M tests
+ JDK-8305505: NPE in javazic compiler
+ JDK-8305972: Update XML Security for Java to 3.0.2
+ JDK-8306072: Open source several AWT MouseInfo related tests
+ JDK-8306076: Open source AWT misc tests
+ JDK-8306409: Open source AWT KeyBoardFocusManger,
LightWeightComponent related tests
+ JDK-8306640: Open source several AWT TextArea related tests
+ JDK-8306652: Open source AWT MenuItem related tests
+ JDK-8306681: Open source more AWT DnD related tests
+ JDK-8306683: Open source several clipboard and color AWT tests
+ JDK-8306752: Open source several container and component AWT
tests
+ JDK-8306753: Open source several container AWT tests
+ JDK-8306755: Open source few Swing JComponent and
AbstractButton tests
+ JDK-8306812: Open source several AWT Miscellaneous tests
+ JDK-8306871: Open source more AWT Drag & Drop tests
+ JDK-8306996: Open source Swing MenuItem related tests
+ JDK-8307123: Fix deprecation warnings in DPrinter
+ JDK-8307130: Open source few Swing JMenu tests
+ JDK-8307299: Move more DnD tests to open
+ JDK-8307311: Timeouts on one macOS 12.6.1 host of two Swing
JTableHeader tests
+ JDK-8307381: Open Source JFrame, JIF related Swing Tests
+ JDK-8307683: Loop Predication should not hoist range checks
with trap on success projection by negating their condition
+ JDK-8308043: Deadlock in TestCSLocker.java due to blocking GC
while allocating
+ JDK-8308116: jdk.test.lib.compiler.InMemoryJavaCompiler
.compile does not close files
+ JDK-8308223: failure handler missed jcmd.vm.info command
+ JDK-8308232: nsk/jdb tests don't pass -verbose flag to the
debuggee
+ JDK-8308245: Add -proc:full to describe current default
annotation processing policy
+ JDK-8308336: Test java/net/HttpURLConnection/
/HttpURLConnectionExpectContinueTest.java failed:
java.net.BindException: Address already in use
+ JDK-8309104: [JVMCI] compiler/unsafe/
/UnsafeGetStableArrayElement test asserts wrong values with
Graal
+ JDK-8309119: [17u/11u] Redo JDK-8297951: C2: Create skeleton
predicates for all If nodes in loop predication
+ JDK-8309462: [AIX] vmTestbase/nsk/jvmti/RunAgentThread/
/agentthr001/TestDescription.java crashing due to empty while
loop
+ JDK-8309778: java/nio/file/Files/CopyAndMove.java fails when
using second test directory
+ JDK-8309870: Using -proc:full should be considered requesting
explicit annotation processing
+ JDK-8310106: sun.security.ssl.SSLHandshake
.getHandshakeProducer() incorrectly checks handshakeConsumers
+ JDK-8310238: [test bug] javax/swing/JTableHeader/6889007/
/bug6889007.java fails
+ JDK-8310551: vmTestbase/nsk/jdb/interrupt/interrupt001/
/interrupt001.java timed out due to missing prompt
+ JDK-8310807: java/nio/channels/DatagramChannel/Connect.java
timed out
+ JDK-8311081: KeytoolReaderP12Test.java fail on localized
Windows platform
+ JDK-8311511: Improve description of NativeLibrary JFR event
+ JDK-8311585: Add JRadioButtonMenuItem to bug8031573.java
+ JDK-8313081: MonitoringSupport_lock should be unconditionally
initialized after 8304074
+ JDK-8313082: Enable CreateCoredumpOnCrash for testing in
makefiles
+ JDK-8313164: src/java.desktop/windows/native/libawt/windows/
/awt_Robot.cpp GetRGBPixels adjust releasing of resources
+ JDK-8313252: Java_sun_awt_windows_ThemeReader_paintBackground
release resources in early returns
+ JDK-8313643: Update HarfBuzz to 8.2.2
+ JDK-8313816: Accessing jmethodID might lead to spurious
crashes
+ JDK-8314144: gc/g1/ihop/TestIHOPStatic.java fails due to
extra concurrent mark with -Xcomp
+ JDK-8314164: java/net/HttpURLConnection/
/HttpURLConnectionExpectContinueTest.java fails intermittently
in timeout
+ JDK-8314883:
Java_java_util_prefs_FileSystemPreferences_lockFile0 write
result errno in missing case
+ JDK-8315034: File.mkdirs() occasionally fails to create
folders on Windows shared folder
+ JDK-8315042: NPE in PKCS7.parseOldSignedData
+ JDK-8315415: OutputAnalyzer.shouldMatchByLine() fails in some
cases
+ JDK-8315499: build using devkit on Linux ppc64le RHEL puts
path to devkit into libsplashscreen
+ JDK-8315594: Open source few headless Swing misc tests
+ JDK-8315600: Open source few more headless Swing misc tests
+ JDK-8315602: Open source swing security manager test
+ JDK-8315606: Open source few swing text/html tests
+ JDK-8315611: Open source swing text/html and tree test
+ JDK-8315680: java/lang/ref/ReachabilityFenceTest.java should
run with -Xbatch
+ JDK-8315731: Open source several Swing Text related tests
+ JDK-8315761: Open source few swing JList and JMenuBar tests
+ JDK-8315986: [macos14] javax/swing/JMenuItem/4654927/
/bug4654927.java: component must be showing on the screen to
determine its location
+ JDK-8316001: GC: Make TestArrayAllocatorMallocLimit use
createTestJvm
+ JDK-8316028: Update FreeType to 2.13.2
+ JDK-8316030: Update Libpng to 1.6.40
+ JDK-8316106: Open source few swing JInternalFrame and
JMenuBar tests
+ JDK-8316461: Fix: make test outputs TEST SUCCESS after
unsuccessful exit
+ JDK-8316947: Write a test to check textArea triggers
MouseEntered/MouseExited events properly
+ JDK-8317307: test/jdk/com/sun/jndi/ldap/
/LdapPoolTimeoutTest.java fails with ConnectException:
Connection timed out: no further information
+ JDK-8317327: Remove JT_JAVA dead code in jib-profiles.js
+ JDK-8318154: Improve stability of WheelModifier.java test
+ JDK-8318410: jdk/java/lang/instrument/BootClassPath/
/BootClassPathTest.sh fails on Japanese Windows
+ JDK-8318468: compiler/tiered/LevelTransitionTest.java fails
with -XX:CompileThreshold=100 -XX:TieredStopAtLevel=1
+ JDK-8318603: Parallelize sun/java2d/marlin/ClipShapeTest.java
+ JDK-8318607: Enable parallelism in vmTestbase/nsk/stress/jni
tests
+ JDK-8318608: Enable parallelism in
vmTestbase/nsk/stress/threads tests
+ JDK-8318736: com/sun/jdi/JdwpOnThrowTest.java failed with
'transport error 202: bind failed: Address already in use'
+ JDK-8318889: C2: add bailout after assert Bad graph detected
in build_loop_late
+ JDK-8318951: Additional negative value check in JPEG decoding
+ JDK-8318955: Add ReleaseIntArrayElements in
Java_sun_awt_X11_XlibWrapper_SetBitmapShape XlbWrapper.c to
early return
+ JDK-8318971: Better Error Handling for Jar Tool When
Processing Non-existent Files
+ JDK-8318983: Fix comment typo in PKCS12Passwd.java
+ JDK-8319124: Update XML Security for Java to 3.0.3
+ JDK-8319456: jdk/jfr/event/gc/collection/
/TestGCCauseWith[Serial|Parallel].java : GC cause 'GCLocker
Initiated GC' not in the valid causes
+ JDK-8319668: Fixup of jar filename typo in BadFactoryTest.sh
+ JDK-8320001: javac crashes while adding type annotations to
the return type of a constructor
+ JDK-8320208: Update Public Suffix List to b5bf572
+ JDK-8320363: ppc64 TypeEntries::type_unknown logic looks
wrong, missed optimization opportunity
+ JDK-8320597: RSA signature verification fails on signed data
that does not encode params correctly
+ JDK-8320798: Console read line with zero out should zero out
underlying buffer
+ JDK-8320884: Bump update version for OpenJDK: jdk-11.0.23
+ JDK-8320937: support latest VS2022 MSC_VER in
abstract_vm_version.cpp
+ JDK-8321151: JDK-8294427 breaks Windows L&F on all older
Windows versions
+ JDK-8321215: Incorrect x86 instruction encoding for VSIB
addressing mode
+ JDK-8321408: Add Certainly roots R1 and E1
+ JDK-8321480: ISO 4217 Amendment 176 Update
+ JDK-8322178: Error. can't find jdk.testlibrary
.SimpleSSLContext in test directory or libraries
+ JDK-8322417: Console read line with zero out should zero out
when throwing exception
+ JDK-8322725: (tz) Update Timezone Data to 2023d
+ JDK-8322750: Test 'api/java_awt/interactive/
/SystemTrayTests.html' failed because A blue ball icon is
added outside of the system tray
+ JDK-8322752: [11u] GetStackTraceAndRetransformTest.java is
failing assert
+ JDK-8322772: Clean up code after JDK-8322417
+ JDK-8323008: filter out harmful -std* flags added by autoconf
from CXX
+ JDK-8323243: JNI invocation of an abstract instance method
corrupts the stack
+ JDK-8323515: Create test alias 'all' for all test roots
+ JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/
/platform/docker/TestDockerMemoryMetrics.java always fail
because OOM killed
+ JDK-8324184: Windows VS2010 build failed with 'error C2275:
'int64_t''
+ JDK-8324307: [11u] hotspot fails to build with GCC 12 and
newer (non-static data member initializers)
+ JDK-8324347: Enable 'maybe-uninitialized' warning for
FreeType 2.13.1
+ JDK-8324659: GHA: Generic jtreg errors are not reported
+ JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
/AKISerialNumber.java is failing
+ JDK-8325150: (tz) Update Timezone Data to 2024a
+ JDK-8326109: GCC 13 reports maybe-uninitialized warnings for
jni.cpp with dtrace enabled
+ JDK-8326503: [11u] java/net/HttpURLConnection/
/HttpURLConnectionExpectContinueTest.java fail because of
package org.junit.jupiter.api does not exist
+ JDK-8327391: Add SipHash attribution file
+ JDK-8329837: [11u] Remove designator
DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.23
Removed the possibility to use the system timezone-java (bsc#1213470)
SUSE-CU-2024:1868-1
Container Advisory ID
SUSE-CU-2024:1868-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-16.10
Container Release
16.10
The following patches have been included in this update:
SUSE-CU-2024:1816-1
Container Advisory ID
SUSE-CU-2024:1816-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-16.7
Container Release
16.7
The following patches have been included in this update:
SUSE-CU-2024:1778-1
Container Advisory ID
SUSE-CU-2024:1778-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-16.6
Container Release
16.6
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:1429-1
Released
Wed Apr 24 15:13:10 2024
Summary
Recommended update for ca-certificates
Type
recommended
Severity
moderate
References
1188500,1221184
Description:
This update for ca-certificates fixes the following issue:
Update version (bsc#1221184)
* Use flock to serialize calls (bsc#1188500)
* Make certbundle.run container friendly
* Create /var/lib/ca-certificates if needed
SUSE-CU-2024:1656-1
Container Advisory ID
SUSE-CU-2024:1656-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-16.4
Container Release
16.4
The following patches have been included in this update:
Remove crypt and crypt_r interceptors. The crypt API change in SLE15 SP3
breaks them. [bsc#1219520]
Add support for -fmin-function-alignment. [bsc#1214934]
Use %{_target_cpu} to determine host and build.
Fix for building TVM. [bsc#1218492]
Add cross-X-newlib-devel requires to newlib cross compilers.
[bsc#1219031]
Package m2rte.so plugin in the gcc13-m2 sub-package rather than in gcc13-devel. [bsc#1210959]
Require libstdc++6-devel-gcc13 from gcc13-m2 as m2 programs are linked against libstdc++6.
Fixed building mariadb on i686. [bsc#1217667]
Avoid update-alternatives dependency for accelerator crosses.
Package tool links to llvm in cross-amdgcn-gcc13 rather than in
cross-amdgcn-newlib13-devel since that also has the dependence.
Depend on llvmVER instead of llvm with VER equal to
%product_libs_llvm_ver where available and adjust tool discovery
accordingly. This should also properly trigger re-builds when
the patchlevel version of llvmVER changes, possibly changing
the binary names we link to. [bsc#1217450]
SUSE-CU-2024:1412-1
Container Advisory ID
SUSE-CU-2024:1412-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.44
Container Release
15.44
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:1231-1
Released
Thu Apr 11 15:20:40 2024
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1220441
Description:
This update for glibc fixes the following issues:
duplocale: protect use of global locale (bsc#1220441, BZ #23970)
SUSE-CU-2024:1365-1
Container Advisory ID
SUSE-CU-2024:1365-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.40
Container Release
15.40
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:1129-1
Released
Mon Apr 8 09:12:08 2024
Summary
Security update for expat
Type
security
Severity
important
References
1219559,1221289,CVE-2023-52425,CVE-2024-28757
Description:
This update for expat fixes the following issues:
CVE-2023-52425: Fixed a DoS caused by processing large tokens. (bsc#1219559)
CVE-2024-28757: Fixed an XML Entity Expansion. (bsc#1221289)
Advisory ID
SUSE-SU-2024:1133-1
Released
Mon Apr 8 11:29:02 2024
Summary
Security update for ncurses
Type
security
Severity
moderate
References
1220061,CVE-2023-45918
Description:
This update for ncurses fixes the following issues:
CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color file (bsc#1220061).
Advisory ID
SUSE-SU-2024:1172-1
Released
Tue Apr 9 09:52:32 2024
Summary
Security update for util-linux
Type
security
Severity
important
References
1207987,1221831,CVE-2024-28085
Description:
This update for util-linux fixes the following issues:
CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
SUSE-CU-2024:1251-1
Container Advisory ID
SUSE-CU-2024:1251-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.35
Container Release
15.35
The following patches have been included in this update:
SUSE-CU-2024:1217-1
Container Advisory ID
SUSE-CU-2024:1217-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.34
Container Release
15.34
The following patches have been included in this update:
SUSE-CU-2024:1131-1
Container Advisory ID
SUSE-CU-2024:1131-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.32
Container Release
15.32
The following patches have been included in this update:
SUSE-CU-2024:1054-1
Container Advisory ID
SUSE-CU-2024:1054-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.31
Container Release
15.31
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:929-1
Released
Tue Mar 19 06:36:24 2024
Summary
Recommended update for coreutils
Type
recommended
Severity
moderate
References
1219321
Description:
This update for coreutils fixes the following issues:
tail: fix tailing sysfs files where PAGE_SIZE > BUFSIZ (bsc#1219321)
SUSE-CU-2024:994-1
Container Advisory ID
SUSE-CU-2024:994-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.29
Container Release
15.29
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:870-1
Released
Wed Mar 13 13:05:14 2024
Summary
Security update for glibc
Type
security
Severity
moderate
References
1217445,1217589,1218866
Description:
This update for glibc fixes the following issues:
Security issues fixed:
qsort: harden handling of degenerated / non transient compare function (bsc#1218866)
Other issues fixed:
getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163)
aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113)
SUSE-CU-2024:898-1
Container Advisory ID
SUSE-CU-2024:898-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-15.25
Container Release
15.25
The following patches have been included in this update:
This update for java-11-openjdk fixes the following issues:
Updated to version 11.0.22 (January 2024 CPU):
- CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM
due to a missing bounds check (bsc#1218907).
- CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class
file verifier (bsc#1218903).
- CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM
that could lead to corruption of JVM memory (bsc#1218905).
- CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906).
- CVE-2024-20945: Fixed a potential private key leak through debug
logs (bsc#1218909).
- CVE-2024-20952: Fixed an RSA padding issue and timing side-channel
attack against TLS (bsc#1218911).
Find the full release notes at:
https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029215.html
Advisory ID
SUSE-RU-2024:322-1
Released
Fri Feb 2 15:13:26 2024
Summary
Recommended update for aaa_base
Type
recommended
Severity
moderate
References
1107342,1215434
Description:
This update for aaa_base fixes the following issues:
Set JAVA_HOME correctly (bsc#1107342, bsc#1215434)
Advisory ID
SUSE-SU-2024:305-1
Released
Mon Mar 11 14:15:37 2024
Summary
Security update for cpio
Type
security
Severity
moderate
References
1218571,1219238,CVE-2023-7207
Description:
This update for cpio fixes the following issues:
Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238)
SUSE-CU-2024:388-1
Container Advisory ID
SUSE-CU-2024:388-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-14.7
Container Release
14.7
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:238-1
Released
Fri Jan 26 10:56:41 2024
Summary
Security update for cpio
Type
security
Severity
moderate
References
1218571,CVE-2023-7207
Description:
This update for cpio fixes the following issues:
CVE-2023-7207: Fixed a path traversal issue that could lead to an
arbitrary file write during archive extraction (bsc#1218571).
Advisory ID
SUSE-RU-2024:244-1
Released
Fri Jan 26 13:01:27 2024
Summary
Recommended update for util-linux
Type
recommended
Severity
moderate
References
1207987
Description:
This update for util-linux fixes the following issues:
Fix performance degradation (bsc#1207987)
SUSE-CU-2024:353-1
Container Advisory ID
SUSE-CU-2024:353-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-14.4
Container Release
14.4
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:214-1
Released
Wed Jan 24 16:01:31 2024
Summary
Recommended update for systemd
Type
recommended
Severity
moderate
References
1214668,1215241,1217460
Description:
This update for systemd fixes the following issues:
resolved: actually check authenticated flag of SOA transaction
core/mount: Make device deps from /proc/self/mountinfo and .mount unit file exclusive
core: Add trace logging to mount_add_device_dependencies()
core/mount: Remove default deps from /proc/self/mountinfo when it is updated (bsc#1217460)
core/mount: Set Mount.from_proc_self_mountinfo flag before adding default dependencies
core: wrap some long comment
utmp-wtmp: Handle EINTR gracefully when waiting to write to tty
utmp-wtmp: Fix error in case isatty() fails
homed: Handle EINTR gracefully when waiting for device node
resolved: Handle EINTR returned from fd_wait_for_event() better
sd-netlink: Handle EINTR from poll() gracefully, as success
varlink: Handle EINTR gracefully when waiting for EIO via ppoll()
stdio-bridge: Don't be bothered with EINTR
sd-bus: Handle EINTR return from bus_poll() (bsc#1215241)
core: Replace slice dependencies as they get added (bsc#1214668)
SUSE-CU-2024:300-1
Container Advisory ID
SUSE-CU-2024:300-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-14.1
Container Release
14.1
The following patches have been included in this update:
SUSE-CU-2024:263-1
Container Advisory ID
SUSE-CU-2024:263-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-13.7
Container Release
13.7
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:136-1
Released
Thu Jan 18 09:53:47 2024
Summary
Security update for pam
Type
security
Severity
moderate
References
1217000,1218475,CVE-2024-22365
Description:
This update for pam fixes the following issues:
CVE-2024-22365: Fixed a local denial of service during PAM login
due to a missing check during path manipulation (bsc#1218475).
Check localtime_r() return value to fix crashing (bsc#1217000)
This update for libssh fixes the following issues:
Security fixes:
- CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)
- CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)
- CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)
- CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm guessing (bsc#1211188)
- CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)
Other fixes:
Update to version 0.9.8
- Allow @ in usernames when parsing from URI composes
Update to version 0.9.7
- Fix several memory leaks in GSSAPI handling code
SUSE-CU-2024:203-1
Container Advisory ID
SUSE-CU-2024:203-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-13.1
Container Release
13.1
The following patches have been included in this update:
SUSE-CU-2024:179-1
Container Advisory ID
SUSE-CU-2024:179-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-12.8
Container Release
12.8
The following patches have been included in this update:
SUSE-CU-2024:117-1
Container Advisory ID
SUSE-CU-2024:117-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-12.7
Container Release
12.7
The following patches have been included in this update:
Advisory ID
SUSE-SU-2024:70-1
Released
Tue Jan 9 18:29:39 2024
Summary
Security update for tar
Type
security
Severity
low
References
1217969,CVE-2023-39804
Description:
This update for tar fixes the following issues:
CVE-2023-39804: Fixed extension attributes in PAX archives incorrect hanling (bsc#1217969).
SUSE-CU-2024:116-1
Container Advisory ID
SUSE-CU-2024:116-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-12.5
Container Release
12.5
The following patches have been included in this update:
Advisory ID
SUSE-RU-2024:62-1
Released
Mon Jan 8 11:44:47 2024
Summary
Recommended update for libxcrypt
Type
recommended
Severity
moderate
References
1215496
Description:
This update for libxcrypt fixes the following issues:
The following patches have been included in this update:
SUSE-CU-2023:3820-1
Container Advisory ID
SUSE-CU-2023:3820-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.41
Container Release
11.41
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:4504-1
Released
Tue Nov 21 13:27:50 2023
Summary
Security update for libxml2
Type
security
Severity
moderate
References
1216129,CVE-2023-45322
Description:
This update for libxml2 fixes the following issues:
CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).
Advisory ID
SUSE-SU-2023:4518-1
Released
Tue Nov 21 17:35:30 2023
Summary
Security update for openssl-1_1
Type
security
Severity
important
References
1216922,CVE-2023-5678
Description:
This update for openssl-1_1 fixes the following issues:
CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
SUSE-CU-2023:3747-1
Container Advisory ID
SUSE-CU-2023:3747-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.36
Container Release
11.36
The following patches have been included in this update:
Advisory ID
SUSE-RU-2023:4450-1
Released
Wed Nov 15 10:55:20 2023
Summary
Recommended update for crypto-policies
Type
recommended
Severity
moderate
References
1209998
Description:
This update for crypto-policies fixes the following issues:
- Enable setting the kernel FIPS mode with the fips-mode-setup and fips-finish-install commands
(jsc#PED-5041)
- Adapt fips-mode-setup to use the pbl command from the perl-Bootloader package instead of grubby
and add a note for transactional systems
- Ship the man pages for fips-mode-setup and fips-finish-install
- Make the supported versions change in the update-crypto-policies(8) man page persistent
(bsc#1209998)
This update for gcc13 fixes the following issues:
This update ship the GCC 13.2 compiler suite and its base libraries.
The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.
To use gcc13 compilers use:
install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.
For a full changelog with all new GCC13 features, check out
https://gcc.gnu.org/gcc-13/changes.html
Detailed changes:
CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
length stack allocations. (bsc#1214052)
Work around third party app crash during C++ standard library initialization. [bsc#1216664]
Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
Bump included newlib to version 4.3.0.
Update to GCC trunk head (r13-5254-g05b9868b182bb9)
Redo floatn fixinclude pick-up to simply keep what is there.
Turn cross compiler to s390x to a glibc cross. [bsc#1214460]
Also handle -static-pie in the default-PIE specs
Fixed missed optimization in Skia resulting in Firefox crashes when
building with LTO. [bsc#1212101]
Make libstdc++6-devel packages own their directories since they
can be installed standalone. [bsc#1211427]
Add new x86-related intrinsics (amxcomplexintrin.h).
RISC-V: Add support for inlining subword atomic operations
Use --enable-link-serialization rather that --enable-link-mutex,
the benefit of the former one is that the linker jobs are not
holding tokens of the make's jobserver.
Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd
for the general state of BPF with GCC.
Add bootstrap conditional to allow --without=bootstrap to be
specified to speed up local builds for testing.
Bump included newlib to version 4.3.0.
Also package libhwasan_preinit.o on aarch64.
Configure external timezone database provided by the timezone
package. Make libstdc++6 recommend timezone to get a fully
working std::chrono. Install timezone when running the testsuite.
Package libhwasan_preinit.o on x86_64.
Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]
Enable PRU flavour for gcc13
update floatn fixinclude pickup to check each header separately (bsc#1206480)
Redo floatn fixinclude pick-up to simply keep what is there.
Bump libgo SONAME to libgo22.
Do not package libhwasan for biarch (32-bit architecture)
as the extension depends on 64-bit pointers.
Adjust floatn fixincludes guard to work with SLE12 and earlier
SLE15.
Depend on at least LLVM 13 for GCN cross compiler.
Update embedded newlib to version 4.2.0
Allow cross-pru-gcc12-bootstrap for armv7l architecture.
PRU architecture is used for real-time MCUs embedded into TI
armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
armv7l in order to build both host applications and PRU firmware
during the same build.
SUSE-CU-2023:3653-1
Container Advisory ID
SUSE-CU-2023:3653-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.31
Container Release
11.31
The following patches have been included in this update:
Advisory ID
SUSE-RU-2023:4310-1
Released
Tue Oct 31 14:10:47 2023
Summary
Recommended update for libtirpc
Type
recommended
Severity
moderate
References
1196647
Description:
This Update for libtirpc to 1.3.4, fixing the following issues:
Update to 1.3.4 (bsc#1199467)
* binddynport.c honor ip_local_reserved_ports
- replaces: binddynport-honor-ip_local_reserved_ports.patch
* gss-api: expose gss major/minor error in authgss_refresh()
* rpcb_clnt.c: Eliminate double frees in delete_cache()
* rpcb_clnt.c: memory leak in destroy_addr
* portmapper: allow TCP-only portmapper
* getnetconfigent: avoid potential DoS issue by removing unnecessary sleep
* clnt_raw.c: fix a possible null pointer dereference
* bindresvport.c: fix a potential resource leakage
Update to 1.3.3:
Fix DoS vulnerability in libtirpc
- replaces: 0001-Fix-DoS-vulnerability-in-libtirpc.patch
_rpc_dtablesize: use portable system call
libtirpc: Fix use-after-free accessing the error number
Fix potential memory leak of parms.r_addr
- replaces 0001-fix-parms.r_addr-memory-leak.patch
rpcb_clnt.c add mechanism to try v2 protocol first
- preplaces: 0001-rpcb_clnt.c-config-to-try-protocolversion-2-first.patch
Eliminate deadlocks in connects with an MT environment
clnt_dg_freeres() uncleared set active state may deadlock
thread safe clnt destruction
SUNRPC: mutexed access blacklist_read state variable
SUNRPC: MT-safe overhaul of address cache management in rpcb_clnt.c
Update to 1.3.2:
Replace the final SunRPC licenses with BSD licenses
blacklist: Add a few more well known ports
libtirpc: disallow calling auth_refresh from clnt_call with RPCSEC_GSS
Update to 1.3.1:
Remove AUTH_DES interfaces from auth_des.h
The unsupported AUTH_DES authentication has be
compiled out since commit d918e41d889 (Wed Oct 9 2019)
replaced by API routines that return errors.
svc_dg: Free xp_netid during destroy
Fix memory management issues of fd locks
libtirpc: replace array with list for per-fd locks
__svc_vc_dodestroy: fix double free of xp_ltaddr.buf
__rpc_dtbsize: rlim_cur instead of rlim_max
pkg-config: use the correct replacements for libdir/includedir
SUSE-CU-2023:3602-1
Container Advisory ID
SUSE-CU-2023:3602-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.27
Container Release
11.27
The following patches have been included in this update:
SUSE-CU-2023:3569-1
Container Advisory ID
SUSE-CU-2023:3569-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.26
Container Release
11.26
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:4198-1
Released
Wed Oct 25 11:58:43 2023
Summary
Security update for java-11-openjdk
Type
security
Severity
important
References
1214790,1216374,CVE-2023-22081
Description:
This update for java-11-openjdk fixes the following issues:
Upgraded to JDK 11.0.21+9 (October 2023 CPU):
- CVE-2023-22081: Fixed a partial denial of service issue that
could be triggered via HTTPS (bsc#1216374).
Please visit the Oracle Release Notes page for the full changelog:
https://www.oracle.com/java/technologies/javase/11all-relnotes.html
Advisory ID
SUSE-SU-2023:4200-1
Released
Wed Oct 25 12:04:29 2023
Summary
Security update for nghttp2
Type
security
Severity
important
References
1216123,1216174,CVE-2023-44487
Description:
This update for nghttp2 fixes the following issues:
This update for gcc13 fixes the following issues:
This update ship the GCC 13.2 compiler suite and its base libraries.
The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.
The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.
To use gcc13 compilers use:
install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.
For a full changelog with all new GCC13 features, check out
https://gcc.gnu.org/gcc-13/changes.html
Detailed changes:
CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
length stack allocations. (bsc#1214052)
Turn cross compiler to s390x to a glibc cross. [bsc#1214460]
Also handle -static-pie in the default-PIE specs
Fixed missed optimization in Skia resulting in Firefox crashes when
building with LTO. [bsc#1212101]
Make libstdc++6-devel packages own their directories since they
can be installed standalone. [bsc#1211427]
Add new x86-related intrinsics (amxcomplexintrin.h).
RISC-V: Add support for inlining subword atomic operations
Use --enable-link-serialization rather that --enable-link-mutex,
the benefit of the former one is that the linker jobs are not
holding tokens of the make's jobserver.
Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd
for the general state of BPF with GCC.
Add bootstrap conditional to allow --without=bootstrap to be
specified to speed up local builds for testing.
Bump included newlib to version 4.3.0.
Also package libhwasan_preinit.o on aarch64.
Configure external timezone database provided by the timezone
package. Make libstdc++6 recommend timezone to get a fully
working std::chrono. Install timezone when running the testsuite.
Package libhwasan_preinit.o on x86_64.
Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]
Enable PRU flavour for gcc13
update floatn fixinclude pickup to check each header separately (bsc#1206480)
Redo floatn fixinclude pick-up to simply keep what is there.
Bump libgo SONAME to libgo22.
Do not package libhwasan for biarch (32-bit architecture)
as the extension depends on 64-bit pointers.
Adjust floatn fixincludes guard to work with SLE12 and earlier
SLE15.
Depend on at least LLVM 13 for GCN cross compiler.
Update embedded newlib to version 4.2.0
Allow cross-pru-gcc12-bootstrap for armv7l architecture.
PRU architecture is used for real-time MCUs embedded into TI
armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
armv7l in order to build both host applications and PRU firmware
during the same build.
SUSE-CU-2023:3515-1
Container Advisory ID
SUSE-CU-2023:3515-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.21
Container Release
11.21
The following patches have been included in this update:
Advisory ID
SUSE-RU-2023:4073-1
Released
Fri Oct 13 11:40:26 2023
Summary
Recommended update for rpm
Type
recommended
Severity
low
References
Description:
This update for rpm fixes the following issue:
Enables build for all python modules (jsc#PED-68, jsc#PED-1988)
Advisory ID
SUSE-RU-2023:4105-1
Released
Wed Oct 18 08:15:40 2023
Summary
Recommended update for openssl-1_1
Type
recommended
Severity
moderate
References
1215215
Description:
This update for openssl-1_1 fixes the following issues:
Displays 'fips' in the version string (bsc#1215215)
Advisory ID
SUSE-SU-2023:4110-1
Released
Wed Oct 18 12:35:26 2023
Summary
Security update for glibc
Type
security
Severity
important
References
1215286,1215891,CVE-2023-4813
Description:
This update for glibc fixes the following issues:
Security issue fixed:
CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)
Also a regression from a previous update was fixed:
elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)
This update provides rebuilds of various packages against the newer icu73 to support GB18030-2023.
This set contains libreoffice, various libraries used by libreoffice and GNOME, and brltty.
Advisory ID
SUSE-RU-2023:4153-1
Released
Fri Oct 20 19:27:58 2023
Summary
Recommended update for systemd
Type
recommended
Severity
moderate
References
1215313
Description:
This update for systemd fixes the following issues:
Fix mismatch of nss-resolve version in Package Hub (no source code changes)
Advisory ID
SUSE-RU-2023:4154-1
Released
Fri Oct 20 19:33:25 2023
Summary
Recommended update for aaa_base
Type
recommended
Severity
moderate
References
1107342,1215434
Description:
This update for aaa_base fixes the following issues:
Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342)
SUSE-CU-2023:3383-1
Container Advisory ID
SUSE-CU-2023:3383-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-11.10
Container Release
11.10
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:4024-1
Released
Tue Oct 10 13:24:40 2023
Summary
Security update for shadow
Type
security
Severity
low
References
1214806,CVE-2023-4641
Description:
This update for shadow fixes the following issues:
This update for java-11-openjdk fixes the following issues:
Updated to jdk-11.0.20+8 (July 2023 CPU):
- CVE-2023-22006: Fixed vulnerability in the network component (bsc#1213473).
- CVE-2023-22036: Fixed vulnerability in the utility component (bsc#1213474).
- CVE-2023-22041: Fixed vulnerability in the hotspot component (bsc#1213475).
- CVE-2023-22044: Fixed vulnerability in the hotspot component (bsc#1213479).
- CVE-2023-22045: Fixed vulnerability in the hotspot component (bsc#1213481).
- CVE-2023-22049: Fixed vulnerability in the libraries component (bsc#1213482).
- CVE-2023-25193: Fixed vulnerability in the embedded harfbuzz module (bsc#1207922).
- JDK-8298676: Enhanced Look and Feel
- JDK-8300285: Enhance TLS data handling
- JDK-8300596: Enhance Jar Signature validation
- JDK-8301998, JDK-8302084: Update HarfBuzz to 7.0.1
- JDK-8302475: Enhance HTTP client file downloading
- JDK-8302483: Enhance ZIP performance
- JDK-8303376: Better launching of JDI
- JDK-8304468: Better array usages
- JDK-8305312: Enhanced path handling
- JDK-8308682: Enhance AES performance
Bugfixes:
- JDK-8171426: java/lang/ProcessBuilder/Basic.java failed with
Stream closed
- JDK-8178806: Better exception logging in crypto code
- JDK-8187522: test/sun/net/ftp/FtpURLConnectionLeak.java timed
out
- JDK-8209167: Use CLDR's time zone mappings for Windows
- JDK-8209546: Make sun/security/tools/keytool/autotest.sh to
support macosx
- JDK-8209880: tzdb.dat is not reproducibly built
- JDK-8213531: Test javax/swing/border/TestTitledBorderLeak.java
fails
- JDK-8214459: NSS source should be removed
- JDK-8214807: Improve handling of very old class files
- JDK-8215015: [TESTBUG] remove unneeded -Xfuture option from
tests
- JDK-8215575: C2 crash: assert(get_instanceKlass()->is_loaded())
failed: must be at least loaded
- JDK-8220093: Change to GCC 8.2 for building on Linux at Oracle
- JDK-8227257: javax/swing/JFileChooser/4847375/bug4847375.java
fails with AssertionError
- JDK-8232853: AuthenticationFilter.Cache::remove may throw
ConcurrentModificationException
- JDK-8243936: NonWriteable system properties are actually
writeable
- JDK-8246383: NullPointerException in
JceSecurity.getVerificationResult when using Entrust provider
- JDK-8248701: On Windows generated modules-deps.gmk can
contain backslash-r (CR) characters
- JDK-8257856: Make ClassFileVersionsTest.java robust to JDK
version updates
- JDK-8259530: Generated docs contain MIT/GPL-licenced works
without reproducing the licence
- JDK-8263420: Incorrect function name in
NSAccessibilityStaticText native peer implementation
- JDK-8264290: Create implementation for
NSAccessibilityComponentGroup protocol peer
- JDK-8264304: Create implementation for NSAccessibilityToolbar
protocol peer
- JDK-8265486: ProblemList javax/sound/midi/Sequencer/
/Recording.java on macosx-aarch64
- JDK-8268558: [TESTBUG] Case 2 in
TestP11KeyFactoryGetRSAKeySpec is skipped
- JDK-8269746: C2: assert(!in->is_CFG()) failed: CFG Node with
no controlling input?
- JDK-8274864: Remove Amman/Cairo hacks in ZoneInfoFile
- JDK-8275233: Incorrect line number reported in exception
stack trace thrown from a lambda expression
- JDK-8275721: Name of UTC timezone in a locale changes
depending on previous code
- JDK-8275735: [linux] Remove deprecated Metrics api (kernel
memory limit)
- JDK-8276880: Remove java/lang/RuntimeTests/exec/ExecWithDir
as unnecessary
- JDK-8277775: Fixup bugids in RemoveDropTargetCrashTest.java -
add 4357905
- JDK-8278434: timeouts in test java/time/test/java/time/format/
/TestZoneTextPrinterParser.java
- JDK-8280703: CipherCore.doFinal(...) causes potentially
massive byte[] allocations during decryption
- JDK-8282077: PKCS11 provider C_sign() impl should handle
CKR_BUFFER_TOO_SMALL error
- JDK-8282201: Consider removal of expiry check in
VerifyCACerts.java test
- JDK-8282467: add extra diagnostics for JDK-8268184
- JDK-8282600: SSLSocketImpl should not use user_canceled
workaround when not necessary
- JDK-8283059: Uninitialized warning in check_code.c with GCC
11.2
- JDK-8285497: Add system property for Java SE specification
maintenance version
- JDK-8286398: Address possibly lossy conversions in
jdk.internal.le
- JDK-8287007: [cgroups] Consistently use stringStream
throughout parsing code
- JDK-8287246: DSAKeyValue should check for missing params
instead of relying on KeyFactory provider
- JDK-8287876: The recently de-problemlisted
TestTitledBorderLeak test is unstable
- JDK-8287897: Augment src/jdk.internal.le/share/legal/jline.md
with information on 4th party dependencies
- JDK-8289301: P11Cipher should not throw out of bounds
exception during padding
- JDK-8289735: UTIL_LOOKUP_PROGS fails on pathes with space
- JDK-8291226: Create Test Cases to cover scenarios for
JDK-8278067
- JDK-8291637: HttpClient default keep alive timeout not
followed if server sends invalid value
- JDK-8291638: Keep-Alive timeout of 0 should close connection
immediately
- JDK-8292206: TestCgroupMetrics.java fails as getMemoryUsage()
is lower than expected
- JDK-8293232: Fix race condition in pkcs11 SessionManager
- JDK-8293815: P11PSSSignature.engineUpdate should not print
debug messages during normal operation
- JDK-8294548: Problem list SA core file tests on macosx-x64
due to JDK-8294316
- JDK-8294906: Memory leak in PKCS11 NSS TLS server
- JDK-8295974: jni_FatalError and Xcheck:jni warnings should
print the native stack when there are no Java frames
- JDK-8296934: Write a test to verify whether Undecorated Frame
can be iconified or not
- JDK-8297000: [jib] Add more friendly warning for proxy issues
- JDK-8297450: ScaledTextFieldBorderTest.java fails when run
with -show parameter
- JDK-8298887: On the latest macOS+XCode the Robot API may
report wrong colors
- JDK-8299259: C2: Div/Mod nodes without zero check could be
split through iv phi of loop resulting in SIGFPE
- JDK-8300079: SIGSEGV in LibraryCallKit::inline_string_copy
due to constant NULL src argument
- JDK-8300205: Swing test bug8078268 make latch timeout
configurable
- JDK-8300490: Spaces in name of MacOS Code Signing Identity
are not correctly handled after JDK-8293550
- JDK-8301119: Support for GB18030-2022
- JDK-8301170: perfMemory_windows.cpp add free_security_attr to
early returns
- JDK-8301401: Allow additional characters for GB18030-2022
support
- JDK-8302151: BMPImageReader throws an exception reading BMP
images
- JDK-8302791: Add specific ClassLoader object to Proxy
IllegalArgumentException message
- JDK-8303102: jcmd: ManagementAgent.status truncates the text
longer than O_BUFLEN
- JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m
needs CFRelease call in early potential CHECK_NULL return
- JDK-8303432: Bump update version for OpenJDK: jdk-11.0.20
- JDK-8303440: The 'ZonedDateTime.parse' may not accept the
'UTC+XX' zone id
- JDK-8303465: KeyStore of type KeychainStore, provider Apple
does not show all trusted certificates
- JDK-8303476: Add the runtime version in the release file of a
JDK image
- JDK-8303482: Update LCMS to 2.15
- JDK-8303564: C2: 'Bad graph detected in build_loop_late'
after a CMove is wrongly split thru phi
- JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs
CFRelease call in early potential CHECK_NULL return
- JDK-8303822: gtestMain should give more helpful output
- JDK-8303861: Error handling step timeouts should never be
blocked by OnError and others
- JDK-8303937: Corrupted heap dumps due to missing retries for
os::write()
- JDK-8304134: jib bootstrapper fails to quote filename when
checking download filetype
- JDK-8304291: [AIX] Broken build after JDK-8301998
- JDK-8304295: harfbuzz build fails with GCC 7 after JDK-8301998
- JDK-8304350: Font.getStringBounds calculates wrong width for
TextAttribute.TRACKING other than 0.0
- JDK-8304760: Add 2 Microsoft TLS roots
- JDK-8305113: (tz) Update Timezone Data to 2023c
- JDK-8305400: ISO 4217 Amendment 175 Update
- JDK-8305528: [11u] Backport of JDK-8259530 breaks build with
JDK10 bootstrap VM
- JDK-8305682: Update the javadoc in the Character class to
state support for GB 18030-2022 Implementation Level 2
- JDK-8305711: Arm: C2 always enters slowpath for monitorexit
- JDK-8305721: add `make compile-commands` artifacts to
.gitignore
- JDK-8305975: Add TWCA Global Root CA
- JDK-8306543: GHA: MSVC installation is failing
- JDK-8306658: GHA: MSVC installation could be optional since
it might already be pre-installed
- JDK-8306664: GHA: Update MSVC version to latest stepping
- JDK-8306768: CodeCache Analytics reports wrong threshold
- JDK-8306976: UTIL_REQUIRE_SPECIAL warning on grep
- JDK-8307134: Add GTS root CAs
- JDK-8307811: [TEST] compilation of TimeoutInErrorHandlingTest
fails after backport of JDK-8303861
- JDK-8308006: Missing NMT memory tagging in CMS
- JDK-8308884: [17u/11u] Backout JDK-8297951
- JDK-8309476: [11u] tools/jmod/hashes/HashesOrderTest.java
fails intermittently
- JDK-8311465: [11u] Remove designator
DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.20
SUSE-CU-2023:2607-1
Container Advisory ID
SUSE-CU-2023:2607-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-9.25
Container Release
9.25
The following patches have been included in this update:
SUSE-CU-2023:2558-1
Container Advisory ID
SUSE-CU-2023:2558-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-9.24
Container Release
9.24
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:3242-1
Released
Tue Aug 8 18:19:40 2023
Summary
Security update for openssl-1_1
Type
security
Severity
moderate
References
1213853,CVE-2023-3817
Description:
This update for openssl-1_1 fixes the following issues:
CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
SUSE-CU-2023:2504-1
Container Advisory ID
SUSE-CU-2023:2504-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-9.21
Container Release
9.21
The following patches have been included in this update:
Advisory ID
SUSE-RU-2023:3102-1
Released
Tue Aug 1 14:11:53 2023
Summary
Recommended update for openssl-1_1
Type
recommended
Severity
moderate
References
1213517
Description:
This update for openssl-1_1 fixes the following issues:
Dont pass zero length input to EVP_Cipher (bsc#1213517)
SUSE-CU-2023:2445-1
Container Advisory ID
SUSE-CU-2023:2445-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-9.17
Container Release
9.17
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:2965-1
Released
Tue Jul 25 12:30:22 2023
Summary
Security update for openssl-1_1
Type
security
Severity
moderate
References
1213487,CVE-2023-3446
Description:
This update for openssl-1_1 fixes the following issues:
CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
Advisory ID
SUSE-RU-2023:2966-1
Released
Tue Jul 25 14:26:14 2023
Summary
Recommended update for libxml2
Type
recommended
Severity
moderate
References
Description:
This update for libxml2 fixes the following issues:
Build also for modern python version (jsc#PED-68)
SUSE-CU-2023:2372-1
Container Advisory ID
SUSE-CU-2023:2372-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-9.13
Container Release
9.13
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:2882-1
Released
Wed Jul 19 11:49:39 2023
Summary
Security update for perl
Type
security
Severity
important
References
1210999,CVE-2023-31484
Description:
This update for perl fixes the following issues:
- CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999).
Advisory ID
SUSE-RU-2023:2885-1
Released
Wed Jul 19 16:58:43 2023
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1208721,1209229,1211828
Description:
This update for glibc fixes the following issues:
getlogin_r: fix missing fallback if loginuid is unset (bsc#1209229, BZ #30235)
Exclude static archives from preparation for live patching (bsc#1208721)
resolv_conf: release lock on allocation failure (bsc#1211828, BZ #30527)
Need to add policy control to keys lengths for signatures
Fix unreachable code warning in fuzz builds
Fix various compiler warnings in NSS
Enable various compiler warnings for clang builds
set PORT error after sftk_HMACCmp failure
Need to add policy control to keys lengths for signatures
remove data length assertion in sec_PKCS7Decrypt
Make high tag number assertion failure an error
CKM_SHA384_KEY_DERIVATION correction maximum key length from 284 to 384
Tolerate certificate_authorities xtn in ClientHello
Fix build failure on Windows
migrate Win 2012 tasks to Azure
fix title length in doc
Add interop tests for HRR and PSK to GREASE suite
Add presence/absence tests for TLS GREASE
Correct addition of GREASE value to ALPN xtn
CH extension permutation
TLS GREASE (RFC8701)
improve handling of unknown PKCS#12 safe bag types
use a different treeherder symbol for each docker image build task
remove nested table in rst doc
Export NSS_CMSSignerInfo_GetDigestAlgTag
build failure while implicitly casting SECStatus to PRUInt32
update to NSS 3.88.1
improve handling of unknown PKCS#12 safe bag types
update to NSS 3.88
remove nested table in rst doc
Export NSS_CMSSignerInfo_GetDigestAlgTag.
build failure while implicitly casting SECStatus to PRUInt32
Add check for ClientHello SID max length
Added EarlyData ALPN test support to BoGo shim
ECH client - Discard resumption TLS < 1.3 Session(IDs|Tickets) if ECH configs are setup
On HRR skip PSK incompatible with negotiated ciphersuites hash algorithm
ECH client: Send ech_required alert on server negotiating TLS 1.2. Fixed misleading Gtest, enabled corresponding BoGo test
Added Bogo ECH rejection test support
Added ECH 0Rtt support to BoGo shim
RSA OAEP Wycheproof JSON
RSA decrypt Wycheproof JSON
ECDSA Wycheproof JSON
ECDH Wycheproof JSON
PKCS#1v1.5 wycheproof json
Use X25519 wycheproof json
Move scripts to python3
Properly link FuzzingEngine for oss-fuzz.
Extending RSA-PSS bltest test coverage (Adding SHA-256 and SHA-384)
NSS needs to move off of DSA for integrity checks
Add initial testing with ACVP vector sets using acvp-rust
Don't clone libFuzzer, rely on clang instead
update to NSS 3.87
NULL password encoding incorrect
Fix rng stub signature for fuzzing builds
Updating the compiler parsing for build
Modification of supported compilers
tstclnt crashes when accessing gnutls server without a user cert in the database.
Add configuration option to enable source-based coverage sanitizer
Update ECCKiila generated files.
Add support for the LoongArch 64-bit architecture
add checks for zero-length RSA modulus to avoid memory errors and failed assertions later
Additional zero-length RSA modulus checks
update to NSS 3.86
conscious language removal in NSS
Set nssckbi version number to 2.60
Set CKA_NSS_SERVER_DISTRUST_AFTER and CKA_NSS_EMAIL_DISTRUST_AFTER for 3 TrustCor Root Certificates
Remove Staat der Nederlanden EV Root CA from NSS
Remove EC-ACC root cert from NSS
Remove SwissSign Platinum CA - G2 from NSS
Remove Network Solutions Certificate Authority
compress docker image artifact with zstd
Migrate nss from AWS to GCP
Enable static builds in the CI
Removing SAW docker from the NSS build system
Initialising variables in the rsa blinding code
Implementation of the double-signing of the message for ECDSA
Adding exponent blinding for RSA.
update to NSS 3.85
Modification of the primes.c and dhe-params.c in order to have better looking tables
Update zlib in NSS to 1.2.13
Skip building modutil and shlibsign when building in Firefox
Use __STDC_VERSION__ rather than __STDC__ as a guard
Remove redundant variable definitions in lowhashtest
Add note about python executable to build instructions.
update to NSS 3.84
Bump minimum NSPR version to 4.35
Add a flag to disable building libnssckbi.
update to NSS 3.83
Remove set-but-unused variables from SEC_PKCS12DecoderValidateBags
Set nssckbi version number to 2.58
Add two SECOM root certificates to NSS
Add two DigitalSign root certificates to NSS
Remove Camerfirma Global Chambersign Root from NSS
Added bug reference and description to disabled UnsolicitedServerNameAck bogo ECH test
Removed skipping of ECH on equality of private and public server name
Added comment and bug reference to ECHRandomHRRExtension bogo test
Added Bogo shim client HRR test support. Fixed overwriting of CHInner.random on HRR
Added check for server only sending ECH extension
with retry configs in EncryptedExtensions and if not
accepting ECH. Changed config setting behavior to
skip configs with unsupported mandatory extensions
instead of failing
Added ECH client support to BoGo shim. Changed
CHInner creation to skip TLS 1.2 only extensions to
comply with BoGo
Added ECH server support to BoGo shim. Fixed NSS ECH server accept_confirmation bugs
Update BoGo tests to recent BoringSSL version
Bump minimum NSPR version to 4.34.1
update to NSS 3.82
check for null template in sec_asn1{d,e}_push_state
QuickDER: Forbid NULL tags with non-zero length
Initialize local variables in TlsConnectTestBase::ConnectAndCheckCipherSuite
Cast the result of GetProcAddress
pk11wrap: Tighten certificate lookup based on PKCS #11 URI.
update to NSS 3.81
Enable aarch64 hardware crypto support on OpenBSD
make NSS_SecureMemcmp 0/1 valued
Add no_application_protocol alert handler and test client error code is set
Gracefully handle null nickname in CERT_GetCertNicknameWithValidity
required for Firefox 104
raised NSPR requirement to 4.34.1
changing some Requires from (pre) to generic as (pre) is not sufficient (bsc#1202118)
update to NSS 3.80
Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
Add support for asynchronous client auth hooks.
nss-policy-check: make unknown keyword check optional.
Need to add policy control to keys lengths for signatures
Fix unreachable code warning in fuzz builds
Fix various compiler warnings in NSS
Enable various compiler warnings for clang builds
set PORT error after sftk_HMACCmp failure
Need to add policy control to keys lengths for signatures
remove data length assertion in sec_PKCS7Decrypt
Make high tag number assertion failure an error
CKM_SHA384_KEY_DERIVATION correction maximum key length from 284 to 384
Tolerate certificate_authorities xtn in ClientHello
Fix build failure on Windows
migrate Win 2012 tasks to Azure
fix title length in doc
Add interop tests for HRR and PSK to GREASE suite
Add presence/absence tests for TLS GREASE
Correct addition of GREASE value to ALPN xtn
CH extension permutation
TLS GREASE (RFC8701)
improve handling of unknown PKCS#12 safe bag types
use a different treeherder symbol for each docker image build task
remove nested table in rst doc
Export NSS_CMSSignerInfo_GetDigestAlgTag
build failure while implicitly casting SECStatus to PRUInt32
update to NSS 3.88.1
improve handling of unknown PKCS#12 safe bag types
update to NSS 3.88
remove nested table in rst doc
Export NSS_CMSSignerInfo_GetDigestAlgTag.
build failure while implicitly casting SECStatus to PRUInt32
Add check for ClientHello SID max length
Added EarlyData ALPN test support to BoGo shim
ECH client - Discard resumption TLS < 1.3 Session(IDs|Tickets) if ECH configs are setup
On HRR skip PSK incompatible with negotiated ciphersuites hash algorithm
ECH client: Send ech_required alert on server negotiating TLS 1.2. Fixed misleading Gtest, enabled corresponding BoGo test
Added Bogo ECH rejection test support
Added ECH 0Rtt support to BoGo shim
RSA OAEP Wycheproof JSON
RSA decrypt Wycheproof JSON
ECDSA Wycheproof JSON
ECDH Wycheproof JSON
PKCS#1v1.5 wycheproof json
Use X25519 wycheproof json
Move scripts to python3
Properly link FuzzingEngine for oss-fuzz.
Extending RSA-PSS bltest test coverage (Adding SHA-256 and SHA-384)
NSS needs to move off of DSA for integrity checks
Add initial testing with ACVP vector sets using acvp-rust
Don't clone libFuzzer, rely on clang instead
update to NSS 3.87
NULL password encoding incorrect
Fix rng stub signature for fuzzing builds
Updating the compiler parsing for build
Modification of supported compilers
tstclnt crashes when accessing gnutls server without a user cert in the database.
Add configuration option to enable source-based coverage sanitizer
Update ECCKiila generated files.
Add support for the LoongArch 64-bit architecture
add checks for zero-length RSA modulus to avoid memory errors and failed assertions later
Additional zero-length RSA modulus checks
update to NSS 3.86
conscious language removal in NSS
Set nssckbi version number to 2.60
Set CKA_NSS_SERVER_DISTRUST_AFTER and CKA_NSS_EMAIL_DISTRUST_AFTER for 3 TrustCor Root Certificates
Remove Staat der Nederlanden EV Root CA from NSS
Remove EC-ACC root cert from NSS
Remove SwissSign Platinum CA - G2 from NSS
Remove Network Solutions Certificate Authority
compress docker image artifact with zstd
Migrate nss from AWS to GCP
Enable static builds in the CI
Removing SAW docker from the NSS build system
Initialising variables in the rsa blinding code
Implementation of the double-signing of the message for ECDSA
Adding exponent blinding for RSA.
update to NSS 3.85
Modification of the primes.c and dhe-params.c in order to have better looking tables
Update zlib in NSS to 1.2.13
Skip building modutil and shlibsign when building in Firefox
Mark _nss_version_c unused on clang-cl
bmo#1795668 - Remove redundant variable definitions in lowhashtest
Add note about python executable to build instructions.
update to NSS 3.84
Bump minimum NSPR version to 4.35
Add a flag to disable building libnssckbi.
update to NSS 3.83
Remove set-but-unused variables from SEC_PKCS12DecoderValidateBags
Set nssckbi version number to 2.58
Add two SECOM root certificates to NSS
Add two DigitalSign root certificates to NSS
Remove Camerfirma Global Chambersign Root from NSS
Added bug reference and description to disabled UnsolicitedServerNameAck bogo ECH test
Removed skipping of ECH on equality of private and public server name
Added comment and bug reference to ECHRandomHRRExtension bogo test
Added Bogo shim client HRR test support. Fixed overwriting of CHInner.random on HRR
Added check for server only sending ECH extension with retry configs
in EncryptedExtensions and if not accepting ECH. Changed config setting
behavior to skip configs with unsupported mandatory extensions instead
of failing
Added ECH client support to BoGo shim. Changed CHInner creation to
skip TLS 1.2 only extensions to comply with BoGo
Added ECH server support to BoGo shim. Fixed NSS ECH server accept_confirmation bugs
Update BoGo tests to recent BoringSSL version
Bump minimum NSPR version to 4.34.1
update to NSS 3.82
check for null template in sec_asn1{d,e}_push_state
QuickDER: Forbid NULL tags with non-zero length
Initialize local variables in TlsConnectTestBase::ConnectAndCheckCipherSuite
Cast the result of GetProcAddress
pk11wrap: Tighten certificate lookup based on PKCS #11 URI.
update to NSS 3.81
Enable aarch64 hardware crypto support on OpenBSD
make NSS_SecureMemcmp 0/1 valued
Add no_application_protocol alert handler and test client error code is set
Gracefully handle null nickname in CERT_GetCertNicknameWithValidity
required for Firefox 104
raised NSPR requirement to 4.34.1
changing some Requires from (pre) to generic as (pre) is not sufficient (bsc#1202118)
update to NSS 3.80
Fix SEC_ERROR_ALGORITHM_MISMATCH entry in SECerrs.h.
Add support for asynchronous client auth hooks.
nss-policy-check: make unknown keyword check optional.
This update for openssl-1_1 fixes the following issues:
CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
The previous fix for this timing side channel turned out to cause a
severe 2-3x performance regression in the typical use case (bsc#1207534).
Update further expiring certificates that affect tests (bsc#1201627)
Advisory ID
SUSE-RU-2023:2625-1
Released
Fri Jun 23 17:16:11 2023
Summary
Recommended update for gcc12
Type
recommended
Severity
moderate
References
Description:
This update for gcc12 fixes the following issues:
Update to GCC 12.3 release, 0c61aa720e62f1baf0bfd178e283, git1204
* includes regression and other bug fixes
Speed up builds with --enable-link-serialization.
Update embedded newlib to version 4.2.0
SUSE-CU-2023:2093-1
Container Advisory ID
SUSE-CU-2023:2093-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-7.5
Container Release
7.5
The following patches have been included in this update:
Advisory ID
SUSE-SU-2023:2614-1
Released
Thu Jun 22 14:02:30 2023
Summary
Security update for libX11
Type
security
Severity
important
References
1212102,CVE-2023-3138
Description:
This update for libX11 fixes the following issues:
CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102).
SUSE-CU-2023:2074-1
Container Advisory ID
SUSE-CU-2023:2074-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-7.4
Container Release
7.4
The following patches have been included in this update:
SUSE-CU-2023:2025-1
Container Advisory ID
SUSE-CU-2023:2025-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-7.3
Container Release
7.3
The following patches have been included in this update:
SUSE-CU-2023:1977-1
Container Advisory ID
SUSE-CU-2023:1977-1
Container Tags
bci/openjdk:11 , bci/openjdk:11-7.1
Container Release
7.1
The following patches have been included in this update:
Advisory ID
SUSE-RU-2018:1332-1
Released
Tue Jul 17 09:01:19 2018
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1073299,1093392
Description:
This update for timezone provides the following fixes:
North Korea switches back from +0830 to +09 on 2018-05-05.
Ireland's standard time is in the summer, with negative DST offset to standard time used
in Winter. (bsc#1073299)
yast2-country is no longer setting TIMEZONE in /etc/sysconfig/clock and is calling systemd
timedatectl instead. Do not set /etc/localtime on timezone package updates to avoid
setting an incorrect timezone. (bsc#1093392)
This update for libX11 fixes the following security issues:
CVE-2018-14599: The function XListExtensions was vulnerable to an off-by-one
error caused by malicious server responses, leading to DoS or possibly
unspecified other impact (bsc#1102062)
CVE-2018-14600: The function XListExtensions interpreted a variable as signed
instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes),
leading to DoS or remote code execution (bsc#1102068)
CVE-2018-14598: A malicious server could have sent a reply in which the first
string overflows, causing a variable to be set to NULL that will be freed later
on, leading to DoS (segmentation fault) (bsc#1102073)
S8208370: fix typo in ReservedStack tests' @requires
S8208391: Differentiate response and connect timeouts in HTTP
Client API
S8208466: Fix potential memory leak in harfbuzz shaping.
S8208496: New Test to verify concurrent behavior of TLS.
S8208521: ProblemList more tests that fail due to 'Error
attaching to process: Can't create thread_db agent!'
S8208640: [a11y] [macos] Unable to navigate between
Radiobuttons in Radio group using keyboard.
S8208663: JDK 11 L10n resource file update msg drop 20
S8208676: Missing NULL check and resource leak in
NetworkPerformanceInterface::NetworkPerformance::network_utilization
S8208691: Tighten up jdk.includeInExceptions security property
S8209011: [TESTBUG] AArch64: sun/security/pkcs11/Secmod/
/TestNssDbSqlite.java fails in aarch64 platforms
S8209029: ProblemList tests that fail due to 'Error attaching
to process: Can't create thread_db agent!' in jdk-11+25
testing
S8209149: [TESTBUG] runtime/RedefineTests/
/RedefineRunningMethods.java needs a longer timeout
S8209451: Please change jdk 11 milestone to FCS
S8209452: VerifyCACerts.java failed with 'At least one cacert
test failed'
S8209506: Add Google Trust Services GlobalSign root
certificates
S8209537: Two security tests failed after JDK-8164639 due to
dependency was missed
Advisory ID
SUSE-RU-2018:2307-1
Released
Thu Oct 18 14:42:54 2018
Summary
Recommended update for libxcb
Type
recommended
Severity
moderate
References
1101560
Description:
This update for libxcb provides the following fix:
Fix some IO errors when using KWin in combination with the NVIDIA driver. (bsc#1101560)
Advisory ID
SUSE-RU-2018:2463-1
Released
Thu Oct 25 14:48:34 2018
Summary
Recommended update for timezone, timezone-java
Type
recommended
Severity
moderate
References
1104700,1112310
Description:
This update for timezone, timezone-java fixes the following issues:
The timezone database was updated to 2018f:
Volgograd moves from +03 to +04 on 2018-10-28.
Fiji ends DST 2019-01-13, not 2019-01-20.
Most of Chile changes DST dates, effective 2019-04-06 (bsc#1104700)
Corrections to past timestamps of DST transitions
Use 'PST' and 'PDT' for Philippine time
minor code changes to zic handling of the TZif format
documentation updates
Other bugfixes:
Fixed a zic problem with the 1948-1951 DST transition in Japan (bsc#1112310)
Advisory ID
SUSE-RU-2018:2550-1
Released
Wed Oct 31 16:16:56 2018
Summary
Recommended update for timezone, timezone-java
Type
recommended
Severity
moderate
References
1113554
Description:
This update provides the latest time zone definitions (2018g), including the following change:
Morocco switched from +00/+01 to permanent +01 effective 2018-10-28 (bsc#1113554)
Advisory ID
SUSE-RU-2018:2569-1
Released
Fri Nov 2 19:00:18 2018
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1110700
Description:
This update for pam fixes the following issues:
Remove limits for nproc from /etc/security/limits.conf (bsc#1110700)
Advisory ID
SUSE-RU-2018:2607-1
Released
Wed Nov 7 15:42:48 2018
Summary
Optional update for gcc8
Type
recommended
Severity
low
References
1084812,1084842,1087550,1094222,1102564
Description:
The GNU Compiler GCC 8 is being added to the Development Tools Module by this
update.
The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other
gcc derived libraries for the Basesystem module of SUSE Linux Enterprise 15.
Various optimizers have been improved in GCC 8, several of bugs fixed,
quite some new warnings added and the error pin-pointing and
fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 8 contains a summary of all the changes that
have happened:
https://gcc.gnu.org/gcc-8/changes.html
Also changes needed or common pitfalls when porting software are described on:
https://gcc.gnu.org/gcc-8/porting_to.html
Advisory ID
SUSE-RU-2018:2625-1
Released
Mon Nov 12 08:58:25 2018
Summary
Recommended update for java-11-openjdk
Type
recommended
Severity
moderate
References
1113734
Description:
This update for java-11-openjdk fixes the following issues:
Merge into the JDK following modules from github.com/javaee:
com.sum.xml.fastinfoset
org.jvnet.staxex
com.sun.istack.runtime
com.sun.xml.txw2
com.sun.xml.bind
This provides a default implementation of JAXB-API that
existed in JDK before Java 11 and that some applications
depend on.
Advisory ID
SUSE-SU-2018:2825-1
Released
Mon Dec 3 15:35:02 2018
Summary
Security update for pam
Type
security
Severity
important
References
1115640,CVE-2018-17953
Description:
This update for pam fixes the following issue:
Security issue fixed:
CVE-2018-17953: Fixed IP address and subnet handling of pam_access.so that was not honoured correctly when a single host was specified (bsc#1115640).
Advisory ID
SUSE-SU-2018:2861-1
Released
Thu Dec 6 14:32:01 2018
Summary
Security update for ncurses
Type
security
Severity
important
References
1103320,1115929,CVE-2018-19211
Description:
This update for ncurses fixes the following issues:
Security issue fixed:
CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
Non-security issue fixed:
Remove scree.xterm from terminfo data base as with this screen uses fallback TERM=screen (bsc#1103320).
Advisory ID
SUSE-SU-2018:3044-1
Released
Fri Dec 21 18:47:21 2018
Summary
Security update for MozillaFirefox, mozilla-nspr and mozilla-nss
This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:
Issues fixed in MozillaFirefox:
Update to Firefox ESR 60.4 (bsc#1119105)
CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
CVE-2018-18492: Fixed a use-after-free with select element
CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
to steal cross-origin URLs
CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
CVE-2018-12405: Fixed a few memory safety bugs
Issues fixed in mozilla-nss:
Update to NSS 3.40.1 (bsc#1119105)
CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
Fixed a decryption failure during FFDHE key exchange
Various security fixes in the ASN.1 code
Issues fixed in mozilla-nspr:
Update mozilla-nspr to 4.20 (bsc#1119105)
Advisory ID
SUSE-RU-2019:44-1
Released
Tue Jan 8 13:07:32 2019
Summary
Recommended update for acl
Type
recommended
Severity
low
References
953659
Description:
This update for acl fixes the following issues:
test: Add helper library to fake passwd/group files.
quote: Escape literal backslashes. (bsc#953659)
Advisory ID
SUSE-RU-2019:102-1
Released
Tue Jan 15 18:02:58 2019
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1120402
Description:
This update for timezone fixes the following issues:
Update 2018h:
Qyzylorda, Kazakhstan moved from +06 to +05 on 2018-12-21
New zone Asia/Qostanay because Qostanay, Kazakhstan didn't move
Metlakatla, Alaska observes PST this winter only
Guess Morocco will continue to adjust clocks around Ramadan
Add predictions for Iran from 2038 through 2090
This update for file fixes the following issues:
The following security vulnerabilities were addressed:
CVE-2018-10360: Fixed an out-of-bounds read in the function do_core_note in
readelf.c, which allowed remote attackers to cause a denial of service
(application crash) via a crafted ELF file (bsc#1096974)
CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
(bsc#1126118)
CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
(bsc#1126119)
CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
(bsc#1126117)
Advisory ID
SUSE-SU-2019:788-1
Released
Thu Mar 28 11:55:06 2019
Summary
Security update for sqlite3
Type
security
Severity
moderate
References
1119687,CVE-2018-20346
Description:
This update for sqlite3 to version 3.27.2 fixes the following issue:
Security issue fixed:
CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
This update for libpng16 fixes the following issues:
Security issues fixed:
CVE-2019-7317: Fixed a use-after-free vulnerability, triggered when
png_image_free() was called under png_safe_execute (bsc#1124211).
CVE-2018-13785: Fixed a wrong calculation of row_factor in the
png_check_chunk_length function in pngrutil.c, which could haved triggered
and integer overflow and result in an divide-by-zero while processing a
crafted PNG file, leading to a denial of service (bsc#1100687)
Advisory ID
SUSE-RU-2019:1631-1
Released
Fri Jun 21 11:17:21 2019
Summary
Recommended update for xz
Type
recommended
Severity
low
References
1135709
Description:
This update for xz fixes the following issues:
Add SUSE-Public-Domain licence as some parts of xz utils (liblzma,
xz, xzdec, lzmadec, documentation, translated messages, tests,
debug, extra directory) are in public domain licence [bsc#1135709]
Advisory ID
SUSE-RU-2019:1807-1
Released
Wed Jul 10 13:13:21 2019
Summary
Recommended update for java-11-openjdk
Type
recommended
Severity
moderate
References
1137264
Description:
This update ships the OpenJDK LTS version 11 in the java-11-openjdk packages. (FATE#326347 bsc#1137264)
Advisory ID
SUSE-RU-2019:1815-1
Released
Thu Jul 11 07:47:55 2019
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1140016
Description:
This update for timezone fixes the following issues:
Timezone update 2019b. (bsc#1140016):
- Brazil no longer observes DST.
- 'zic -b slim' outputs smaller TZif files.
- Palestine's 2019 spring-forward transition was on 03-29, not 03-30.
- Add info about the Crimea situation.
Do not fail installation when the manpages are not present (bsc#1115375)
Backport upstream fix for JDK-8208602: Cannot read PEM X.509 cert if
there is whitespace after the header or footer (bsc#1140461)
Advisory ID
SUSE-RU-2019:2142-1
Released
Wed Aug 14 18:14:04 2019
Summary
Recommended update for mozilla-nspr, mozilla-nss
Type
recommended
Severity
moderate
References
1141322
Description:
This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nss was updated to NSS 3.45 (bsc#1141322) :
New function in pk11pub.h: PK11_FindRawCertsWithSubject
The following CA certificates were Removed:
CN = Certinomis - Root CA (bmo#1552374)
Implement Delegated Credentials (draft-ietf-tls-subcerts) (bmo#1540403)
This adds a new experimental function SSL_DelegateCredential
Note: In 3.45, selfserv does not yet support delegated credentials (See bmo#1548360).
Note: In 3.45 the SSLChannelInfo is left unmodified, while an upcoming change in 3.46 will set SSLChannelInfo.authKeyBits to that of the delegated credential for better policy enforcement (See bmo#1563078).
Replace ARM32 Curve25519 implementation with one from fiat-crypto (bmo#1550579)
Expose a function PK11_FindRawCertsWithSubject for finding certificates with a given subject on a given slot (bmo#1552262)
Add IPSEC IKE support to softoken (bmo#1546229)
Add support for the Elbrus lcc compiler (<=1.23) (bmo#1554616)
Expose an external clock for SSL (bmo#1543874)
This adds new experimental functions: SSL_SetTimeFunc,
SSL_CreateAntiReplayContext, SSL_SetAntiReplayContext, and
SSL_ReleaseAntiReplayContext.
The experimental function SSL_InitAntiReplay is removed.
Various changes in response to the ongoing FIPS review (bmo#1546477)
Note: The source package size has increased substantially due to the new FIPS test vectors. This will likely prompt follow-on work, but please accept our apologies in the meantime.
mozilla-nspr was updated to version 4.21
Changed prbit.h to use builtin function on aarch64.
Removed Gonk/B2G references.
Advisory ID
SUSE-SU-2019:2533-1
Released
Thu Oct 3 15:02:50 2019
Summary
Security update for sqlite3
Type
security
Severity
moderate
References
1150137,CVE-2019-16168
Description:
This update for sqlite3 fixes the following issues:
Security issue fixed:
CVE-2019-16168: Fixed improper validation of sqlite_stat1 field that could lead to denial of service (bsc#1150137).
Advisory ID
SUSE-RU-2019:2762-1
Released
Thu Oct 24 07:08:44 2019
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1150451
Description:
This update for timezone fixes the following issues:
Fiji observes DST from 2019-11-10 to 2020-01-12.
Norfolk Island starts observing Australian-style DST.
This update includes the GNU Compiler Collection 9.
A full changelog is provided by the GCC team on:
https://www.gnu.org/software/gcc/gcc-9/changes.html
The base system compiler libraries libgcc_s1, libstdc++6 and others are
now built by the gcc 9 packages.
To use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 /
CXX=g++-9 during configuration for using it.
Security issues fixed:
CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)
Non-security issues fixed:
Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
Fixed miscompilation for vector shift on s390. (bsc#1141897)
Advisory ID
SUSE-SU-2019:3086-1
Released
Thu Nov 28 10:02:24 2019
Summary
Security update for libidn2
Type
security
Severity
moderate
References
1154884,1154887,CVE-2019-12290,CVE-2019-18224
Description:
This update for libidn2 to version 2.2.0 fixes the following issues:
CVE-2019-12290: Fixed an improper round-trip check when converting A-labels to U-labels (bsc#1154884).
CVE-2019-18224: Fixed a heap-based buffer overflow that was caused by long domain strings (bsc#1154887).
This update for java-11-openjdk fixes the following issues:
Update to version jdk-11.0.6-10 (January 2020 CPU, bsc#1160968)
Fixing these security related issues:
The libXi6-32bit library on x86_64 are now shipped in the Basesystem module. (bsc#1153311)
Advisory ID
SUSE-RU-2020:525-1
Released
Fri Feb 28 11:49:36 2020
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1164562
Description:
This update for pam fixes the following issues:
Add libdb as build-time dependency to enable pam_userdb module.
Enable pam_userdb.so (jsc#sle-7258, bsc#1164562)
Advisory ID
SUSE-RU-2020:689-1
Released
Fri Mar 13 17:09:01 2020
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1166510
Description:
This update for PAM fixes the following issue:
The license of libdb linked against pam_userdb is not always wanted,
so we temporary disabled pam_userdb again. It will be published
in a different package at a later time. (bsc#1166510)
Advisory ID
SUSE-RU-2020:917-1
Released
Fri Apr 3 15:02:25 2020
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1166510
Description:
This update for pam fixes the following issues:
Moved pam_userdb into a separate package pam-extra. (bsc#1166510)
Advisory ID
SUSE-SU-2020:948-1
Released
Wed Apr 8 07:44:21 2020
Summary
Security update for gmp, gnutls, libnettle
Type
security
Severity
moderate
References
1152692,1155327,1166881,1168345,CVE-2020-11501
Description:
This update for gmp, gnutls, libnettle fixes the following issues:
Security issue fixed:
CVE-2020-11501: Fixed zero random value in DTLS client hello (bsc#1168345)
FIPS related bugfixes:
FIPS: Install checksums for binary integrity verification which are
required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)
FIPS: Fixed a cfb8 decryption issue, no longer truncate output IV if
input is shorter than block size. (bsc#1166881)
FIPS: Added Diffie Hellman public key verification test. (bsc#1155327)
Advisory ID
SUSE-RU-2020:1226-1
Released
Fri May 8 10:51:05 2020
Summary
Recommended update for gcc9
Type
recommended
Severity
moderate
References
1149995,1152590,1167898
Description:
This update for gcc9 fixes the following issues:
This update ships the GCC 9.3 release.
Includes a fix for Internal compiler error when building HepMC (bsc#1167898)
Includes fix for binutils version parsing
Add libstdc++6-pp provides and conflicts to avoid file conflicts
with same minor version of libstdc++6-pp from gcc10.
Add gcc9 autodetect -g at lto link (bsc#1149995)
Install go tool buildid for bootstrapping go
Advisory ID
SUSE-SU-2020:1294-1
Released
Mon May 18 07:38:36 2020
Summary
Security update for file
Type
security
Severity
moderate
References
1154661,1169512,CVE-2019-18218
Description:
This update for file fixes the following issues:
Security issues fixed:
CVE-2019-18218: Fixed a heap-based buffer overflow in cdf_read_property_info() (bsc#1154661).
Non-security issue fixed:
Fixed broken '--help' output (bsc#1169512).
Advisory ID
SUSE-RU-2020:1303-1
Released
Mon May 18 09:40:36 2020
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1169582
Description:
This update for timezone fixes the following issues:
timezone update 2020a. (bsc#1169582)
* Morocco springs forward on 2020-05-31, not 2020-05-24.
* Canada's Yukon advanced to -07 year-round on 2020-03-08.
* America/Nuuk renamed from America/Godthab.
* zic now supports expiration dates for leap second lists.
Advisory ID
SUSE-RU-2020:1328-1
Released
Mon May 18 17:16:04 2020
Summary
Recommended update for grep
Type
recommended
Severity
moderate
References
1155271
Description:
This update for grep fixes the following issues:
Update testsuite expectations, no functional changes (bsc#1155271)
Advisory ID
SUSE-SU-2020:1353-1
Released
Wed May 20 13:02:32 2020
Summary
Security update for freetype2
Type
security
Severity
moderate
References
1079603,1091109,CVE-2018-6942
Description:
This update for freetype2 to version 2.10.1 fixes the following issues:
Security issue fixed:
CVE-2018-6942: Fixed a NULL pointer dereference within ttinerp.c (bsc#1079603).
Non-security issues fixed:
Update to version 2.10.1
* The bytecode hinting of OpenType variation fonts was flawed, since
the data in the `CVAR' table wasn't correctly applied.
* Auto-hinter support for Mongolian.
* The handling of the default character in PCF fonts as introduced
in version 2.10.0 was partially broken, causing premature abortion
of charmap iteration for many fonts.
* If `FT_Set_Named_Instance' was called with the same arguments
twice in a row, the function returned an incorrect error code the
second time.
* Direct rendering using FT_RASTER_FLAG_DIRECT crashed (bug
introduced in version 2.10.0).
* Increased precision while computing OpenType font variation
instances.
* The flattening algorithm of cubic Bezier curves was slightly
changed to make it faster. This can cause very subtle rendering
changes, which aren't noticeable by the eye, however.
* The auto-hinter now disables hinting if there are blue zones
defined for a `style' (i.e., a certain combination of a script and
its related typographic features) but the font doesn't contain any
characters needed to set up at least one blue zone.
Add tarball signatures and freetype2.keyring
Update to version 2.10.0
* A bunch of new functions has been added to access and process
COLR/CPAL data of OpenType fonts with color-layered glyphs.
* As a GSoC 2018 project, Nikhil Ramakrishnan completely
overhauled and modernized the API reference.
* The logic for computing the global ascender, descender, and
height of OpenType fonts has been slightly adjusted for
consistency.
* `TT_Set_MM_Blend' could fail if called repeatedly with the same
arguments.
* The precision of handling deltas in Variation Fonts has been
increased.The problem did only show up with multidimensional
designspaces.
* New function `FT_Library_SetLcdGeometry' to set up the geometry
of LCD subpixels.
* FreeType now uses the `defaultChar' property of PCF fonts to set
the glyph for the undefined character at glyph index 0 (as
FreeType already does for all other supported font formats). As
a consequence, the order of glyphs of a PCF font if accessed
with FreeType can be different now compared to previous
versions.
This change doesn't affect PCF font access with cmaps.
* `FT_Select_Charmap' has been changed to allow parameter value
`FT_ENCODING_NONE', which is valid for BDF, PCF, and Windows FNT
formats to access built-in cmaps that don't have a predefined
`FT_Encoding' value.
* A previously reserved field in the `FT_GlyphSlotRec' structure
now holds the glyph index.
* The usual round of fuzzer bug fixes to better reject malformed
fonts.
* `FT_Outline_New_Internal' and `FT_Outline_Done_Internal' have
been removed.These two functions were public by oversight only
and were never documented.
* A new function `FT_Error_String' returns descriptions of error
codes if configuration macro FT_CONFIG_OPTION_ERROR_STRINGS is
defined.
* `FT_Set_MM_WeightVector' and `FT_Get_MM_WeightVector' are new
functions limited to Adobe MultiMaster fonts to directly set and
get the weight vector.
Enable subpixel rendering with infinality config:
Re-enable freetype-config, there is just too many fallouts.
Update to version 2.9.1
* Type 1 fonts containing flex features were not rendered
correctly (bug introduced in version 2.9).
* CVE-2018-6942: Older FreeType versions can crash with certain
malformed variation fonts.
* Bug fix: Multiple calls to `FT_Get_MM_Var' returned garbage.
* Emboldening of bitmaps didn't work correctly sometimes, showing
various artifacts (bug introduced in version 2.8.1).
* The auto-hinter script ranges have been updated for Unicode 11.
No support for new scripts have been added, however, with the
exception of Georgian Mtavruli.
freetype-config is now deprecated by upstream and not enabled
by default.
Update to version 2.10.1
* The `ftmulti' demo program now supports multiple hidden axes with
the same name tag.
* `ftview', `ftstring', and `ftgrid' got a `-k' command line option
to emulate a sequence of keystrokes at start-up.
* `ftview', `ftstring', and `ftgrid' now support screen dumping to a
PNG file.
* The bytecode debugger, `ttdebug', now supports variation TrueType
fonts; a variation font instance can be selected with the new `-d'
command line option.
Add tarball signatures and freetype2.keyring
Update to version 2.10.0
* The `ftdump' demo program has new options `-c' and `-C' to
display charmaps in compact and detailed format, respectively.
Option `-V' has been removed.
* The `ftview', `ftstring', and `ftgrid' demo programs use a new
command line option `-d' to specify the program window's width,
height, and color depth.
* The `ftview' demo program now displays red boxes for zero-width
glyphs.
* `ftglyph' has limited support to display fonts with
color-layered glyphs.This will be improved later on.
* `ftgrid' can now display bitmap fonts also.
* The `ttdebug' demo program has a new option `-f' to select a
member of a TrueType collection (TTC).
* Other various improvements to the demo programs.
Remove 'Supplements: fonts-config' to avoid accidentally pulling
in Qt dependencies on some non-Qt based desktops.(bsc#1091109)
fonts-config is fundamental but ft2demos seldom installs by end users.
only fonts-config maintainers/debuggers may use ft2demos along to
debug some issues.
This update for java-11-openjdk fixes the following issues:
Java was updated to jdk-11.0.7+10 (April 2020 CPU, bsc#1169511).
Security issues fixed:
CVE-2020-2754: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
CVE-2020-2755: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
CVE-2020-2756: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
CVE-2020-2757: Fixed an object deserialization issue that could have resulted in denial of service via crafted serialized input (bsc#1169511).
CVE-2020-2767: Fixed an incorrect handling of certificate messages during TLS handshakes (bsc#1169511).
CVE-2020-2773: Fixed the incorrect handling of exceptions thrown by unmarshalKeyInfo() and unmarshalXMLSignature() (bsc#1169511).
CVE-2020-2778: Fixed the incorrect handling of SSLParameters in setAlgorithmConstraints(), which could have been abused to override the defined systems security policy and lead to the use of weak crypto algorithms (bsc#1169511).
CVE-2020-2781: Fixed the incorrect re-use of single null TLS sessions (bsc#1169511).
CVE-2020-2800: Fixed an HTTP header injection issue caused by mishandling of CR/LF in header values (bsc#1169511).
CVE-2020-2803: Fixed a boundary check and type check issue that could have led to a sandbox bypass (bsc#1169511).
CVE-2020-2805: Fixed a boundary check and type check issue that could have led to a sandbox bypass (bsc#1169511).
CVE-2020-2816: Fixed an incorrect handling of application data packets during TLS handshakes (bsc#1169511).
CVE-2020-2830: Fixed an incorrect handling of regular expressions that could have resulted in denial of service (bsc#1169511).
Advisory ID
SUSE-RU-2020:1542-1
Released
Thu Jun 4 13:24:37 2020
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1172055
Description:
This update for timezone fixes the following issue:
This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nss was updated to version 3.53
CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes
mozilla-nspr to version 4.25
Advisory ID
SUSE-RU-2020:1852-1
Released
Mon Jul 6 16:50:23 2020
Summary
Recommended update for fontforge, ghostscript-fonts, ttf-converter, xorg-x11-fonts
Type
recommended
Severity
moderate
References
1169444
Description:
This update for fontforge, ghostscript-fonts, ttf-converter, xorg-x11-fonts fixes the following issues:
Changes in fontforge:
Support transforming bitmap glyphs from python. (bsc#1169444)
Allow python-Sphinx >= 3
Changes in ttf-converter:
Update from version 1.0 to version 1.0.6:
* ftdump is now shipped additionally as new dependency for ttf-converter
* Standardize output when converting vector and bitmap fonts
* Add more subfamilies fixes (bsc#1169444)
* Add --family and --subfamily arguments to force values on those fields
* Add parameters to fix glyph unicode values
--fix-glyph-unicode : Try to fix unicode points and glyph names
based on glyph names containing hexadecimal codes (like
'$0C00', 'char12345' or 'uni004F')
--replace-unicode-values: When passed 2 comma separated numbers
a,b the glyph with an unicode value of a is replaced with the
unicode value b. Can be used more than once.
--shift-unicode-values: When passed 3 comma separated numbers
a,b,c this shifts the unicode values of glyphs between a and b
(both included) by adding c. Can be used more than once.
* Add --bitmapTransform parameter to transform bitmap glyphs. (bsc#1169444)
When used, all glyphs are modified with the transformation function and
values passed as parameters. The parameter has three values separated by
commas: fliph|flipv|rotate90cw|rotate90ccw|rotate180|skew|transmove,xoff,yoff
* Add support to convert bitmap fonts (bsc#1169444)
* Rename MediumItalic subfamily to Medium Italic
* Show some more information when removing duplicated glyphs
* Add a --force-monospaced argument instead of hardcoding font names
* Convert `BoldCond` subfamily to `Bold Condensed`
* Fixes for Monospaced fonts and force the Nimbus Mono L font to be Monospaced. (bsc#1169444 #c41)
* Add a --version argument
* Fix subfamily names so the converted font's subfamily match the original ones. (bsc#1169444 #c41)
Changes in xorg-x11-fonts:
Use ttf-converter 1.0.6 to build an Italic version of cu12.pcf.gz in the converted subpackage
Include the subfamily in the filename of converted fonts
Use ttf-converter's new bitmap font support to convert Schumacher Clean and Schumacher Clean Wide (bsc#1169444 #c41)
Replace some unicode values in cu-pua12.pcf.gz to fix them
Shift some unicode values in arabic24.pcf.gz and cuarabic12.pcf.gz so glyphs
don't pretend to be latin characters when they're not.
Don't distribute converted fonts with wrong unicode values in their glyphs. (bsc#1169444)
Bitstream-Charter-*.otb, Cursor.ttf,Sun-OPEN-LOOK-*.otb, MUTT-ClearlyU-Devangari-Extra-Regular,
MUTT-ClearlyU-Ligature-Wide-Regular, and MUTT-ClearlyU-Devanagari-Regular
Changes in ghostscript-fonts:
Force the converted Nimbus Mono font to be monospaced. (bsc#1169444 #c41)
Use the --force-monospaced argument of ttf-converter 1.0.3
Advisory ID
SUSE-RU-2020:1954-1
Released
Sat Jul 18 03:07:15 2020
Summary
Recommended update for cracklib
Type
recommended
Severity
moderate
References
1172396
Description:
This update for cracklib fixes the following issues:
Fixed a buffer overflow when processing long words.
Advisory ID
SUSE-RU-2020:2083-1
Released
Thu Jul 30 10:27:59 2020
Summary
Recommended update for diffutils
Type
recommended
Severity
moderate
References
1156913
Description:
This update for diffutils fixes the following issue:
Disable a sporadically failing test for ppc64 and ppc64le builds. (bsc#1156913)
Advisory ID
SUSE-SU-2020:2116-1
Released
Tue Aug 4 15:12:41 2020
Summary
Security update for libX11
Type
security
Severity
important
References
1174628,CVE-2020-14344
Description:
This update for libX11 fixes the following issues:
This update for gcc10, nvptx-tools fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.
The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.
The new compiler variants are available with '-10' suffix, you can specify them
via:
CC=gcc-10
CXX=g++-10
or similar commands.
For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
Changes in nvptx-tools:
Enable build on aarch64
Advisory ID
SUSE-RU-2020:2983-1
Released
Wed Oct 21 15:03:03 2020
Summary
Recommended update for file
Type
recommended
Severity
moderate
References
1176123
Description:
This update for file fixes the following issues:
Fixes an issue when file displays broken 'ELF' interpreter. (bsc#1176123)
Advisory ID
SUSE-SU-2020:2995-1
Released
Thu Oct 22 10:03:09 2020
Summary
Security update for freetype2
Type
security
Severity
important
References
1177914,CVE-2020-15999
Description:
This update for freetype2 fixes the following issues:
CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
Advisory ID
SUSE-SU-2020:3091-1
Released
Thu Oct 29 16:35:37 2020
Summary
Security update for MozillaThunderbird and mozilla-nspr
This update for MozillaThunderbird and mozilla-nspr fixes the following issues:
Mozilla Thunderbird 78.4
* new: MailExtensions: browser.tabs.sendMessage API added
* new: MailExtensions: messageDisplayScripts API added
* changed: Yahoo and AOL mail users using password authentication will be migrated to OAuth2
* changed: MailExtensions: messageDisplay APIs extended to support multiple selected messages
* changed: MailExtensions: compose.begin functions now support creating a message with attachments
* fixed: Thunderbird could freeze when updating global search index
* fixed: Multiple issues with handling of self-signed SSL certificates addressed
* fixed: Recipient address fields in compose window could expand to fill all available space
* fixed: Inserting emoji characters in message compose window caused unexpected behavior
* fixed: Button to restore default folder icon color was not keyboard accessible
* fixed: Various keyboard navigation fixes
* fixed: Various color-related theme fixes
* fixed: MailExtensions: Updating attachments with onBeforeSend.addListener() did not work
MFSA 2020-47 (bsc#1177977)
* CVE-2020-15969 Use-after-free in usersctp
* CVE-2020-15683 Memory safety bugs fixed in Thunderbird 78.4
Mozilla Thunderbird 78.3.3
* OpenPGP: Improved support for encrypting with subkeys
* OpenPGP message status icons were not visible in message header pane
* Creating a new calendar event did not require an event title
Mozilla Thunderbird 78.3.2 (bsc#1176899)
* OpenPGP: Improved support for encrypting with subkeys
* OpenPGP: Encrypted messages with international characters were sometimes displayed incorrectly
* Single-click deletion of recipient pills with middle mouse button restored
* Searching an address book list did not display results
* Dark mode, high contrast, and Windows theming fixes
Mozilla Thunderbird 78.3.1
* fix crash in nsImapProtocol::CreateNewLineFromSocket
Mozilla Thunderbird 78.3.0
MFSA 2020-44 (bsc#1176756)
* CVE-2020-15677 Download origin spoofing via redirect
* CVE-2020-15676 XSS when pasting attacker-controlled data into a contenteditable element
* CVE-2020-15678 When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after- free scenario
* CVE-2020-15673 Memory safety bugs fixed in Thunderbird 78.3
update mozilla-nspr to version 4.25.1
* The macOS platform code for shared library loading was
changed to support macOS 11.
* Dependency needed for the MozillaThunderbird udpate
Advisory ID
SUSE-RU-2020:3099-1
Released
Thu Oct 29 19:33:41 2020
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
timezone update 2020b (bsc#1177460)
* Revised predictions for Morocco's changes starting in 2023.
* Canada's Yukon changes to -07 on 2020-11-01, not 2020-03-08.
* Macquarie Island has stayed in sync with Tasmania since 2011.
* Casey, Antarctica is at +08 in winter and +11 in summer.
* zic no longer supports -y, nor the TYPE field of Rules.
Advisory ID
SUSE-RU-2020:3123-1
Released
Tue Nov 3 09:48:13 2020
Summary
Recommended update for timezone
Type
recommended
Severity
important
References
1177460,1178346,1178350,1178353
Description:
This update for timezone fixes the following issues:
This update for java-11-openjdk fixes the following issues:
Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,
bsc#1177943)
* New features
+ JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector
* Security fixes
+ JDK-8233624: Enhance JNI linkage
+ JDK-8236196: Improve string pooling
+ JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
+ JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
+ JDK-8237995, CVE-2020-14782: Enhance certificate processing
+ JDK-8240124: Better VM Interning
+ JDK-8241114, CVE-2020-14792: Better range handling
+ JDK-8242680, CVE-2020-14796: Improved URI Support
+ JDK-8242685, CVE-2020-14797: Better Path Validation
+ JDK-8242695, CVE-2020-14798: Enhanced buffer support
+ JDK-8243302: Advanced class supports
+ JDK-8244136, CVE-2020-14803: Improved Buffer supports
+ JDK-8244479: Further constrain certificates
+ JDK-8244955: Additional Fix for JDK-8240124
+ JDK-8245407: Enhance zoning of times
+ JDK-8245412: Better class definitions
+ JDK-8245417: Improve certificate chain handling
+ JDK-8248574: Improve jpeg processing
+ JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
+ JDK-8253019: Enhanced JPEG decoding
* Other changes
+ JDK-6532025: GIF reader throws misleading exception with
truncated images
+ JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/
/PDialogTest.java needs update by removing an infinite loop
+ JDK-8022535: [TEST BUG] javax/swing/text/html/parser/
/Test8017492.java fails
+ JDK-8062947: Fix exception message to correctly represent
LDAP connection failure
+ JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed
+ JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/
/CloseServerSocket.java fails intermittently with Address
already in use
+ JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
due to timeout on DeadServerNoTimeoutTest is incorrect
+ JDK-8160768: Add capability to custom resolve host/domain
names within the default JNDI LDAP provider
+ JDK-8172404: Tools should warn if weak algorithms are used
before restricting them
+ JDK-8193367: Annotated type variable bounds crash javac
+ JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java
fails intermittently: Connection reset
+ JDK-8203026: java.rmi.NoSuchObjectException: no such object
in table
+ JDK-8203281: [Windows] JComboBox change in ui when
editor.setBorder() is called
+ JDK-8203382: Rename SystemDictionary::initialize_wk_klass to
resolve_wk_klass
+ JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and
JdbExprTest.sh fail due to timeout
+ JDK-8203928: [Test] Convert non-JDB scaffolding
serviceability shell script tests to java
+ JDK-8204963: javax.swing.border.TitledBorder has a memory leak
+ JDK-8204994: SA might fail to attach to process with 'Windbg
Error: WaitForEvent failed'
+ JDK-8205534: Remove SymbolTable dependency from
serviceability agent
+ JDK-8206309: Tier1 SA tests fail
+ JDK-8208281: java/nio/channels/
/AsynchronousSocketChannel/Basic.java timed out
+ JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java
version - step1
+ JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh
is incorrect
+ JDK-8209342: Problemlist SA tests on Solaris due to Error
attaching to process: Can't create thread_db agent!
+ JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java
should be marked as headful
+ JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with
timeout
+ JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java
version - step2
+ JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with
ZGC
+ JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java
+ JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/
/ap10t001/TestDescription.java failed with ObjectFree:
GetCurrentThreadCpuTimerInfo returned unexpected error code
+ JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java
version - step3
+ JDK-8210527: JShell: NullPointerException in
jdk.jshell.Eval.translateExceptionStack
+ JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related
tests
+ JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails
with waitForPrompt timed out after 60 seconds
+ JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should
clarify which output is the pending reply after a timeout
+ JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java
version - step4
+ JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java
fails to find ThreadLocalObject
+ JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh
test
+ JDK-8211694: JShell: Redeclared variable should be reset
+ JDK-8212200: assert when shared java.lang.Object is redefined
by JVMTI agent
+ JDK-8212629: [TEST] wrong breakpoint in
test/jdk/com/sun/jdi/DeferredStepTest
+ JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)
- unexpected. lastLine=52, minLine=52, maxLine=55
+ JDK-8212807: tools/jar/multiRelease/Basic.java times out
+ JDK-8213182: Minimal VM build failure after JDK-8212200
(assert when shared java.lang.Object is redefined by JVMTI
agent)
+ JDK-8213214: Set -Djava.io.tmpdir= when running tests
+ JDK-8213275: ReplaceCriticalClasses.java fails with
jdk.internal.vm.PostVMInitHook not found
+ JDK-8213574: Deadlock in string table expansion when dumping
lots of CDS classes
+ JDK-8213703: LambdaConversionException: Invalid receiver type
not a subtype of implementation type interface
+ JDK-8214074: Ghash optimization using AVX instructions
+ JDK-8214491: Upgrade to JLine 3.9.0
+ JDK-8214797: TestJmapCoreMetaspace.java timed out
+ JDK-8215243: JShell tests failing intermitently with
'Problem cleaning up the following threads:'
+ JDK-8215244: jdk/jshell/ToolBasicTest.java
testHistoryReference failed
+ JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash
optimization using AVX instructions)
+ JDK-8215438: jshell tool: Ctrl-D causes EOF
+ JDK-8216021: RunTest.gmk might set concurrency level to 1 on
Windows
+ JDK-8216974: HttpConnection not returned to the pool after
204 response
+ JDK-8218948: SimpleDateFormat :: format - Zone Names are not
reflected correctly during run time
+ JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is
too small on new Skylake CPUs
+ JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs
instead of aliased B&W glyphs
+ JDK-8221658: aarch64: add necessary predicate for ubfx
patterns
+ JDK-8221759: Crash when completing 'java.io.File.path'
+ JDK-8221918: runtime/SharedArchiveFile/serviceability/
/ReplaceCriticalClasses.java fails: Shared archive not found
+ JDK-8222074: Enhance auto vectorization for x86
+ JDK-8222079: Don't use memset to initialize fields decode_env
constructor in disassembler.cpp
+ JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely
on hostname command
+ JDK-8223688: JShell: crash on the instantiation of raw
anonymous class
+ JDK-8223777: In posix_spawn mode, failing to exec()
jspawnhelper does not result in an error
+ JDK-8223940: Private key not supported by chosen signature
algorithm
+ JDK-8224184: jshell got IOException at exiting with AIX
+ JDK-8224234: compiler/codegen/TestCharVect2.java fails in
test_mulc
+ JDK-8225037: java.net.JarURLConnection::getJarEntry() throws
NullPointerException
+ JDK-8225625: AES Electronic Codebook (ECB) encryption and
decryption optimization using AVX512 + VAES instructions
+ JDK-8226536: Catch OOM from deopt that fails rematerializing
objects
+ JDK-8226575: OperatingSystemMXBean should be made container
aware
+ JDK-8226697: Several tests which need the @key headful
keyword are missing it.
+ JDK-8226809: Circular reference in printed stack trace is not
correctly indented & ambiguous
+ JDK-8227059: sun/security/tools/keytool/
/DefaultSignatureAlgorithm.java timed out
+ JDK-8227269: Slow class loading when running with JDWP
+ JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java
fails due to 'exitValue = 6'
+ JDK-8228448: Jconsole can't connect to itself
+ JDK-8228967: Trust/Key store and SSL context utilities for
tests
+ JDK-8229378: jdwp library loader in linker_md.c quietly
truncates on buffer overflow
+ JDK-8229815: Upgrade Jline to 3.12.1
+ JDK-8230000: some httpclients testng tests run zero test
+ JDK-8230002: javax/xml/jaxp/unittest/transform/
/SecureProcessingTest.java runs zero test
+ JDK-8230010: Remove jdk8037819/BasicTest1.java
+ JDK-8230094: CCE in createXMLEventWriter(Result) over an
arbitrary XMLStreamWriter
+ JDK-8230402: Allocation of compile task fails with assert:
'Leaking compilation tasks?'
+ JDK-8230767: FlightRecorderListener returns null recording
+ JDK-8230870: (zipfs) Add a ZIP FS test that is similar to
test/jdk/java/util/zip/EntryCount64k.java
+ JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
can be quicker for self thread
+ JDK-8231586: enlarge encoding space for OopMapValue offsets
+ JDK-8231953: Wrong assumption in assertion in
oop::register_oop
+ JDK-8231968: getCurrentThreadAllocatedBytes default
implementation s/b getThreadAllocatedBytes
+ JDK-8232083: Minimal VM is broken after JDK-8231586
+ JDK-8232161: Align some one-way conversion in MS950 charset
with Windows
+ JDK-8232855: jshell missing word in /help help
+ JDK-8233027: OopMapSet::all_do does oms.next() twice during
iteration
+ JDK-8233228: Disable weak named curves by default in TLS,
CertPath, and Signed JAR
+ JDK-8233386: Initialize NULL fields for unused decorations
+ JDK-8233452: java.math.BigDecimal.sqrt() with
RoundingMode.FLOOR results in incorrect result
+ JDK-8233686: XML transformer uses excessive amount of memory
+ JDK-8233741: AES Countermode (AES-CTR) optimization using
AVX512 + VAES instructions
+ JDK-8233829: javac cannot find non-ASCII module name under
non-UTF8 environment
+ JDK-8233958: Memory retention due to HttpsURLConnection
finalizer that serves no purpose
+ JDK-8234011: (zipfs) Memory leak in
ZipFileSystem.releaseDeflater()
+ JDK-8234058: runtime/CompressedOops/
/CompressedClassPointers.java fails with 'Narrow klass base:
0x0000000000000000' missing from stdout/stderr
+ JDK-8234149: Several regression tests do not dispose Frame at
end
+ JDK-8234347: 'Turkey' meta time zone does not generate
composed localized names
+ JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/
/bug6980209.java fails in linux nightly
+ JDK-8234535: Cross compilation fails due to missing CFLAGS
for the BUILD_CC
+ JDK-8234541: C1 emits an empty message when it inlines
successfully
+ JDK-8234687: change javap reporting on unknown attributes
+ JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK
11
+ JDK-8236548: Localized time zone name inconsistency between
English and other locales
+ JDK-8236617: jtreg test containers/docker/
/TestMemoryAwareness.java fails after 8226575
+ JDK-8237182: Update copyright header for shenandoah and
epsilon files
+ JDK-8237888: security/infra/java/security/cert/
/CertPathValidator/certification/LuxTrustCA.java fails when
checking validity interval
+ JDK-8237977: Further update
javax/net/ssl/compatibility/Compatibility.java
+ JDK-8238270: java.net HTTP/2 client does not decrease stream
count when receives 204 response
+ JDK-8238284: [macos] Zero VM build fails due to an obvious
typo
+ JDK-8238380: java.base/unix/native/libjava/childproc.c
'multiple definition' link errors with GCC10
+ JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c
'multiple definition' link errors with GCC10
+ JDK-8238388: libj2gss/NativeFunc.o 'multiple definition' link
errors with GCC10
+ JDK-8238448: RSASSA-PSS signature verification fail when
using certain odd key sizes
+ JDK-8238710: LingeredApp doesn't log stdout/stderr if exits
with non-zero code
+ JDK-8239083: C1 assert(known_holder == NULL ||
(known_holder->is_instance_klass() &&
(!known_holder->is_interface() ||
((ciInstanceKlass*)known_holder)->has_nonstatic_concrete_methods())),
'should be non-static concrete method');
+ JDK-8239385: KerberosTicket client name refers wrongly to
sAMAccountName in AD
+ JDK-8240169: javadoc fails to link to non-modular api docs
+ JDK-8240295: hs_err elapsed time in seconds is not accurate
enough
+ JDK-8240360: NativeLibraryEvent has wrong library name on
Linux
+ JDK-8240676: Meet not symmetric failure when running lucene
on jdk8
+ JDK-8241007: Shenandoah: remove
ShenandoahCriticalControlThreadPriority support
+ JDK-8241065: Shenandoah: remove leftover code after
JDK-8231086
+ JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is
failing on 32bit Windows
+ JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:
java.lang.NullPointerException
+ JDK-8241138: http.nonProxyHosts=* causes
StringIndexOutOfBoundsException in DefaultProxySelector
+ JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark
+ JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java
fails with OOME
+ JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure
+ JDK-8241750: x86_32 build failure after JDK-8227269
+ JDK-8242184: CRL generation error with RSASSA-PSS
+ JDK-8242283: Can't start JVM when java home path includes
non-ASCII character
+ JDK-8242556: Cannot load RSASSA-PSS public key with non-null
params from byte array
+ JDK-8243029: Rewrite javax/net/ssl/compatibility/
/Compatibility.java with a flexible interop test framework
+ JDK-8243138: Enhance BaseLdapServer to support starttls
extended request
+ JDK-8243320: Add SSL root certificates to Oracle Root CA
program
+ JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
program
+ JDK-8243389: enhance os::pd_print_cpu_info on linux
+ JDK-8243453: java --describe-module failed with non-ASCII
module name under non-UTF8 environment
+ JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp
+ JDK-8243489: Thread CPU Load event may contain wrong data for
CPU time under certain conditions
+ JDK-8243925: Toolkit#getScreenInsets() returns wrong value on
HiDPI screens (Windows)
+ JDK-8244087: 2020-04-24 public suffix list update
+ JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
release 1.8.26
+ JDK-8244164: AArch64: jaotc generates incorrect code for
compressed OOPs with non-zero heap base
+ JDK-8244196: adjust output in os_linux
+ JDK-8244225: stringop-overflow warning on strncpy call from
compile_the_world_in
+ JDK-8244287: JFR: Methods samples have line number 0
+ JDK-8244703: 'platform encoding not initialized' exceptions
with debugger, JNI
+ JDK-8244719: CTW: C2 compilation fails with
'assert(!VerifyHashTableKeys || _hash_lock == 0) failed:
remove node from hash table before modifying it'
+ JDK-8244729: Shenandoah: remove resolve paths from
SBSA::generate_shenandoah_lrb
+ JDK-8244763: Update --release 8 symbol information after JSR
337 MR3
+ JDK-8244818: Java2D Queue Flusher crash while moving
application window to external monitor
+ JDK-8245151: jarsigner should not raise duplicate warnings on
verification
+ JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9
+ JDK-8245714: 'Bad graph detected in build_loop_late' when
loads are pinned on loop limit check uncommon branch
+ JDK-8245801: StressRecompilation triggers assert 'redundunt
OSR recompilation detected. memory leak in CodeCache!'
+ JDK-8245832: JDK build make-static-libs should build all JDK
libraries
+ JDK-8245880: Shenandoah: check class unloading flag early in
concurrent code root scan
+ JDK-8245981: Upgrade to jQuery 3.5.1
+ JDK-8246027: Minimal fastdebug build broken after JDK-8245801
+ JDK-8246094: [macos] Sound Recording and playback is not
working
+ JDK-8246153: TestEliminateArrayCopy fails with
-XX:+StressReflectiveCode
+ JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
+ JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest
fails with AssertionError
+ JDK-8246203: Segmentation fault in verification due to stack
overflow with -XX:+VerifyIterativeGVN
+ JDK-8246330: Add TLS Tests for Legacy ECDSA curves
+ JDK-8246453: TestClone crashes with 'all collected exceptions
must come from the same place'
+ JDK-8247246: Add explicit ResolvedJavaType.link and expose
presence of default methods
+ JDK-8247350: [aarch64] assert(false) failed: wrong size of
mach node
+ JDK-8247502: PhaseStringOpts crashes while optimising
effectively dead code
+ JDK-8247615: Initialize the bytes left for the heap sampler
+ JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV
in SBC2Support::pin_and_expand
+ JDK-8247874: Replacement in VersionProps.java.template not
working when --with-vendor-bug-url contains '&'
+ JDK-8247979: aarch64: missing side effect of killing flags
for clearArray_reg_reg
+ JDK-8248214: Add paddings for TaskQueueSuper to reduce
false-sharing cache contention
+ JDK-8248219: aarch64: missing memory barrier in
fast_storefield and fast_accessfield
+ JDK-8248348: Regression caused by the update to BCEL 6.0
+ JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to
jtreg 5.1
+ JDK-8248495: [macos] zerovm is broken due to libffi headers
location
+ JDK-8248851: CMS: Missing memory fences between free chunk
check and klass read
+ JDK-8248987: AOT's Linker.java seems to eagerly fail-fast on
Windows
+ JDK-8249159: Downport test rework for SSLSocketTemplate from
8224650
+ JDK-8249215: JFrame::setVisible crashed with
-Dfile.encoding=UTF-8 on Japanese Windows.
+ JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is
not highlighted in GTKLookAndFeel
+ JDK-8249255: Build fails if source code in cygwin home dir
+ JDK-8249277: TestVerifyIterativeGVN.java is failing with
timeout in OpenJDK 11
+ JDK-8249278: Revert JDK-8226253 which breaks the spec of
AccessibleState.SHOWING for JList
+ JDK-8249560: Shenandoah: Fix racy GC request handling
+ JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle
+ JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should
account for corner cases
+ JDK-8250582: Revert Principal Name type to NT-UNKNOWN when
requesting TGS Kerberos tickets
+ JDK-8250609: C2 crash in IfNode::fold_compares
+ JDK-8250627: Use -XX:+/-UseContainerSupport for
enabling/disabling Java container metrics
+ JDK-8250755: Better cleanup for
jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java
+ JDK-8250787: Provider.put no longer registering aliases in
FIPS env
+ JDK-8250826: jhsdb does not work with coredump which comes
from Substrate VM
+ JDK-8250827: Shenandoah: needs to reset/finish StringTable's
dead count before/after parallel walk
+ JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check
the bounds
+ JDK-8251117: Cannot check P11Key size in P11Cipher and
P11AEADCipher
+ JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java
test failure
+ JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with
I-U
+ JDK-8251469: Better cleanup for
test/jdk/javax/imageio/SetOutput.java
+ JDK-8251487: Shenandoah: missing detail timing tracking for
final mark cleaning phase
+ JDK-8252120: compiler/oracle/TestCompileCommand.java
misspells 'occured'
+ JDK-8252157: JDK-8231209 11u backport breaks jmm binary
compatibility
+ JDK-8252258: [11u] JDK-8242154 changes the default vendor
+ JDK-8252804: [test] Fix 'ReleaseDeflater.java' test after
downport of 8234011
+ JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)
in JDK 11
+ JDK-8253283: [11u] Test build/translations/
/VerifyTranslations.java failing after JDK-8252258
+ JDK-8253813: Backout JDK-8244287 from 11u: it causes several
crashes
+ Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*,
bool)' introduced in jdk 11.0.9
Advisory ID
SUSE-RU-2020:3462-1
Released
Fri Nov 20 13:14:35 2020
Summary
Recommended update for pam and sudo
Type
recommended
Severity
moderate
References
1174593,1177858,1178727
Description:
This update for pam and sudo fixes the following issue:
pam:
pam_xauth: do not *free* a string which has been successfully passed to *putenv*. (bsc#1177858)
Initialize the local variable *daysleft* to avoid a misleading warning for password expire days. (bsc#1178727)
Run /usr/bin/xauth using the old user's and group's identifiers. (bsc#1174593)
sudo:
Fix a problem with pam_xauth which checks effective and real uids to get the real identity of the user. (bsc#1174593)
Advisory ID
SUSE-RU-2020:3620-1
Released
Thu Dec 3 17:03:55 2020
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
Description:
This update for pam fixes the following issues:
Check if the password is part of the username. (jsc#SLE-16719, jsc#SLE-16720)
- Check whether the password contains a substring of of the user's name of at least `` characters length in
some form. This is enabled by the new parameter `usersubstr=`
Advisory ID
SUSE-RU-2020:3791-1
Released
Mon Dec 14 17:39:19 2020
Summary
Recommended update for gzip
Type
recommended
Severity
moderate
References
Description:
This update for gzip fixes the following issue:
Enable `DFLTCC` (Deflate Conversion Call) compression for s390x for levels 1-6 to `CFLAGS`. (jsc#SLE-13775)
Enable by adding `-DDFLTCC_LEVEL_MASK=0x7e` to `CFLAGS`.
Advisory ID
SUSE-RU-2020:3942-1
Released
Tue Dec 29 12:22:01 2020
Summary
Recommended update for libidn2
Type
recommended
Severity
moderate
References
1180138
Description:
This update for libidn2 fixes the following issues:
The library is actually dual licensed, GPL-2.0-or-later or LGPL-3.0-or-later,
adjusted the RPM license tags (bsc#1180138)
Advisory ID
SUSE-RU-2021:179-1
Released
Wed Jan 20 13:38:51 2021
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
timezone update 2020f (bsc#1177460)
* 'make rearguard_tarballs' no longer generates a bad rearguard.zi,
fixing a 2020e bug.
timezone update 2020e (bsc#1177460)
* Volgograd switches to Moscow time on 2020-12-27 at 02:00.
timezone update 2020f (bsc#1177460)
* 'make rearguard_tarballs' no longer generates a bad rearguard.zi,
fixing a 2020e bug.
timezone update 2020e (bsc#1177460)
* Volgograd switches to Moscow time on 2020-12-27 at 02:00.
Advisory ID
SUSE-RU-2021:220-1
Released
Tue Jan 26 14:00:51 2021
Summary
Recommended update for keyutils
Type
recommended
Severity
moderate
References
1180603
Description:
This update for keyutils fixes the following issues:
Adjust the library license to be LPGL-2.1+ only (the tools are GPL2+, the library is just LGPL-2.1+) (bsc#1180603)
Advisory ID
SUSE-RU-2021:293-1
Released
Wed Feb 3 12:52:34 2021
Summary
Recommended update for gmp
Type
recommended
Severity
moderate
References
1180603
Description:
This update for gmp fixes the following issues:
correct license statements of packages (library itself is no GPL-3.0) (bsc#1180603)
Advisory ID
SUSE-RU-2021:301-1
Released
Thu Feb 4 08:46:27 2021
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
timezone update 2021a (bsc#1177460)
* South Sudan changes from +03 to +02 on 2021-02-01 at 00:00.
timezone update 2021a (bsc#1177460)
* South Sudan changes from +03 to +02 on 2021-02-01 at 00:00.
Advisory ID
SUSE-OU-2021:339-1
Released
Mon Feb 8 13:16:07 2021
Summary
Optional update for pam
Type
optional
Severity
low
References
Description:
This update for pam fixes the following issues:
Added rpm macros for this package, so that other packages can make use of it
This patch is optional to be installed - it doesn't fix any bugs.
Advisory ID
SUSE-SU-2021:352-1
Released
Tue Feb 9 15:02:05 2021
Summary
Security update for java-11-openjdk
Type
security
Severity
important
References
1181239
Description:
This update for java-11-openjdk fixes the following issues:
java-11-openjdk was upgraded to include January 2021 CPU (bsc#1181239)
Enable Sheandoah GC for x86_64 (jsc#ECO-3171)
Advisory ID
SUSE-RU-2021:761-1
Released
Wed Mar 10 12:26:54 2021
Summary
Recommended update for libX11
Type
recommended
Severity
moderate
References
1181963
Description:
This update for libX11 fixes the following issues:
- Fixes a race condition in 'libX11' that causes various applications to crash randomly. (bsc#1181963)
This update for MozillaFirefox fixes the following issues:
Firefox was updated to 78.9.0 ESR (MFSA 2021-11, bsc#1183942)
* CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
* CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
* CVE-2021-23984: Malicious extensions could have spoofed popup information
* CVE-2021-23987: Memory safety bugs
Advisory ID
SUSE-RU-2021:1018-1
Released
Tue Apr 6 14:29:13 2021
Summary
Recommended update for gzip
Type
recommended
Severity
moderate
References
1180713
Description:
This update for gzip fixes the following issues:
Fixes an issue when 'gzexe' counts the lines to skip wrong. (bsc#1180713)
Advisory ID
SUSE-RU-2021:1289-1
Released
Wed Apr 21 14:02:46 2021
Summary
Recommended update for gzip
Type
recommended
Severity
moderate
References
1177047
Description:
This update for gzip fixes the following issues:
Fixed a potential segfault when zlib acceleration is enabled (bsc#1177047)
Advisory ID
SUSE-SU-2021:1409-1
Released
Wed Apr 28 16:32:50 2021
Summary
Security update for giflib
Type
security
Severity
low
References
1184123
Description:
This update for giflib fixes the following issues:
Enable Position Independent Code and inherit CFLAGS from the build system (bsc#1184123).
This update for java-11-openjdk fixes the following issues:
Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)
* CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)
* CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)
moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto
with just java-11-openjdk-headless installed (bsc#1184606).
Advisory ID
SUSE-RU-2021:1643-1
Released
Wed May 19 13:51:48 2021
Summary
Recommended update for pam
Type
recommended
Severity
important
References
1181443,1184358,1185562
Description:
This update for pam fixes the following issues:
Fixed a bug, where the 'unlimited'/'-1' value was not interpreted correctly (bsc#1181443)
Fixed a bug, where pam_access interpreted the keyword 'LOCAL' incorrectly, leading to
an attempt to resolve it as a hostname (bsc#1184358)
In the 32-bit compatibility package for 64-bit architectures, require 'systemd-32bit' to be also installed as it contains pam_systemd.so for 32 bit applications. (bsc#1185562)
Advisory ID
SUSE-SU-2021:1765-1
Released
Wed May 26 12:36:38 2021
Summary
Security update for libX11
Type
security
Severity
moderate
References
1182506,CVE-2021-31535
Description:
This update for libX11 fixes the following issues:
CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
Advisory ID
SUSE-RU-2021:1861-1
Released
Fri Jun 4 09:59:40 2021
Summary
Recommended update for gcc10
Type
recommended
Severity
moderate
References
1029961,1106014,1178577,1178624,1178675,1182016
Description:
This update for gcc10 fixes the following issues:
Disable nvptx offloading for aarch64 again since it doesn't work
Fixed a build failure issue. (bsc#1182016)
Fix for memory miscompilation on 'aarch64'. (bsc#1178624, bsc#1178577)
Fix 32bit 'libgnat.so' link. (bsc#1178675)
prepare usrmerge: Install libgcc_s into %_libdir. ABI wise it stays /%lib. (bsc#1029961)
Build complete set of multilibs for arm-none target. (bsc#1106014)
Advisory ID
SUSE-SU-2021:1897-1
Released
Tue Jun 8 16:15:17 2021
Summary
Security update for libX11
Type
security
Severity
important
References
1186643,CVE-2021-31535
Description:
This update for libX11 fixes the following issues:
Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
Advisory ID
SUSE-RU-2021:1935-1
Released
Thu Jun 10 10:45:09 2021
Summary
Recommended update for gzip
Type
recommended
Severity
moderate
References
1186642
Description:
This update for gzip fixes the following issue:
gzip had a lower release number in 15 sp2 and sp3 than in 15 sp1, which could lead
to migration issues. (bsc#1186642)
Advisory ID
SUSE-RU-2021:1937-1
Released
Thu Jun 10 10:47:09 2021
Summary
Recommended update for nghttp2
Type
recommended
Severity
moderate
References
1186642
Description:
This update for nghttp2 fixes the following issue:
The (lib)nghttp2 packages had a lower release number in SUSE Linux Enterprise 15 sp2 and sp3 than in 15 sp1, which could lead
to migration issues. (bsc#1186642)
Advisory ID
SUSE-RU-2021:2173-1
Released
Mon Jun 28 14:59:45 2021
Summary
Recommended update for automake
Type
recommended
Severity
moderate
References
1040589,1047218,1182604,1185540,1186049
Description:
This update for automake fixes the following issues:
Add fix to avoid date variations in docs. (bsc#1047218, jsc#SLE-17848)
Avoid bashisms in test-driver script. (bsc#1185540)
This update for pcre fixes the following issues:
Do not run profiling 'check' in parallel to make package build reproducible. (bsc#1040589)
This update for brp-check-suse fixes the following issues:
Add fixes to support reproducible builds. (bsc#1186049)
Advisory ID
SUSE-RU-2021:2193-1
Released
Mon Jun 28 18:38:43 2021
Summary
Recommended update for tar
Type
recommended
Severity
moderate
References
1184124
Description:
This update for tar fixes the following issues:
Link '/var/lib/tests/tar/bin/genfile' as Position-Independent Executable (bsc#1184124)
Advisory ID
SUSE-SU-2021:2196-1
Released
Tue Jun 29 09:41:39 2021
Summary
Security update for lua53
Type
security
Severity
moderate
References
1175448,1175449,CVE-2020-24370,CVE-2020-24371
Description:
This update for lua53 fixes the following issues:
Update to version 5.3.6:
CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
Long brackets with a huge number of '=' overflow some internal buffer arithmetic.
This update for sqlite3 fixes the following issues:
Update to version 3.36.0
CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
optimization (bsc#1173641)
CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
isAuxiliaryVtabOperator (bsc#1164719)
CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
dereference (bsc#1160309)
CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)
CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
(bsc#1159491)
CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
a shadow table name (bsc#1158960)
CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
columns (bsc#1158959)
CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
in conjunction with ALTER TABLE statements (bsc#1158958)
CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
which allows attackers to cause a denial of service (bsc#1158812)
CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
Advisory ID
SUSE-RU-2021:2573-1
Released
Thu Jul 29 14:21:52 2021
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1188127
Description:
This update for timezone fixes the following issue:
From systemd v249: when enumerating time zones the timedatectl tool will now consult the 'tzdata.zi' file shipped by
the IANA time zone database package, in addition to 'zone1970.tab', as before. This makes sure time zone aliases are
now correctly supported. This update adds the 'tzdata.zi' file (bsc#1188127).
Changed default package verification level to 'none' to be compatible to rpm-4.14.1
Made illegal obsoletes a warning
Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
Added support for enforcing signature policy and payload verification step to
transactions (jsc#SLE-17817)
Added :humansi and :hmaniec query formatters for human readable output
Added query selectors for whatobsoletes and whatconflicts
Added support for sorting caret higher than base version
rpm does no longer require the signature header to be in a contiguous
region when signing (bsc#1181805)
Security fixes:
CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an
attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM
repository, to cause RPM database corruption. The highest threat from this vulnerability is to
data integrity (bsc#1183543)
CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.
This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,
whose signature header was modified, to cause RPM database corruption and execute code. The highest
threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)
CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker
who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability
is to system availability.
bmo#1690421 - Adjust 3.62 ABI report formatting for new libabigail
bmo#1690421 - Install packaged libabigail in docker-builds image
bmo#1689228 - Minor ECH -09 fixes for interop testing, fuzzing
bmo#1674819 - Fixup a51fae403328, enum type may be signed
bmo#1681585 - Add ECH support to selfserv
bmo#1681585 - Update ECH to Draft-09
bmo#1678398 - Add Export/Import functions for HPKE context
bmo#1678398 - Update HPKE to draft-07
update to NSS 3.61
bmo#1682071 - Fix issue with IKE Quick mode deriving incorrect key
values under certain conditions.
bmo#1684300 - Fix default PBE iteration count when NSS is compiled
with NSS_DISABLE_DBM.
bmo#1651411 - Improve constant-timeness in RSA operations.
bmo#1677207 - Upgrade Google Test version to latest release.
bmo#1654332 - Add aarch64-make target to nss-try.
Update to NSS 3.60.1:
Notable changes in NSS 3.60:
TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support
has been added, replacing the previous ESNI (draft-ietf-tls-esni-01)
implementation. See bmo#1654332 for more information.
December 2020 batch of Root CA changes, builtins library updated
to version 2.46. See bmo#1678189, bmo#1678166, and bmo#1670769
for more information.
Update to NSS 3.59.1:
bmo#1679290 - Fix potential deadlock with certain third-party
PKCS11 modules
Update to NSS 3.59:
Notable changes:
Exported two existing functions from libnss:
CERT_AddCertToListHeadWithData and CERT_AddCertToListTailWithData
Bugfixes
bmo#1607449 - Lock cert->nssCertificate to prevent a potential data race
bmo#1672823 - Add Wycheproof test cases for HMAC, HKDF, and DSA
bmo#1663661 - Guard against NULL token in nssSlot_IsTokenPresent
bmo#1670835 - Support enabling and disabling signatures via Crypto Policy
bmo#1672291 - Resolve libpkix OCSP failures on SHA1 self-signed
root certs when SHA1 signatures are disabled.
bmo#1644209 - Fix broken SelectedCipherSuiteReplacer filter to
solve some test intermittents
bmo#1672703 - Tolerate the first CCS in TLS 1.3 to fix a regression in
our CVE-2020-25648 fix that broke purple-discord
(boo#1179382)
bmo#1666891 - Support key wrap/unwrap with RSA-OAEP
bmo#1667989 - Fix gyp linking on Solaris
bmo#1668123 - Export CERT_AddCertToListHeadWithData and
CERT_AddCertToListTailWithData from libnss
bmo#1634584 - Set CKA_NSS_SERVER_DISTRUST_AFTER for Trustis FPS Root CA
bmo#1663091 - Remove unnecessary assertions in the streaming
ASN.1 decoder that affected decoding certain PKCS8
private keys when using NSS debug builds
bmo#670839 - Use ARM crypto extension for AES, SHA1 and SHA2 on MacOS.
update to NSS 3.58
Bugs fixed:
bmo#1641480 (CVE-2020-25648)
Tighten CCS handling for middlebox compatibility mode.
bmo#1631890 - Add support for Hybrid Public Key Encryption
(draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello
(draft-ietf-tls-esni).
bmo#1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto
extensions.
bmo#1668328 - Handle spaces in the Python path name when using
gyp on Windows.
bmo#1667153 - Add PK11_ImportDataKey for data object import.
bmo#1665715 - Pass the embedded SCT list extension (if present)
to TrustDomain::CheckRevocation instead of the notBefore value.
update to NSS 3.57
The following CA certificates were Added:
bmo#1663049 - CN=Trustwave Global Certification Authority
SHA-256 Fingerprint: 97552015F5DDFC3C8788C006944555408894450084F100867086BC1A2BB58DC8
bmo#1663049 - CN=Trustwave Global ECC P256 Certification Authority
SHA-256 Fingerprint: 945BBC825EA554F489D1FD51A73DDF2EA624AC7019A05205225C22A78CCFA8B4
bmo#1663049 - CN=Trustwave Global ECC P384 Certification Authority
SHA-256 Fingerprint: 55903859C8C0C3EBB8759ECE4E2557225FF5758BBD38EBD48276601E1BD58097
The following CA certificates were Removed:
bmo#1651211 - CN=EE Certification Centre Root CA
SHA-256 Fingerprint: 3E84BA4342908516E77573C0992F0979CA084E4685681FF195CCBA8A229B8A76
bmo#1656077 - O=Government Root Certification Authority; C=TW
SHA-256 Fingerprint: 7600295EEFE85B9E1FD624DB76062AAAAE59818A54D2774CD4C0B2C01131E1B3
Trust settings for the following CA certificates were Modified:
bmo#1653092 - CN=OISTE WISeKey Global Root GA CA
Websites (server authentication) trust bit removed.
bmo#1650702 - Support SHA-1 HW acceleration on ARMv8
bmo#1656981 - Use MPI comba and mulq optimizations on x86-64 MacOS.
bmo#1654142 - Add CPU feature detection for Intel SHA extension.
bmo#1648822 - Add stricter validation of DH keys in FIPS mode.
bmo#1656986 - Properly detect arm64 during GYP build architecture
detection.
bmo#1652729 - Add build flag to disable RC2 and relocate to
lib/freebl/deprecated.
bmo#1656429 - Correct RTT estimate used in 0-RTT anti-replay.
bmo#1588941 - Send empty certificate message when scheme selection
fails.
bmo#1652032 - Fix failure to build in Windows arm64 makefile
cross-compilation.
bmo#1625791 - Fix deadlock issue in nssSlot_IsTokenPresent.
bmo#1653975 - Fix 3.53 regression by setting 'all' as the default
makefile target.
bmo#1659792 - Fix broken libpkix tests with unexpired PayPal cert.
bmo#1659814 - Fix interop.sh failures with newer tls-interop
commit and dependencies.
bmo#1656519 - NSPR dependency updated to 4.28
update to NSS 3.55
Notable changes
P384 and P521 elliptic curve implementations are replaced with
verifiable implementations from Fiat-Crypto [0] and ECCKiila [1].
PK11_FindCertInSlot is added. With this function, a given slot
can be queried with a DER-Encoded certificate, providing performance
and usability improvements over other mechanisms. (bmo#1649633)
DTLS 1.3 implementation is updated to draft-38. (bmo#1647752)
Relevant Bugfixes
bmo#1631583 (CVE-2020-6829, CVE-2020-12400) - Replace P384 and
P521 with new, verifiable implementations from Fiat-Crypto and ECCKiila.
bmo#1649487 - Move overzealous assertion in VFY_EndWithSignature.
bmo#1636771 (CVE-2020-12403) - Explicitly disable multi-part
ChaCha20 (which was not functioning correctly) and more strictly
enforce tag length.
bmo#1649648 - Don't memcpy zero bytes (sanitizer fix).
bmo#1649316 - Don't memcpy zero bytes (sanitizer fix).
bmo#1649322 - Don't memcpy zero bytes (sanitizer fix).
bmo#1653202 - Fix initialization bug in blapitest when compiled
with NSS_DISABLE_DEPRECATED_SEED.
bmo#1646594 - Fix AVX2 detection in makefile builds.
bmo#1649633 - Add PK11_FindCertInSlot to search a given slot
for a DER-encoded certificate.
bmo#1651520 - Fix slotLock race in NSC_GetTokenInfo.
bmo#1647752 - Update DTLS 1.3 implementation to draft-38.
bmo#1649190 - Run cipher, sdr, and ocsp tests under standard test cycle in CI.
bmo#1649226 - Add Wycheproof ECDSA tests.
bmo#1637222 - Consistently enforce IV requirements for DES and 3DES.
bmo#1067214 - Enforce minimum PKCS#1 v1.5 padding length in
RSA_CheckSignRecover.
bmo#1646324 - Advertise PKCS#1 schemes for certificates in the
signature_algorithms extension.
update to NSS 3.54
Notable changes
Support for TLS 1.3 external pre-shared keys (bmo#1603042).
Use ARM Cryptography Extension for SHA256, when available
(bmo#1528113)
The following CA certificates were Added:
bmo#1645186 - certSIGN Root CA G2.
bmo#1645174 - e-Szigno Root CA 2017.
bmo#1641716 - Microsoft ECC Root Certificate Authority 2017.
bmo#1641716 - Microsoft RSA Root Certificate Authority 2017.
The following CA certificates were Removed:
bmo#1645199 - AddTrust Class 1 CA Root.
bmo#1645199 - AddTrust External CA Root.
bmo#1641718 - LuxTrust Global Root 2.
bmo#1639987 - Staat der Nederlanden Root CA - G2.
bmo#1618402 - Symantec Class 2 Public Primary Certification Authority - G4.
bmo#1618402 - Symantec Class 1 Public Primary Certification Authority - G4.
bmo#1618402 - VeriSign Class 3 Public Primary Certification Authority - G3.
A number of certificates had their Email trust bit disabled.
See bmo#1618402 for a complete list.
Bugs fixed
bmo#1528113 - Use ARM Cryptography Extension for SHA256.
bmo#1603042 - Add TLS 1.3 external PSK support.
bmo#1642802 - Add uint128 support for HACL* curve25519 on Windows.
bmo#1645186 - Add 'certSIGN Root CA G2' root certificate.
bmo#1645174 - Add Microsec's 'e-Szigno Root CA 2017' root certificate.
This update for gcc11 fixes the following issues:
The additional GNU compiler collection GCC 11 is provided:
To select these compilers install the packages:
gcc11
gcc-c++11
and others with 11 prefix.
to select them for building:
CC='gcc-11'
CXX='g++-11'
The compiler baselibraries (libgcc_s1, libstdc++6 and others) are being replaced by the GCC 11 variants.
Advisory ID
SUSE-RU-2021:3872-1
Released
Thu Dec 2 07:25:55 2021
Summary
Recommended update for cracklib
Type
recommended
Severity
moderate
References
1191736
Description:
This update for cracklib fixes the following issues:
Enable build time tests (bsc#1191736)
Advisory ID
SUSE-RU-2021:3883-1
Released
Thu Dec 2 11:47:07 2021
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
Update timezone to 2021e (bsc#1177460)
Palestine will fall back 10-29 (not 10-30) at 01:00
Fiji suspends DST for the 2021/2022 season
'zic -r' marks unspecified timestamps with '-00'
Fix a bug in 'zic -b fat' that caused old timestamps to be mishandled in 32-bit-only readers
Refresh timezone info for china
Advisory ID
SUSE-RU-2021:3891-1
Released
Fri Dec 3 10:21:49 2021
Summary
Recommended update for keyutils
Type
recommended
Severity
moderate
References
1029961,1113013,1187654
Description:
This update for keyutils fixes the following issues:
Add /etc/keys/ and /usr/etc/keys/ directory (bsc#1187654)
keyutils was updated to 1.6.3 (jsc#SLE-20016):
Revert the change notifications that were using /dev/watch_queue.
Apply the change notifications that use pipe2(O_NOTIFICATION_PIPE).
Allow 'keyctl supports' to retrieve raw capability data.
Allow 'keyctl id' to turn a symbolic key ID into a numeric ID.
Allow 'keyctl new_session' to name the keyring.
Allow 'keyctl add/padd/etc.' to take hex-encoded data.
Add 'keyctl watch*' to expose kernel change notifications on keys.
Add caps for namespacing and notifications.
Set a default TTL on keys that upcall for name resolution.
Explicitly clear memory after it's held sensitive information.
Various manual page fixes.
Fix C++-related errors.
Add support for keyctl_move().
Add support for keyctl_capabilities().
Make key=val list optional for various public-key ops.
Fix system call signature for KEYCTL_PKEY_QUERY.
Fix 'keyctl pkey_query' argument passing.
Use keyctl_read_alloc() in dump_key_tree_aux().
Various manual page fixes.
Updated to 1.6:
Apply various specfile cleanups from Fedora.
request-key: Provide a command line option to suppress helper execution.
request-key: Find least-wildcard match rather than first match.
Remove the dependency on MIT Kerberos.
Fix some error messages
keyctl_dh_compute.3: Suggest /proc/crypto for list of available hashes.
Fix doc and comment typos.
Add public key ops for encrypt, decrypt, sign and verify (needs linux-4.20).
Add pkg-config support for finding libkeyutils.
upstream isn't offering PGP signatures for the source tarballs anymore
Updated to 1.5.11 (bsc#1113013)
Add keyring restriction support.
Add KDF support to the Diffie-Helman function.
DNS: Add support for AFS config files and SRV records
Advisory ID
SUSE-SU-2021:3942-1
Released
Mon Dec 6 14:46:05 2021
Summary
Security update for brotli
Type
security
Severity
moderate
References
1175825,CVE-2020-8927
Description:
This update for brotli fixes the following issues:
CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).
Advisory ID
SUSE-SU-2021:3946-1
Released
Mon Dec 6 14:57:42 2021
Summary
Security update for gmp
Type
security
Severity
moderate
References
1192717,CVE-2021-43618
Description:
This update for gmp fixes the following issues:
CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
Advisory ID
SUSE-RU-2021:3980-1
Released
Thu Dec 9 16:42:19 2021
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1191592
Description:
glibc was updated to fix the following issue:
Support for new IBM Z Hardware (bsc#1191592, jsc#IBM-869)
Make %_modprobedir point to /lib/modprobe.d (bsc#1196275, bsc#1196406)
Advisory ID
SUSE-RU-2022:1033-1
Released
Tue Mar 29 18:42:05 2022
Summary
Recommended update for java-11-openjdk
Type
recommended
Severity
moderate
References
Description:
This update for java-11-openjdk fixes the following issues:
Build failure on Solaris.
Unable to connect to https://google.com using java.net.HttpClient.
Advisory ID
SUSE-RU-2022:1047-1
Released
Wed Mar 30 16:20:56 2022
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1196093,1197024
Description:
This update for pam fixes the following issues:
Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.
This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)
Advisory ID
SUSE-RU-2022:1118-1
Released
Tue Apr 5 18:34:06 2022
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
timezone update 2022a (bsc#1177460):
* Palestine will spring forward on 2022-03-27, not on 03-26
* `zdump -v` now outputs better failure indications
* Bug fixes for code that reads corrupted TZif data
Advisory ID
SUSE-SU-2022:1158-1
Released
Tue Apr 12 14:44:43 2022
Summary
Security update for xz
Type
security
Severity
important
References
1198062,CVE-2022-1271
Description:
This update for xz fixes the following issues:
CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
Advisory ID
SUSE-RU-2022:1281-1
Released
Wed Apr 20 12:26:38 2022
Summary
Recommended update for libtirpc
Type
recommended
Severity
moderate
References
1196647
Description:
This update for libtirpc fixes the following issues:
Add option to enforce connection via protocol version 2 first (bsc#1196647)
Advisory ID
SUSE-RU-2022:1374-1
Released
Mon Apr 25 15:02:13 2022
Summary
Recommended update for openldap2
Type
recommended
Severity
moderate
References
1191157,1197004
Description:
This update for openldap2 fixes the following issues:
allow specification of max/min TLS version with TLS1.3 (bsc#1191157)
libldap was able to be out of step with openldap in some cases which could cause incorrect installations and symbol
resolution failures. openldap2 and libldap now are locked to their related release versions. (bsc#1197004)
restore CLDAP functionality in CLI tools (jsc#PM-3288)
Advisory ID
SUSE-RU-2022:1409-1
Released
Tue Apr 26 12:54:57 2022
Summary
Recommended update for gcc11
Type
recommended
Severity
moderate
References
1195628,1196107
Description:
This update for gcc11 fixes the following issues:
Add a list of Obsoletes to libstdc++6-pp-gcc11 so updates from
packages provided by older GCC work. Add a requires from that
package to the corresponding libstc++6 package to keep those
at the same version. [bsc#1196107]
Fixed memory corruption when creating dependences with the D language frontend.
Add gcc11-PIE, similar to gcc-PIE but affecting gcc11 [bsc#1195628]
Put libstdc++6-pp Requires on the shared library and drop
to Recommends.
Advisory ID
SUSE-RU-2022:1451-1
Released
Thu Apr 28 10:47:22 2022
Summary
Recommended update for perl
Type
recommended
Severity
moderate
References
1193489
Description:
This update for perl fixes the following issues:
Fix Socket::VERSION evaluation and stabilize Socket:VERSION comparisons (bsc#1193489)
CVE-2021-20193: Fixed a memory leak in read_header() in list.c (bsc#1181131).
CVE-2019-9923: Fixed a null-pointer dereference in pax_decode_header in sparse.c (bsc#1130496).
CVE-2018-20482: Fixed infinite read loop in sparse_dump_region in sparse.c (bsc#1120610).
Update to GNU tar 1.34:
* Fix extraction over pipe
* Fix memory leak in read_header (CVE-2021-20193) (bsc#1181131)
* Fix extraction when . and .. are unreadable
* Gracefully handle duplicate symlinks when extracting
* Re-initialize supplementary groups when switching to user
privileges
Update to GNU tar 1.33:
* POSIX extended format headers do not include PID by default
* --delay-directory-restore works for archives with reversed
member ordering
* Fix extraction of a symbolic link hardlinked to another
symbolic link
* Wildcards in exclude-vcs-ignore mode don't match slash
* Fix the --no-overwrite-dir option
* Fix handling of chained renames in incremental backups
* Link counting works for file names supplied with -T
* Accept only position-sensitive (file-selection) options in file
list files
prepare usrmerge (bsc#1029961)
Update to GNU 1.32
* Fix the use of --checkpoint without explicit --checkpoint-action
* Fix extraction with the -U option
* Fix iconv usage on BSD-based systems
* Fix possible NULL dereference (savannah bug #55369)
[bsc#1130496] [CVE-2019-9923]
* Improve the testsuite
Update to GNU 1.31
* Fix heap-buffer-overrun with --one-top-level, bug introduced
with the addition of that option in 1.28
* Support for zstd compression
* New option '--zstd' instructs tar to use zstd as compression
program. When listing, extractng and comparing, zstd compressed
archives are recognized automatically. When '-a' option is in
effect, zstd compression is selected if the destination archive
name ends in '.zst' or '.tzst'.
* The -K option interacts properly with member names given in the
command line. Names of members to extract can be specified along
with the '-K NAME' option. In this case, tar will extract NAME
and those of named members that appear in the archive after it,
which is consistent with the semantics of the option. Previous
versions of tar extracted NAME, those of named members that
appeared before it, and everything after it.
* Fix CVE-2018-20482 - When creating archives with the --sparse
option, previous versions of tar would loop endlessly if a
sparse file had been truncated while being archived.
This update for giflib fixes the following issues:
CVE-2019-15133: Fixed a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero (bsc#1146299).
CVE-2018-11490: Fixed a heap-based buffer overflow in DGifDecompressLine function in dgif_lib.c (bsc#1094832).
CVE-2016-3977: Fixed a heap buffer overflow in gif2rgb (bsc#974847).
Update to version 5.2.1
* In gifbuild.c, avoid a core dump on no color map.
* Restore inadvertently removed library version numbers in Makefile.
Changes in version 5.2.0
* The undocumented and deprecated GifQuantizeBuffer() entry point
has been moved to the util library to reduce libgif size and attack
surface. Applications needing this function are couraged to link the
util library or make their own copy.
* The following obsolete utility programs are no longer installed:
gifecho, giffilter, gifinto, gifsponge. These were either installed in
error or have been obsolesced by modern image-transformmation tools
like ImageMagick convert. They may be removed entirely in a future
release.
* Address SourceForge issue #136: Stack-buffer-overflow in gifcolor.c:84
* Address SF bug #134: Giflib fails to slurp significant number of gifs
* Apply SPDX convention for license tagging.
Changes in version 5.1.9
* The documentation directory now includes an HTMlified version of the
GIF89 standard, and a more detailed description of how LZW compression
is applied to GIFs.
* Address SF bug #129: The latest version of giflib cannot be build on windows.
* Address SF bug #126: Cannot compile giflib using c89
Changes in version 5.1.8
* Address SF bug #119: MemorySanitizer: FPE on unknown address (CVE-2019-15133 bsc#1146299)
* Address SF bug #125: 5.1.7: xmlto is still required for tarball
* Address SF bug #124: 5.1.7: ar invocation is not crosscompile compatible
* Address SF bug #122: 5.1.7 installs manpages to wrong directory
* Address SF bug #121: make: getversion: Command not found
* Address SF bug #120: 5.1.7 does not build a proper library - no
Changes in version 5.1.7
* Correct a minor packaging error (superfluous symlinks) in the 5.1.6 tarballs.
Changes in version 5.1.6
* Fix library installation in the Makefile.
Changes in version 5.1.5
* Fix SF bug #114: Null dereferences in main() of gifclrmp
* Fix SF bug #113: Heap Buffer Overflow-2 in function DGifDecompressLine()
in cgif.c. This had been assigned (CVE-2018-11490 bsc#1094832).
* Fix SF bug #111: segmentation fault in PrintCodeBlock
* Fix SF bug #109: Segmentation fault of giftool reading a crafted file
* Fix SF bug #107: Floating point exception in giftext utility
* Fix SF bug #105: heap buffer overflow in DumpScreen2RGB in gif2rgb.c:317
* Fix SF bug #104: Ineffective bounds check in DGifSlurp
* Fix SF bug #103: GIFLIB 5.1.4: DGifSlurp fails on empty comment
* Fix SF bug #87: Heap buffer overflow in 5.1.2 (gif2rgb). (CVE-2016-3977 bsc#974847)
* The horrible old autoconf build system has been removed with extreme prejudice.
You now build this simply by running 'make' from the top-level directory.
The following non-security bugs were fixed:
build path independent objects and inherit CFLAGS from the build system (bsc#1184123)
Advisory ID
SUSE-SU-2022:1617-1
Released
Tue May 10 14:40:12 2022
Summary
Security update for gzip
Type
security
Severity
important
References
1198062,1198922,CVE-2022-1271
Description:
This update for gzip fixes the following issues:
CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)
Advisory ID
SUSE-RU-2022:1655-1
Released
Fri May 13 15:36:10 2022
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
1197794
Description:
This update for pam fixes the following issue:
Do not include obsolete header files (bsc#1197794)
Advisory ID
SUSE-RU-2022:1658-1
Released
Fri May 13 15:40:20 2022
Summary
Recommended update for libpsl
Type
recommended
Severity
important
References
1197771
Description:
This update for libpsl fixes the following issues:
Fix libpsl compilation issues (bsc#1197771)
Advisory ID
SUSE-SU-2022:1670-1
Released
Mon May 16 10:06:30 2022
Summary
Security update for openldap2
Type
security
Severity
important
References
1199240,CVE-2022-29155
Description:
This update for openldap2 fixes the following issues:
CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
Advisory ID
SUSE-SU-2022:1718-1
Released
Tue May 17 17:44:43 2022
Summary
Security update for e2fsprogs
Type
security
Severity
important
References
1198446,CVE-2022-1304
Description:
This update for e2fsprogs fixes the following issues:
CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
and possibly arbitrary code execution. (bsc#1198446)
Advisory ID
SUSE-RU-2022:1887-1
Released
Tue May 31 09:24:18 2022
Summary
Recommended update for grep
Type
recommended
Severity
moderate
References
1040589
Description:
This update for grep fixes the following issues:
Make profiling deterministic. (bsc#1040589, SLE-24115)
Advisory ID
SUSE-RU-2022:1899-1
Released
Wed Jun 1 10:43:22 2022
Summary
Recommended update for libtirpc
Type
recommended
Severity
important
References
1198176
Description:
This update for libtirpc fixes the following issues:
Add a check for nullpointer in check_address to prevent client from crashing (bsc#1198176)
Advisory ID
SUSE-RU-2022:1909-1
Released
Wed Jun 1 16:25:35 2022
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1198751
Description:
This update for glibc fixes the following issues:
Add the correct name for the IBM Z16 (bsc#1198751).
Advisory ID
SUSE-RU-2022:2019-1
Released
Wed Jun 8 16:50:07 2022
Summary
Recommended update for gcc11
Type
recommended
Severity
moderate
References
1192951,1193659,1195283,1196861,1197065
Description:
This update for gcc11 fixes the following issues:
Update to the GCC 11.3.0 release.
includes SLS hardening backport on x86_64. [bsc#1195283]
includes change to adjust gnats idea of the target, fixing the build of gprbuild. [bsc#1196861]
fixed miscompile of embedded premake in 0ad on i586. [bsc#1197065]
use --with-cpu rather than specifying --with-arch/--with-tune
Fix D memory corruption in -M output.
Fix ICE in is_this_parameter with coroutines. [bsc#1193659]
fixes issue with debug dumping together with -o /dev/null
fixes libgccjit issue showing up in emacs build [bsc#1192951]
This update for systemd fixes the following issues:
Make {/etc,/usr/lib}/systemd/network owned by both udev and systemd-network. The configuration files put in these
directories are read by both udevd and systemd-networkd (bsc#1201276)
Allow control characters in environment variable values (bsc#1200170)
Fix issues with multipath setup (bsc#1137373, bsc#1181658, bsc#1194708, bsc#1195157, bsc#1197570)
Fix parsing error in s390 udev rules conversion script (bsc#1198732)
core/device: device_coldplug(): don't set DEVICE_DEAD
core/device: do not downgrade device state if it is already enumerated
core/device: drop unnecessary condition
Advisory ID
SUSE-RU-2022:2493-1
Released
Thu Jul 21 14:35:08 2022
Summary
Recommended update for rpm-config-SUSE
Type
recommended
Severity
moderate
References
1193282
Description:
This update for rpm-config-SUSE fixes the following issues:
Add SBAT values macros for other packages (bsc#1193282)
Advisory ID
SUSE-RU-2022:2494-1
Released
Thu Jul 21 15:16:42 2022
Summary
Recommended update for glibc
Type
recommended
Severity
important
References
1200855,1201560,1201640
Description:
This update for glibc fixes the following issues:
Remove tunables from static tls surplus patch which caused crashes (bsc#1200855)
i386: Disable check_consistency for GCC 5 and above (bsc#1201640, BZ #25788)
This update for ncurses fixes the following issues:
CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).
Advisory ID
SUSE-RU-2022:2735-1
Released
Wed Aug 10 04:31:41 2022
Summary
Recommended update for tar
Type
recommended
Severity
moderate
References
1200657
Description:
This update for tar fixes the following issues:
Fix race condition while creating intermediate subdirectories (bsc#1200657)
Advisory ID
SUSE-RU-2022:2796-1
Released
Fri Aug 12 14:34:31 2022
Summary
Recommended update for jitterentropy
Type
recommended
Severity
moderate
References
Description:
This update for jitterentropy fixes the following issues:
jitterentropy is included in version 3.4.0 (jsc#SLE-24941):
This is a FIPS 140-3 / NIST 800-90b compliant userspace jitter entropy generator library,
used by other FIPS libraries.
Advisory ID
SUSE-RU-2022:2844-1
Released
Thu Aug 18 14:41:25 2022
Summary
Recommended update for tar
Type
recommended
Severity
important
References
1202436
Description:
This update for tar fixes the following issues:
A regression in a previous update lead to potential deadlocks when extracting an archive. (bsc#1202436)
Advisory ID
SUSE-RU-2022:2901-1
Released
Fri Aug 26 03:34:23 2022
Summary
Recommended update for elfutils
Type
recommended
Severity
moderate
References
Description:
This update for elfutils fixes the following issues:
Fix runtime dependency for devel package
Advisory ID
SUSE-RU-2022:2904-1
Released
Fri Aug 26 05:28:34 2022
Summary
Recommended update for openldap2
Type
recommended
Severity
moderate
References
1198341
Description:
This update for openldap2 fixes the following issues:
Prevent memory reuse which may lead to instability (bsc#1198341)
Advisory ID
SUSE-RU-2022:2920-1
Released
Fri Aug 26 15:17:02 2022
Summary
Recommended update for systemd
Type
recommended
Severity
important
References
1195059,1201795
Description:
This update for systemd fixes the following issues:
Don't replace /etc/systemd/system/tmp.mount symlink with a dangling one pointing to /usr/lib/systemd/ (bsc#1201795)
Drop or soften some of the deprecation warnings (jsc#PED-944)
Ensure root user can login even if systemd-user-sessions.service is not activated yet (bsc#1195059)
Avoid applying presets to any services shipped by the experimental sub-package, as they aren't enabled by default
analyze: Fix offline check for syscal filter
calendarspec: Fix timer skipping the next elapse
core: Allow command argument to be longer
hwdb: Add AV production controllers to hwdb and add uaccess
hwdb: Allow console users access to rfkill
hwdb: Allow end-users root-less access to TL866 EPROM readers
hwdb: Permit unsetting power/persist for USB devices
hwdb: Tag IR cameras as such
hwdb: Fix parsing issue
hwdb: Make usb match patterns uppercase
hwdb: Update the hardware database
journal-file: Stop using the event loop if it's already shutting down
journal-remote: Disable `--trust` option when gnutls is disabled and check_permission() should not be called
journald: Ensure resources are properly allocated for SIGTERM handling
kernel-install: Ensure modules.builtin.alias.bin is removed when no longer needed
macro: Account for negative values in DECIMAL_STR_WIDTH()
manager: Disallow clone3() function call in seccomp filters
missing-syscall: Define MOVE_MOUNT_T_EMPTY_PATH if missing
pid1,cgroup-show: Prevent failure if cgroup.procs in some subcgroups is not readable
resolve: Fix typo in dns_class_is_pseudo()
sd-event: Improve handling of process events and termination of processes
sd-ipv4acd: Fix ARP packet conflicts occurring when sender hardware is one of the host's interfaces
stdio-bridge: Improve the meaning of the error message
tmpfiles: Check for the correct directory
Advisory ID
SUSE-RU-2022:2929-1
Released
Mon Aug 29 11:21:47 2022
Summary
Recommended update for timezone
Type
recommended
Severity
important
References
1202310
Description:
This update for timezone fixes the following issue:
Reflect new Chile DST change (bsc#1202310)
Advisory ID
SUSE-RU-2022:2939-1
Released
Mon Aug 29 14:49:17 2022
Summary
Recommended update for mozilla-nss
Type
recommended
Severity
moderate
References
1201298,1202645
Description:
This update for mozilla-nss fixes the following issues:
Update to NSS 3.79.1 (bsc#1202645)
compare signature and signatureAlgorithm fields in legacy certificate verifier.
Uninitialized value in cert_ComputeCertType.
protect SFTKSlot needLogin with slotLock.
avoid data race on primary password change.
check for null template in sec_asn1{d,e}_push_state.
FIPS: unapprove the rest of the DSA ciphers, keeping signature verification only (bsc#1201298).
This update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame adds some missing 32bit libraries to some products. (bsc#1198925)
No codechanges were done in this update.
Advisory ID
SUSE-SU-2022:3003-1
Released
Fri Sep 2 15:01:44 2022
Summary
Security update for curl
Type
security
Severity
low
References
1202593,CVE-2022-35252
Description:
This update for curl fixes the following issues:
CVE-2022-35252: Fixed a potential injection of control characters
into cookies, which could be exploited by sister sites to cause a
denial of service (bsc#1202593).
Advisory ID
SUSE-RU-2022:3127-1
Released
Wed Sep 7 04:36:10 2022
Summary
Recommended update for libtirpc
Type
recommended
Severity
moderate
References
1198752,1200800
Description:
This update for libtirpc fixes the following issues:
Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
Fix memory leak in params.r_addr assignement (bsc#1198752)
This update for sqlite3 fixes the following issues:
CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).
Advisory ID
SUSE-RU-2022:3328-1
Released
Wed Sep 21 12:48:56 2022
Summary
Recommended update for jitterentropy
Type
recommended
Severity
moderate
References
1202870
Description:
This update for jitterentropy fixes the following issues:
Hide the non-GNUC constructs that are library internal from the
exported header, to make it usable in builds with strict C99
compliance. (bsc#1202870)
Advisory ID
SUSE-SU-2022:3353-1
Released
Fri Sep 23 15:23:40 2022
Summary
Security update for permissions
Type
security
Severity
moderate
References
1203018,CVE-2022-31252
Description:
This update for permissions fixes the following issues:
CVE-2022-31252: Fixed chkstat group controlled paths (bsc#1203018).
Advisory ID
SUSE-RU-2022:3452-1
Released
Wed Sep 28 12:13:43 2022
Summary
Recommended update for glibc
Type
recommended
Severity
moderate
References
1201942
Description:
This update for glibc fixes the following issues:
Reversing calculation of __x86_shared_non_temporal_threshold (bsc#1201942)
powerpc: Optimized memcmp for power10 (jsc#PED-987)
Advisory ID
SUSE-SU-2022:3489-1
Released
Sat Oct 1 13:35:24 2022
Summary
Security update for expat
Type
security
Severity
important
References
1203438,CVE-2022-40674
Description:
This update for expat fixes the following issues:
CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).
Advisory ID
SUSE-RU-2022:3555-1
Released
Mon Oct 10 14:05:12 2022
Summary
Recommended update for aaa_base
Type
recommended
Severity
important
References
1199492
Description:
This update for aaa_base fixes the following issues:
The wrapper rootsh is not a restricted shell. (bsc#1199492)
Advisory ID
SUSE-SU-2022:3784-1
Released
Wed Oct 26 18:03:28 2022
Summary
Security update for libtasn1
Type
security
Severity
critical
References
1204690,CVE-2021-46848
Description:
This update for libtasn1 fixes the following issues:
CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690)
Advisory ID
SUSE-SU-2022:3785-1
Released
Wed Oct 26 20:20:19 2022
Summary
Security update for curl
Type
security
Severity
important
References
1204383,1204386,CVE-2022-32221,CVE-2022-42916
Description:
This update for curl fixes the following issues:
- CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
- CVE-2022-42916: Fixed HSTS bypass via IDN (bsc#1204386).
Advisory ID
SUSE-RU-2022:3787-1
Released
Thu Oct 27 04:41:09 2022
Summary
Recommended update for permissions
Type
recommended
Severity
important
References
1194047,1203911
Description:
This update for permissions fixes the following issues:
Fix regression introduced by backport of security fix (bsc#1203911)
Add permissions for enlightenment helper on 32bit arches (bsc#1194047)
Advisory ID
SUSE-RU-2022:3873-1
Released
Fri Nov 4 14:58:08 2022
Summary
Recommended update for mozilla-nspr, mozilla-nss
Type
recommended
Severity
moderate
References
1191546,1198980,1201298,1202870,1204729
Description:
This update for mozilla-nspr, mozilla-nss fixes the following issues:
mozilla-nspr was updated to version 4.34.1:
add file descriptor sanity checks in the NSPR poll function.
mozilla-nss was updated to NSS 3.79.2 (bsc#1204729):
Bump minimum NSPR version to 4.34.1.
Gracefully handle null nickname in CERT_GetCertNicknameWithValidity.
Other fixes that were applied:
FIPS: Allow the use of DSA keys (verification only) (bsc#1201298).
FIPS: Add sftk_FIPSRepeatIntegrityCheck() to softoken's .def file
(bsc#1198980).
FIPS: Allow the use of longer symmetric keys via the service level indicator
(bsc#1191546).
FIPS: Prevent TLS sessions from getting flagged as non-FIPS (bsc#1191546).
FIPS: Mark DSA keygen unapproved (bsc#1191546, bsc#1201298).
FIPS: Use libjitterentropy for entropy (bsc#1202870).
FIPS: Fixed an abort() when both NSS_FIPS and /proc FIPS mode are enabled.
Advisory ID
SUSE-SU-2022:3884-1
Released
Mon Nov 7 10:59:26 2022
Summary
Security update for expat
Type
security
Severity
important
References
1204708,CVE-2022-43680
Description:
This update for expat fixes the following issues:
- CVE-2022-43680: Fixed use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
Advisory ID
SUSE-RU-2022:3910-1
Released
Tue Nov 8 13:05:04 2022
Summary
Recommended update for pam
Type
recommended
Severity
moderate
References
Description:
This update for pam fixes the following issue:
Update pam_motd to the most current version. (PED-1712)
Advisory ID
SUSE-RU-2022:3958-1
Released
Fri Nov 11 15:20:45 2022
Summary
Recommended update for mozilla-nss
Type
recommended
Severity
moderate
References
1191546,1198980,1201298,1202870,1204729
Description:
This update for mozilla-nss fixes the following issues:
mozilla-nss was updated to NSS 3.79.2 (bsc#1204729)
Bump minimum NSPR version to 4.34.1.
Gracefully handle null nickname in CERT_GetCertNicknameWithValidity.
FIPS: Allow the use of DSA keys (verification only) (bsc#1201298).
FIPS: Add sftk_FIPSRepeatIntegrityCheck() to softoken's .def file
(bsc#1198980).
FIPS: Allow the use of longer symmetric keys via the service level indicator
(bsc#1191546).
FIPS: Prevent sessions from getting flagged as non-FIPS (bsc#1191546).
FIPS: Mark DSA keygen unapproved (bsc#1191546, bsc#1201298).
FIPS: Enable userspace entropy gathering via libjitterentropy (bsc#1202870).
FIPS: Prevent keys from getting flagged as non-FIPS and add remaining TLS mechanisms.
FIPS: Use libjitterentropy for entropy.
FIPS: Fixed an abort() when both NSS_FIPS and /proc FIPS mode are enabled.
Advisory ID
SUSE-SU-2022:3986-1
Released
Tue Nov 15 12:57:41 2022
Summary
Security update for libX11
Type
security
Severity
moderate
References
1204422,1204425,CVE-2022-3554,CVE-2022-3555
Description:
This update for libX11 fixes the following issues:
- CVE-2022-3554: Fixed memory leak in XRegisterIMInstantiateCallback() (bsc#1204422).
- CVE-2022-3555: Fixed memory leak in _XFreeX11XCBStructure() (bsc#1204425).
Advisory ID
SUSE-SU-2022:3999-1
Released
Tue Nov 15 17:08:04 2022
Summary
Security update for systemd
Type
security
Severity
moderate
References
1204179,1204968,CVE-2022-3821
Description:
This update for systemd fixes the following issues:
CVE-2022-3821: Fixed buffer overrun in format_timespan() function (bsc#1204968).
Import commit 0cd50eedcc0692c1f907b24424215f8db7d3b428
* 0469b9f2bc pstore: do not try to load all known pstore modules
* ad05f54439 pstore: Run after modules are loaded
* ccad817445 core: Add trigger limit for path units
* 281d818fe3 core/mount: also add default before dependency for automount mount units
* ffe5b4afa8 logind: fix crash in logind on user-specified message string
Document udev naming scheme (bsc#1204179)
Make 'sle15-sp3' net naming scheme still available for backward compatibility
reason
Advisory ID
SUSE-RU-2022:4066-1
Released
Fri Nov 18 10:43:00 2022
Summary
Recommended update for timezone
Type
recommended
Severity
important
References
1177460,1202324,1204649,1205156
Description:
This update for timezone fixes the following issues:
Update timezone version from 2022a to 2022f (bsc#1177460, bsc#1204649, bsc#1205156):
Mexico will no longer observe DST except near the US border
Chihuahua moves to year-round -06 on 2022-10-30
Fiji no longer observes DST
In vanguard form, GMT is now a Zone and Etc/GMT a link
zic now supports links to links, and vanguard form uses this
Simplify four Ontario zones
Fix a Y2438 bug when reading TZif data
Enable 64-bit time_t on 32-bit glibc platforms
Omit large-file support when no longer needed
Jordan and Syria switch from +02/+03 with DST to year-round +03
Palestine transitions are now Saturdays at 02:00
Simplify three Ukraine zones into one
Improve tzselect on intercontinental Zones
Chile's DST is delayed by a week in September 2022 (bsc#1202324)
CVE-2022-21619: Improve NTLM support (bsc#1204473)
CVE-2022-21626: Key X509 usages (bsc#1204471)
CVE-2022-21618: Wider MultiByte (bsc#1204468)
Advisory ID
SUSE-SU-2022:4081-1
Released
Fri Nov 18 15:40:46 2022
Summary
Security update for dpkg
Type
security
Severity
low
References
1199944,CVE-2022-1664
Description:
This update for dpkg fixes the following issues:
CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).
Advisory ID
SUSE-RU-2022:4135-1
Released
Mon Nov 21 00:13:40 2022
Summary
Recommended update for libeconf
Type
recommended
Severity
moderate
References
1198165
Description:
This update for libeconf fixes the following issues:
Update to version 0.4.6+git
- econftool:
Parsing error: Reporting file and line nr. --delimeters=spaces accepting all kind of spaces for delimiter.
- libeconf:
Parse files correctly on space characters (1198165)
Update to version 0.4.5+git
- econftool:
New call 'syntax' for checking the configuration files only. Returns an error string with line number if error.
New options '--comment' and '--delimeters'
Advisory ID
SUSE-RU-2022:4198-1
Released
Wed Nov 23 13:15:04 2022
Summary
Recommended update for rpm
Type
recommended
Severity
moderate
References
1202750
Description:
This update for rpm fixes the following issues:
Strip critical bit in signature subpackage parsing
No longer deadlock DNF after pubkey import (bsc#1202750)
Advisory ID
SUSE-RU-2022:4256-1
Released
Mon Nov 28 12:36:32 2022
Summary
Recommended update for gcc12
Type
recommended
Severity
moderate
References
Description:
This update for gcc12 fixes the following issues:
This update ship the GCC 12 compiler suite and its base libraries.
The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP3 and SP4, and provided in the 'Development Tools' module.
The Go, D and Ada language compiler parts are available unsupported via the
PackageHub repositories.
To use gcc12 compilers use:
install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
override your Makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.
For a full changelog with all new GCC12 features, check out
https://gcc.gnu.org/gcc-12/changes.html
Advisory ID
SUSE-RU-2022:4312-1
Released
Fri Dec 2 11:16:47 2022
Summary
Recommended update for tar
Type
recommended
Severity
moderate
References
1200657,1203600
Description:
This update for tar fixes the following issues:
Fix unexpected inconsistency when making directory (bsc#1203600)
Update race condition fix (bsc#1200657)
Advisory ID
SUSE-RU-2022:4492-1
Released
Wed Dec 14 13:52:39 2022
Summary
Recommended update for mozilla-nss
Type
recommended
Severity
moderate
References
1191546,1198980,1201298
Description:
This update for mozilla-nss fixes the following issues:
FIPS: Disapprove the creation of DSA keys, i.e. mark them as not-fips (bsc#1201298)
FIPS: Allow the use SHA keygen mechs (bsc#1191546).
FIPS: ensure abort() is called when the repeat integrity check fails (bsc#1198980).
This update for GNOME 41 fixes the following issues:
atkmm1_6:
Version update from 2.28.1 to 2.28.3 (jsc#PED-2235):
* Meson build: Avoid unnecessary configuration warnings
* Meson build: Perl is not required by new versions of mm-common
* Meson build: Require meson >= 0.55.0
* Meson build: Specify 'check' option in run_command(). Will be necessary with future versions of Meson.
* Require atk >= 2.12.0 Not a new requirement, but previously it was not specified in configure.ac and meson.build
* Support building with Visual Studio 2022
eog:
Version update from 41.1 to 41.2 (jsc#PED-2235):
* eog-window: use correct type for display_profile
* Fix discovery of Evince for multi-page images
evince:
Version update 41.3 to 41.4 (jsc#PED-2235):
* shell: Fix failures when thumbnail extraction takes too long
* Fix build with meson 0.60.0 and newer
evolution:
Ensure evolution-devel is forward compatible with evolution-data-server-devel in a same major version (jsc#PED-2235)
evolution-data-center:
Version update from 3.42.4 to 3.42.5 (jsc#PED-2235):
* Google OAuth out-of-band (oob) flow will be deprecated
folks:
Version update 0.15.3 to 0.15.5 (jsc#PED-2235):
* vapi: Add missing generic type argument
* Fix docs build against newer eds version
* Fix build against newer eds version
* Remove volatile keyword from tests
gcr:
Version update 3.41.0 to 3.41.1 (jsc#PED-2235):
* Add G_SPAWN_CLOEXEC_PIPES flag to all the g_spawn commands
* Add gi-docgen dependency which is needed by the docs
* Fix build with meson 0.60.0 and newer
* Fix build without systemd
* Several CI fixes
geocode-glib:
Version update from 3.26.2 to 3.26.4 (jsc#PED-2235):
* Fix to a test data file not being installed, and a bug fix for a bug in the libsoup3 port
* Add support for libsoup 3.x
gjs:
Version update from 1.70.1 to 1.70.2 (jsc#PED-2235):
* Build and compatibility fixes backported from the development branch
* Reverse order of running-from-source checks
Require xorg-x11-Xvfb for proper package build (bsc#1203274)
glib2:
Version update from 2.70.4 to 2.70.5 (jsc#PED-2235):
* Bugs fixed: glgo#GNOME/GLib#2620, glgo#GNOME/GLib!2537, glgo#GNOME/GLib!2555
* Split gtk-docs from -devel package, these are not needed during building projects using glib2
gnome-control-center:
Fix the size of logo icon in About system (bsc#1200581)
Version update from 41.4 to 41.7 (jsc#PED-2235):
* Cellular: Remove duplicate line from .desktop
* Info: Allow changing 'Device Name' by pressing 'Enter'
* Info: Remove trailing space after CPU name
* Keyboard: Fix crash resetting all keyboard shortcuts
* Keyboard: Fix leaks
* Network: Fix saving passwords for non-wifi connections
* Network: Fix critical when opening VPN details page
* Wacom: Fix leaks
gnome-desktop:
Version update from 41.2 to 41.8 (jsc#PED-2235):
* Version increase but no actual changes
gnome-music:
Version update from 41.0 to 41.1 (jsc#PED-2235):
* Ensure the correct album is played
* Fix build with meson 0.61.0 and newer
* Fix crash on empty selection
* Fix incorrect playlist import
* Fix time displayed in RTL languages
* Improve async queue work
* Make random shuffle actually random
* Make shuffle random
* Speed increase on first startup on larger collections
* Time is reversed in RTL
gnome-remote-desktop:
Version update from 41.2 to 41.3 (jsc#PED-2235):
* Add Icelandic translation
gnome-session:
Clear error messages that can be ignored because expected to happen for GDM sessions (bsc#1204867)
Add fix for gnome-session to exit immediately when lost name on bus (bsc#1175622, bsc#1188882)
gnome-shell:
Disable offline update suggestion before shutdown/reboot in SLE and openSUSE Leap (bsc#944832)
Version update from 41.4 to 41.9 (jsc#PED-2235):
* Allow extension updates with only Extension Manager installed
* Allow more intermediate icon sizes in app grid
* Disable workspace switching while in search.
* Do not create systemd scope for D-Bus activated apps
* Fix calendar to correctly align world clocks header in RTL
* Fix drag placeholder position in dash in RTL locales
* Fix edge case where windows stay dimmed after a modal is closed
* Fix feedback when turning on a11y features by keyboard
* Fix focus tracking in magnifier on wayland
* Fix fractional timezone offsets in world clock
* Fix glitches in overview transition
* Fix logging in with realmd
* Fix memory leak
* Fix opening device settings for enterprise WPA networks
* Fix programatically set scrollview fade
* Fix regression in ibus support
* Fix unresponsive top bar in overview when in fullscreen
* Handle monitor changes during startup animation
* Hide overview after 'Show Details' from app context menu
* Improve Belgian on-screen keyboard layout
* Improve CSS shadow appearance
* Make sure startup animation completes
* Misc. bug fixes and cleanups
* Only close messages via delete key if they can be closed
* Respect IM hint for candidates list in on-screen keyboard
gnome-software:
Disable offline update feature in SUSE Linux Enterprise and openSUSE Leap (bsc#944832)
Version update from 41.4 to 41.5 (jsc#PED-2235):
* Added several appstream-related fixed
* Disable scroll-by-mouse-wheel on featured carousel
* Ensure details page shows app provided on command line
gnome-terminal:
Version update from 3.42.2 to 3.42.3 (jsc#PED-2235):
* Fix build with meson 0.61.0 and newer
* window: Use a normal menu for the popup menu
gnome-user-docs:
Version update from 41.1 to 41.5 (jsc#PED-2235):
* Added missing icon for network-wired-symbolic
gspell:
Version update from 1.8.4 to 1.10.0 (jsc#PED-2235):
* Build: distribute more files in tarballs
* Documentation improvements
gtkmm3:
Version update from 3.24.5 to 3.24.6 (jsc#PED-2235):
* Build with Meson: MSVC build: Support Visual Studio 2022
* Check if Perl is required for building documentation
* Don't use deprecated python3.path() and execute (..., gui_app...)
* GTK: TreeValueProxy: Declare copy constructor = default, avoiding warnings from the claing++ compiler
* Object::_release_c_instance(): Unref orphan managed widgets
* SizeGroup demo: Set active items in the combo boxs, so something is shown
* Specify 'check' option in run_command()
gtk-vnc:
Version update from 1.3.0 to 1.3.1 (jsc#PED-2235):
* Add 'check' arg to meson run_command()
* Fix invalid use of subprojects with meson
* Support ZRLE encoding for zero size alpha cursors
gupnp-av:
Version update from 0.12.11 to 0.14.1 (jsc#PED-2235):
* Add utility function to format GDateTime to the iso variant DIDL expects
* Allow to be used as a subproject
* Drop autotools
* Fix stripping @refID
* Fix unsetting subtitleFileType
* Make Feature derivable again
* Obsolete code removal.
* Port to modern GObject
* Remove hand-written ref-counting, use RcBox/AtomicRcBox instead.
* Switch to meson build system, following upstream
Rename libgupnp-av-1_0-2 subpackage to libgupnp-av-1_0-3, correcting the package name to match the provided library
Conflict with the wrongly provided libgupnp-av-1_0-2
gvfs:
Version update from 1.48.1 to 1.48.2 (jsc#PED-2235):
* sftp: Adapt on new OpenSSH password prompts
* smb: Rework anonymous handling to avoid EINVAL
* smb: Ignore EINVAL for kerberos/ccache login
libgsf:
Version update from 1.14.48 to 1.14.50 (jsc#PED-2235):
* Fix error handling problem when writing ole files
* Fix problems with non-western text in OLE properties
* Use g_date_time_new_from_iso8601 and g_date_time_format_iso8601 when available
libmediaart:
Version update from 1.9.5 to 1.9.6 (jsc#PED-2235):
* build: Add introspection/vapi/tests options
* build: Use library() to optionally build a static library
libnma:
Version update from 1.8.32 to 1.8.40 (jsc#PED-2235):
* Ad-Hoc networks now default to using WPA2 instead of WEP
* Add possibility of building libnma-gtk4 library with Gtk4 support
* Do not allow setting empty 802.1x domain for EAP TLS
* Fixed keyboard accelerator for certificate chooser
* Fixed libnma-gtk4 version of mobile-wizard
* Include OWE wireless security option
* The GtkBuilder files for Gtk4 are now included in the release tarball
* WEP is no longer provided as an option for connecting to hidden networks due to its deprecated status
New sub-packages libnma-gtk4-0, typelib-1_0-NMA4-1_0 and libnma-gtk4-devel
Split out documentation files in own docs sub-package
libnotify:
Version update from 0.7.10 to 0.7.12 (jsc#PED-2235):
* Delete unused notifynotification.xml
* Fix potential build errors with old glib version we require
* docs/notify-send: Add --transient option to manpage
* notification: Bookend calling NotifyActionCallback with temporary reference
* notification: Include sender-pid hint by default if not provided
* notify-send: Add debug message about server not supporting persistence
* notify-send: Add explicit option to create transient notifications
* notify-send: Add support for boolean hints
* notify-send: Move server capabilities check to a separate function
* notify-send: Support passing any hint value, by parsing variant strings
libpeas:
Version update from 1.30.0 to 1.32.0 (jsc#PED-2235):
* Icon licenses have been corrected
* Parallel build system operation fixes
* Use gi-docgen for documentation
* Various build warnings squashed
* Various GIR data that should not have been exported was removed
Stop packaging the demo files/sub-package
librsvg:
Version update from 2.52.6 to 2.52.9 (jsc#PED-2235):
* Catch circular references when rendering patterns
* Fix regressions when computing element geometries
* Fix regression outputting all text as paths
libsecret:
Version update from 0.20.4 to 0.20.5 (jsc#PED-2235):
* Add bash-completion for secret-tool
* Add locking capabilities to secret tool
* Add support for TPM2 based secret storage
* Create default collection after DBus.Error.UnknownObject
* Detect local storage in snaps in the same way as flatpaks
* Drop autotools-based build
* GI annotation and documentation fixes
* Port documentation to gi-docgen
* Use G_GNUC_NULL_TERMINATED where appropriate collection, methods, prompt: Port to GTask
* secret-file-backend: Avoid closing the same file descriptor twice
mutter:
Version update from 41.5 to 41.9 (jsc#PED-2235):
* Fix '--replace option'
* Fix missing root window properties after XWayland start
* Fix night light without GAMMA_LUT property
* KMS: Survive missing GAMMA_LUT property
* wayland: Fix rotation transform
* Misc. bug fixes
nautilus:
Version update from 41.2 to 41.5(jsc#PED-2235):
* Drag-and-drop bugfixes
* HighContrast style fixes
orca:
Version update from 41.1 to 41.3 (jsc#PED-2235):
* Add more event-flood detection and handling for improved performance
* Fix bug causing accessing preferences to fail for Esperanto
* Web: Fix bug causing widgets descending from off-screen label elements to be skipped over
* Web: Fix presentation of the FluentUI react dialog (and any other dialog which has an ARIA document-role descendant)
* WebKitGtk: Fail gracefully when structural navigation commands are used in WebKitGtk 2.36.x
python-cairo:
Add python3-cairo to SUSE Linux Enterprise Micro 5.3 as it is now required by python3-gobject-cairo
python-gobject:
Add dependency on python-cairo to python-gobject-cairo: The introspection wrapper needs pycairo (bsc#1179584)
Version update from 3.42.0 to 3.42.2 (jsc#PED-2235):
* Add a workaround for a PyPy 3.9+ bug when threads are used
* Do not error out for unknown scopes
* Prompt an error instead of crashing when marshaling unsupported fundamental types in some cases
* Fix a crash/refcounting error in case marshaling a hash table fails
* Fix crashes when marshaling zero terminated arrays for certain item types
* Implement DynamicImporter.find_spec() to silence deprecation warning
* Make the test suite pass again with PyPy
* Some test/CI fixes
* gtk overrides: Do not override Treeview.enable_model_drag_xx for GTK4
* gtk overrides: restore Gtk.ListStore.insert_with_valuesv with newer GTK4
* interface: Fix leak when overriding GInterfaceInfo
* setup.py: look up pycairo headers without importing the module
trackers-python:
Allow system calls used by gstreamer (bsc#1196205)
Version update from 3.2.2 to 3.2.1 (jsc#PED-2235):
* Backport seccomp rules for rseq and mbind syscalls
vala:
Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Add missing TraverseVisitor.visit_data_type()
* Add support for 'copy_/free_function' metadata for compact classes
* Catch and throw possible inner error of lock statements
* Clear SemanticAnalyzer.current_{symbol,source_file} when not needed anymore
* Don't count instance-parameter when checking for backwards closure reference
* Fix a few binding errors
* Free empty stack list for code contexts
* Handle duplicated and unnamed symbols.
* Improve UI parsing and handling of nested objects and properties
* Make sure to drop our 'trap' jump target in case of an error
* Move dynamic property errors to semantic analyzer pass
* Require lvalue access of delegate target/destroy 'fields'
* Show source location when reporting deprecations
* Transform assignment of an array element as needed
* manual: Update from wiki.gnome.org
* parser: Improve handling of nullable VarType in with-statement
* parser: Reduce the source reference of main block method to its beginning
xdg-desktop-portal-gnome:
Version update from 0.54.6 to 0.54.8 (jsc#PED-2235):
* Properly bind property in Lockdown portal
Advisory ID
SUSE-SU-2022:4628-1
Released
Wed Dec 28 09:23:13 2022
Summary
Security update for sqlite3
Type
security
Severity
moderate
References
1206337,CVE-2022-46908
Description:
This update for sqlite3 fixes the following issues:
CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,
when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
Advisory ID
SUSE-SU-2022:4629-1
Released
Wed Dec 28 09:24:07 2022
Summary
Security update for systemd
Type
security
Severity
important
References
1200723,1205000,CVE-2022-4415
Description:
This update for systemd fixes the following issues:
CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).
Bug fixes:
Support by-path devlink for multipath nvme block devices (bsc#1200723).
Advisory ID
SUSE-RU-2023:25-1
Released
Thu Jan 5 09:51:41 2023
Summary
Recommended update for timezone
Type
recommended
Severity
moderate
References
1177460
Description:
This update for timezone fixes the following issues:
Version update from 2022f to 2022g (bsc#1177460):
In the Mexican state of Chihuahua:
* The border strip near the US will change to agree with nearby US locations on 2022-11-30.
* The strip's western part, represented by Ciudad Juarez, switches from -06 all year to -07/-06 with US DST rules,
like El Paso, TX.
* The eastern part, represented by Ojinaga, will observe US DST next year, like Presidio, TX.
* A new Zone America/Ciudad_Juarez splits from America/Ojinaga.
Much of Greenland, represented by America/Nuuk, stops observing winter time after March 2023, so its daylight saving
time becomes standard time.
Changes for pre-1996 northern Canada
Update to past DST transition in Colombia (1993), Singapore (1981)
'timegm' is now supported by default
Advisory ID
SUSE-RU-2023:48-1
Released
Mon Jan 9 10:37:54 2023
Summary
Recommended update for libtirpc
Type
recommended
Severity
moderate
References
1199467
Description:
This update for libtirpc fixes the following issues:
Consider /proc/sys/net/ipv4/ip_local_reserved_ports, before binding to a random port (bsc#1199467)
Advisory ID
SUSE-RU-2023:50-1
Released
Mon Jan 9 10:42:21 2023
Summary
Recommended update for shadow
Type
recommended
Severity
moderate
References
1205502
Description:
This update for shadow fixes the following issues:
Fix issue with user id field that cannot be interpreted (bsc#1205502)
Advisory ID
SUSE-SU-2023:119-1
Released
Fri Jan 20 10:28:07 2023
Summary
Security update for mozilla-nss
Type
security
Severity
important
References
1204272,1207038,CVE-2022-23491,CVE-2022-3479
Description:
This update for mozilla-nss fixes the following issues:
CVE-2022-3479: Fixed a potential crash that could be triggered when
a server requested a client authentication certificate, but the
client had no certificates stored (bsc#1204272).
Updated to version 3.79.3 (bsc#1207038):
- CVE-2022-23491: Removed trust for 3 root certificates from TrustCor.
Advisory ID
SUSE-RU-2023:179-1
Released
Thu Jan 26 21:54:30 2023
Summary
Recommended update for tar
Type
recommended
Severity
low
References
1202436
Description:
This update for tar fixes the following issue:
Fix hang when unpacking test tarball (bsc#1202436)
Advisory ID
SUSE-SU-2023:201-1
Released
Fri Jan 27 15:24:15 2023
Summary
Security update for systemd
Type
security
Severity
moderate
References
1204944,1205000,1207264,CVE-2022-4415
Description:
This update for systemd fixes the following issues:
CVE-2022-4415: Fixed an issue where users could access coredumps
with changed uid, gid or capabilities (bsc#1205000).
Non-security fixes:
Enabled the pstore service (jsc#PED-2663).
Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944).
Fixed an issue where a pamd file could get accidentally overwritten
after an update (bsc#1207264).
CVE-2023-23914: Fixed HSTS ignored on multiple requests (bsc#1207990).
CVE-2023-23915: Fixed HSTS amnesia with --parallel (bsc#1207991).
CVE-2023-23916: Fixed HTTP multi-header compression denial of service (bsc#1207992).
Advisory ID
SUSE-RU-2023:432-1
Released
Wed Feb 15 18:48:25 2023
Summary
Recommended update for graphite2
Type
recommended
Severity
moderate
References
1207676
Description:
This update for graphite2 fixes the following issue:
Correct license string to LGPL-2.1-or-later OR MPL-2.0 OR GPL-2.0-or-later (bsc#1207676)
Advisory ID
SUSE-SU-2023:434-1
Released
Thu Feb 16 09:08:05 2023
Summary
Security update for mozilla-nss
Type
security
Severity
important
References
1208138,CVE-2023-0767
Description:
This update for mozilla-nss fixes the following issues:
Updated to NSS 3.79.4 (bsc#1208138):
- CVE-2023-0767: Fixed handling of unknown PKCS#12 safe bag types.
Advisory ID
SUSE-SU-2023:463-1
Released
Mon Feb 20 16:33:39 2023
Summary
Security update for tar
Type
security
Severity
moderate
References
1202436,1207753,CVE-2022-48303
Description:
This update for tar fixes the following issues:
CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753).
Bug fixes:
Fix hang when unpacking test tarball (bsc#1202436).
Advisory ID
SUSE-RU-2023:464-1
Released
Mon Feb 20 18:11:37 2023
Summary
Recommended update for systemd
Type
recommended
Severity
moderate
References
Description:
This update for systemd fixes the following issues:
Merge of v249.15
Drop workaround related to systemd-timesyncd that addressed a Factory issue.
Conditionalize the use of /lib/modprobe.d only on systems with split usr
support enabled (i.e. SLE).
Make use of the %systemd_* rpm macros consistently. Using the upstream
variants will ease the backports of Factory changes to SLE since Factory
systemd uses the upstream variants exclusively.
machines.target belongs to systemd-container, do its init/cleanup steps from
the scriptlets of this sub-package.
Make sure we apply the presets on units shipped by systemd package.
systemd-testsuite: move the integration tests in a dedicated sub directory.
Move systemd-cryptenroll into udev package.
Advisory ID
SUSE-RU-2023:617-1
Released
Fri Mar 3 16:49:06 2023
Summary
Recommended update for jitterentropy
Type
recommended
Severity
moderate
References
1207789
Description:
This update for jitterentropy fixes the following issues:
build jitterentropy library with debuginfo (bsc#1207789)
Advisory ID
SUSE-SU-2023:668-1
Released
Wed Mar 8 11:17:33 2023
Summary
Security update for libX11
Type
security
Severity
moderate
References
1204425,1208881,CVE-2022-3555
Description:
This update for libX11 fixes the following issues:
Fixed a regression introduced with security update for CVE-2022-3555 (bsc#1204425, bsc#1208881)
Advisory ID
SUSE-RU-2023:714-1
Released
Mon Mar 13 10:53:25 2023
Summary
Recommended update for rpm
Type
recommended
Severity
important
References
1207294
Description:
This update for rpm fixes the following issues:
Fix missing python(abi) for 3.XX versions (bsc#1207294)
This feature update for the Java stack provides:
ant:
Update ant from version 1.10.7 to version 1.10.12. (jsc#SLE-23217)
* CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469)
* CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468)
* Do not follow redirects if the 'followRedirects' attribute is set to 'false'.
* Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the
same effect as using the shorter alias names.
* Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper.
* Avoid file name canonicalization when possible.
* Upgraded AntUnit to 1.4.1.
* CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180)
* CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696)
* sshexec, sshsession and scp now support a new sshConfig parameter.
It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to
be used per host.
* Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001)
* Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in
optional tasks. (bsc#1133997)
* Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar.
* Do not build against the log4j12 packages, use the new reload4j
ant-antlr:
Update ant-antlr from version 1.10.7 to version 1.10.12. (jsc#SLE-23217)
* CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469)
* CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468)
* Do not follow redirects if the 'followRedirects' attribute is set to 'false'.
* Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the
same effect as using the shorter alias names.
* Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper.
* Avoid file name canonicalization when possible.
* Upgraded AntUnit to 1.4.1.
* CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180)
* CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696)
* sshexec, sshsession and scp now support a new sshConfig parameter.
It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to
be used per host.
* Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001)
* Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in
optional tasks. (bsc#1133997)
* Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar.
* Do not build against the log4j12 packages, use the new reload4j
ant-contrib:
Fix build with apache-ivy 2.5.1 (jsc#SLE-23217)
ant-junit:
Update ant-junit from version 1.10.7 to version 1.10.12. (jsc#SLE-23217)
* CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469)
* CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468)
* Do not follow redirects if the 'followRedirects' attribute is set to 'false'.
* Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the
same effect as using the shorter alias names.
* Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper.
* Avoid file name canonicalization when possible.
* Upgraded AntUnit to 1.4.1.
* CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180)
* CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696)
* sshexec, sshsession and scp now support a new sshConfig parameter.
It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to
be used per host.
* Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001)
* Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in
optional tasks. (bsc#1133997)
* Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar.
* Do not build against the log4j12 packages, use the new reload4j
ant-junit5:
Update ant-junit5 from version 1.10.7 to version 1.10.12. (jsc#SLE-23217)
* CVE-2021-36374: Excessive memory allocation when reading a crafted ZIP archive or a derived formats. (bsc#1188469)
* CVE-2021-36373: Excessive memory allocation when reading a crafted TAR archive. (bsc#1188468)
* Do not follow redirects if the 'followRedirects' attribute is set to 'false'.
* Make sure setting build.compiler to the fully qualified classname that corresponds to extJavac or modern has the
same effect as using the shorter alias names.
* Prevent potential deadlocks in org.apache.tools.ant.IntrospectionHelper.
* Avoid file name canonicalization when possible.
* Upgraded AntUnit to 1.4.1.
* CVE-2020-11979: Fixed an insecure temporary file vulnerability. (bnc#1177180)
* CVE-2020-1945: insecure temporary file vulnerability. (bsc#1171696)
* sshexec, sshsession and scp now support a new sshConfig parameter.
It specifies the SSH configuration file (typically ${user.home}/.ssh/config) defining the username and keyfile to
be used per host.
* Add rhino to the ant-apache-bsf optional tasks. (bsc#1134001)
* Remove jakarta-commons-* dependencies and use apache-commons-logging and apache-commons-net in
optional tasks. (bsc#1133997)
* Use xml-commons-apis-bootstrap as jar in classpath instead of the common xml-apis jar.
Do not build against the log4j12 packages, use the new reload4j
antlr:
Build antlr-manual package without examples files. (bsc#1120360)
antlr3:
Build with source and target levels 8 (jsc#SLE-23217)
antlr4:
Update antlr4 from version 4.7.2 to version 4.9.3. (jsc#SLE-23217)
* The libantlr4-runtime-devel now requires utfcpp-devel
* For more details check: https://github.com/antlr/antlr4/compare/4.7.2...4.9.3
aopalliance:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-beanutils:
Provide apache-commons-beanutils 1.9.4 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
apache-commons-cli:
Update apache-commons-cli from version 1.4 to version 1.5.0. (jsc#SLE-23217)
* Replace deprecated FindBugs with SpotBugs
* Replace CLIRR with JApiCmp.
* Update Java from version 5 to 7
* Remove deprecated sudo setting
* Bump junit:junit to 4.13.2
* Bump commons-parent to 52
* Bump maven-pmd-plugin to 3.15.0
* Bump actions/checkout to v2.3.5
* Bump actions/setup-java to v2
* Bump maven-antrun-plugin to 3.0.0
* Bump maven-checkstyle-plugin to 3.1.2
* Bump checkstyle to 9.0.1
* Bump actions/cache to 2.1.6
* Bump commons.animal-sniffer.version to 1.20
* Bump maven-bundle-plugin to 5.1.2
* Bump biz.aQute.bndlib.version to 6.0.0
* Bump spotbugs to 4.4.2
* Bump spotbugs-maven-plugin to 4.4.2.2
* Add OSGi manifest to the build files.
* Set java source/target levels to 6
apache-commons-codec:
Update apache-commons-codec from version 1.11 to version 1.15. (jsc#SLE-23217)
* Do not alias the artifact to itself
* Base16Codec and Base16Input/OutputStream.
* Hex encode/decode with existing arrays.
* Base32/Base64 Input/OutputStream: Added strict decoding property to control handling of trailing bits. Default
lenient mode discards them without error. Strict mode raise an exception.
* Update tests from JUnit to 4.13.
* Update actions/checkout to v2.3.2
* Update actions/setup-java to v1.4.1.
* MurmurHash3: Deprecate hash64 methods and hash methods accepting a String that use the default encoding.
* Allow repeat calls to MurmurHash3.IncrementalHash32.end() to generate the same value.
* Add RandomAccessFile digest methods
* Add Path APIs to org.apache.commons.codec.digest.DigestUtils similar to File APIs.
* Add SHA-512/224 and SHA-512/256 to DigestUtils for Java 9 and up.
* Deprecate Charset constants in org.apache.commons.codec.Charsets in favor of java.nio.charset.StandardCharsets.
* Reject any decode request for a value that is impossible to encode to for Base32/Base64.
* MurmurHash2 for 32-bit or 64-bit value.
* MurmurHash3 for 32-bit or 128-bit value.
* Update from Java 6 to Java 7.
* Add Percent-Encoding Codec (described in RFC3986 and RFC7578)
* Add SHA-3 methods in DigestUtils.
apache-commons-collections4:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-collections:
Do not use a dummy pom that only declares dependencies for the testframework artifact
apache-commons-compress:
Remove support for pack200 which depends on old asm3. (jsc#SLE-23217)
apache-commons-configuration:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-csv:
Provide apache-commons-csv version 1.9.0 (jsc#SLE-23217)
apache-commons-daemon:
Update apache-commons-daemon from version 1.0.15 to version 1.2.4. (jsc#SLE-23217)
* Build with source/target levels 8
* Ensure that log messages written to stdout and stderr are not lost during start-up.
* Enable the service to start if the Options value is not present in the registry.
* jsvc. Don't fail if the CAP_DAC_READ_SEARCH capability is not available. Fall back to using argv[0] rather than
/proc/self/exe to determine the path for the current binary.
* Improved JRE/JDK detection to support increased range of both JVM versions and vendors
* Correct multiple issues related to enabling a service to interact with the desktop. Provide a better error message
if this option is used with an invalid user, install the service with the option enabled if requested
and correctly save the setting if it is enabled in the GUI.
* Update the list of paths searched for libjvm.so to include the path used by OpenJDK 11.
* Add additional debug logging for Java start mode.
* Remove incorrect definition 'supported_os' which defined in psupport.m4 file to fix jsvc build error on s390,
arm, aarch64, mipsel and mips.
* More debug logging in prunsrv.c and javajni.c.
* Update arguments.c to support Java 11 --enable-preview.
* jsvc and Procrun: ad support for Java native memory tracking.
* Procrun. Add a new command, print, that outputs the command to (re-)configure the service with the current
settings. This is intended to be used to save settings such as before an upgrade.
* Update: Update Commons-Parent to version 49.
* Add AArch64 support to src/native/unix/support/apsupport.m4.
* Procrun. When running in jre mode, if the standard Java registry entries for JavaHome and RuntimeLib are not
present, attempt to use the Procrun JavaHome key to find the runtime library.
* Procrun. Add an option to configure the service to use the 'Automatic (Delayed Start)' startup mode.
* jsvc. Include the full path to the jsvc executable in the debug log.
* Remove support for building Procrun for the Itanium platform.
apache-commons-dbcp:
Provide apache-commons-dbcp version 2.1.1 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
apache-commons-digester:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-el:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-exec:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-fileupload:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-io:
Update apache-commons-io from version 2.6 to version 2.11.0. (jsc#SLE-23217)
* CVE-2021-29425: Limited path traversal in Apache Commons IO (bsc#1184755)
* Java 8 or later is required
* This update provides several fixes and enhancements.
For a full overview please, visit: https://commons.apache.org/proper/commons-io/changes-report.html
apache-commons-jexl:
Build with source and target levels 8 (jsc#SLE-23217)
apache-commons-lang3:
Update apache-commons-lang3 from version 3.8.1 to version 3.12.0. (jsc#SLE-23217)
* Remove the junit bom dependency as it breaks the build of other packages like log4j.
* Fix component version in default.properties to 3.12
* Add BooleanUtils.booleanValues().
* Add BooleanUtils.primitiveValues().
* Add StringUtils.containsAnyIgnoreCase(CharSequence, CharSequence...).
* Add StopWatch.getStopTime().
* Add fluent-style ArraySorter.
* Add and use LocaleUtils.toLocale(Locale) to avoid NPEs.
* Add FailableShortSupplier, handy for JDBC APIs.
* Add JavaVersion.JAVA_17.
* Add missing boolean[] join method.
* Add StringUtils.substringBefore(String, int).
* Add Range.INTEGER.
* Add DurationUtils.
* Introduce the use of @Nonnull, and @Nullable, and the Objects class as a helper tool.
* Add and use true and false String constants.
* Add and use ObjectUtils.requireNonEmpty().
* Correct implementation of RandomUtils.nextLong(long, long).
* Restore handling of collections for non-JSON ToStringStyle.
* ContextedException Javadoc add missing semicolon.
* Resolve JUnit pioneer transitive dependencies using JUnit BOM.
* NumberUtilsTest - incorrect types in min/max tests.
* Improve StringUtils.stripAccents conversion of remaining accents.
* StringUtils.countMatches - clarify Javadoc.
* Remove redundant argument from substring call.
* BigDecimal is created when you pass it the min and max values.
* TypeUtils.isAssignable returns wrong result for GenericArrayType and ParameterizedType.
* testGetAllFields and testGetFieldsWithAnnotation sometimes fail.
* TypeUtils. containsTypeVariables does not support GenericArrayType.
* Refine StringUtils.lastIndexOfIgnoreCase.
* Refine StringUtils.abbreviate.
* Refine StringUtils.isNumericSpace.
* Refine StringUtils.deleteWhitespace.
* MethodUtils.invokeMethod NullPointerException in case of null in args list.
* Fix 2 digit week year formatting.
* Add and use ThreadUtils.sleep(Duration).
* Add and use ThreadUtils.join(Thread, Duration).
* Add ObjectUtils.wait(Duration).
* ArrayUtils.toPrimitive(Object) does not support boolean and other types.
* Processor.java: check enum equality with == instead of .equals() method.
* Use own validator ObjectUtils.anyNull to check null String input.
* Add ArrayUtils.isSameLength() to compare more array types.
* Added the Locks class as a convenient possibility to deal with locked objects.
* Add to Functions: FailableBooleanSupplier, FailableIntSupplier, FailableLongSupplier, FailableDoubleSupplier...
* Add ArrayUtils.get(T[], index, T) to provide an out-of-bounds default value.
* Add JavaVersion enum constants for Java 14, 15 and 16.
* Use Java 8 lambdas and Map operations.
* Change removeLastFieldSeparator to use endsWith.
* Change a Pattern to a static final field, for not letting it compile each time the function invoked.
* Add ImmutablePair factory methods left() and right().
* Add ObjectUtils.toString(Object, Supplier).
* Add org.apache.commons.lang3.StringUtils.substringAfter(String, int).
* Add org.apache.commons.lang3.StringUtils.substringAfterLast(String, int).
* Use StandardCharsets.UTF_8.
* Use Collections.singletonList insteadof Arrays.asList when there be only one element.
* Change array style from `int a[]` to `int[] a`.
* Change from addAll to constructors for some List.
* Simplify if as some conditions are covered by others.
* Fixed Javadocs for setTestRecursive().
* ToStringBuilder.reflectionToString - Wrong JSON format when object has a List of Enum.
* Make org.apache.commons.lang3.CharSequenceUtils.toCharArray(CharSequence) public.
* Update actions/cache from v2 to v2.1.4.
* Update actions/checkout from v2.3.1 to v2.3.4.
* Update actions/setup-java from v1.4.0 to v1.4.2.
* Update biz.aQute.bndlib from 5.1.1 to 5.3.0.
* Update com.puppycrawl.tools:checkstyle to 8.34.
* Update commons.jacoco.version 0.8.5 to 0.8.6 (Fixes Java 15 builds).
* Update commons.japicmp.version to 0.15.2.
* Update jmh.version from 1.21 to 1.27.
* Update junit-bom from 5.7.0 to 5.7.1.
* Update junit-jupiter to 5.7.0.
* Update junit-pioneer to 1.3.0.
* Update maven-checkstyle-plugin to 3.1.2.
* Update maven-pmd-plugin from 3.13.0 to 3.14.0.
* Update maven-surefire-plugin 2.22.2 -> 3.0.0-M5.
* Update org.apache.commons:commons-parent to 51.
* Update org.easymock:easymock to 4.2.
* Update org.hamcrest:hamcrest 2.1 -> 2.2.
* Update org.junit.jupiter:junit-jupiter to 5.6.2.
* Update spotbugs to 4.2.1.
* Update spotbugs-maven-plugin from 4.0.0 to 4.2.0.
* Add ExceptionUtils.throwableOfType(Throwable, Class) and friends.
* Add EMPTY_ARRAY constants to classes in org.apache.commons.lang3.tuple.
* Add null-safe StringUtils APIs to wrap String#getBytes([Charset|String]).
* Add zero arg constructor for org.apache.commons.lang3.NotImplementedException.
* Add ArrayUtils.addFirst() methods.
* Add Range.fit(T) to fit a value into a range.
* Added Functions.as*, and tests thereof, as suggested by Peter Verhas
* Add getters for lhs and rhs objects in DiffResult.
* Generify builder classes Diffable, DiffBuilder, and DiffResult.
* Add ClassLoaderUtils with toString() implementations.
* Add null-safe APIs as StringUtils.toRootLowerCase(String) and StringUtils.toRootUpperCase(String).
* Add org.apache.commons.lang3.time.Calendars.
* Add EnumUtils getEnum() methods with default values.
* Added indexesOf methods and simplified removeAllOccurences.
* Add support of lambda value evaluation for defaulting methods.
* Add factory methods to Pair classes with Map.Entry input.
* Add StopWatch convenience APIs to format times and create a simple instance.
* Allow a StopWatch to carry an optional message.
* Add ComparableUtils.
* Add org.apache.commons.lang3.SystemUtils.getUserName().
* Add ObjectToStringComparator.
* Add org.apache.commons.lang3.arch.Processor.Arch.getLabel().
* Add IS_JAVA_14 and IS_JAVA_15 to org.apache.commons.lang3.SystemUtils.
* ObjectUtils: Get first non-null supplier value.
* Added the Streams class, and Functions.stream() as an accessor thereof.
* Make test more stable by wrapping assertions in hashset.
* Use synchronize on a set created with Collections.synchronizedSet before iterating.
* StringUtils.unwrap incorrect throw StringIndexOutOfBoundsException.
* StringIndexOutOfBoundsException in StringUtils.replaceIgnoreCase.
* StringUtils.removeIgnoreCase('?a', 'a') throws IndexOutOfBoundsException.
* StringUtils abbreviate returns String of length greater than maxWidth.
* Deprecate org.apache.commons.lang3.ArrayUtils.removeAllOccurences(*) for
org.apache.commons.lang3.ArrayUtils.removeAllOccurrences(*).
* Requires jdk >= 1.8
* Add more SystemUtils.IS_JAVA_XX variants
* Adding the Functions class
* Add @FunctionalInterface to ThreadPredicate and ThreadGroupPredicate
* Add isEmpty method to ObjectUtils
* null-safe StringUtils.valueOf(char[]) to delegate to String.valueOf(char[]).
* Add API org.apache.commons.lang3.SystemUtils.isJavaVersionAtMost(JavaVersion)
* Consolidate the StringUtils equals and equalsIgnoreCase
* Add OSGi manifest
apache-commons-logging:
Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
apache-commons-math:
Provide apache-commons-math version 3.6.1 (jsc#SLE-23217)
apache-commons-net:
Update from version 3.6 to version 3.9.0 (jsc#SLE-23217)
* CVE-2021-37533: FTP client trusts the host from PASV response by default (bsc#1206018)
* Build with source and target levels 8
apache-commons-ognl:
Provide apache-commons-ognl version 4.0-20191021git51cf8f4. (jsc#SLE-23217)
apache-commons-parent:
Update apache-commons-parent from version 47 to version 52. (jsc#SLE-23217)
* For a full changelog, please visit:
https://github.com/apache/commons-parent/compare/commons-parent-47...rel/commons-parent-52
apache-commons-pool2:
Provide apache-commons-pool2 2.4.2 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
apache-commons-text:
Provide apache-commons-text version 1.10.0 (jsc#SLE-23217)
* CVE-2022-42889: code execution when processing untrusted input due to insecure interpolation defaults. (bsc#1204284)
* This is a new dependency of maven-javadoc-plugin.
* Build with ant in order to avoid build cycles.
apache-ivy:
Upgrade from version 2.4.0 to version 2.5.1. (jsc#SLE-23217)
* CVE-2022-37866: path traversal via user-supplied pattern (bsc#1205142)
* CVE-2022-37865: apache-ivy: Apache Ivy allow create/overwrite any file on the system. (bsc#1205138)
* Breaking:
+ Removed old `fr\jayasoft\ivy\ant\antlib.xml` AntLib definition file.
* Force building with JDK < 14, since it imports statically a class removed in JDK14.
* Change dependencies for the httpclient to httpcomponents-client instead of apache-commons-httpclient.
apache-logging-parent:
Update apache-logging-parent from version 2 to version 5. (jsc#SLE-23217)
* Do not require maven-local, since it can be handled by javapackages-local
apache-parent:
Check upstream source signature
apache-pdfbox:
Update apache-pdfbox from version 1.8.16 to version 2.0.23. (jsc#SLE-23217)
* CVE-2021-27807: infinite loop while loading a crafted PDF file. (bsc#1184356)
* CVE-2021-27906: OutOfMemory-Exception while loading a crafted PDF file. (bsc#1184357)
* Fix build with bouncycastle 1.71 and the new bcutil artifact
* Build with source/target levels 8
* Package all resources in pdfbox module
* Improve document signing
* Allow reuse of subsetted fonts by inverting the ToUnicode CMap
* Improve performance in signature validation
* Add more checks to PDFXrefStreamParser and reduce memory footprint
* Use StringBuilder for key in PDDeviceN.toRGBWithTintTransform()
* Don't use RGB loop in PDDeviceN.toRGBWithTintTransform()
* Add source signature and keyring
* Move from 1.x release line to the 2.x one. This is a ABI change
* Generate the ant build system from the maven one and customize it.
apache-resource-bundles:
Provide apache-resource-bundles version 2 (jsc#SLE-23217)
* This package contains templates for generating necessary license files and notices for all Apache releases.
* This is a build dependency of apache-sshd
apache-sshd:
Provide apache-sshd version 2.7.0 as dependency of eclipse-jgit (jsc#SLE-23217)
apiguardian:
Build with source and target levels 8 (jsc#SLE-23217)
aqute-bnd:
Update aqute-bnd from version 3.5.0 to version 5.2.0. (jsc#SLE-23217)
* ant plugin is in separate artifact.
* Produce bytecode compatible with Java 8
* Port to OSGI 7.0.0
* Require aqute-bndlib
args4j:
Build with source and target levels 8 (jsc#SLE-23217)
asm3:
Build with source and target levels 8 (jsc#SLE-23217)
atinject:
Update atinject from version 1+20100611git1f74ea7 to version 1+20160610git1f74ea7. (jsc#SLE-23217)
* Alias to the new jakarta name
* Fetch the sources using a source service
* Do not use the upstream build.sh, but use it to write a necessary part directly to the spec file
* Build with source/target levels 8
* Fix build with javadoc 17.
auto:
Update auto from version 1.3 to version 1.6.1. (jsc#SLE-23217)
* Provide the auto-value-annotations artifact needed by google-errorprone
* Provide auto-service-annotations and fix dependencies issues.
avalon-framework:
Do not build against the log4j12 packages, use the new reload4j. (jsc#SLE-23217)
avalon-logkit:
Do not build against the log4j12 packages, use the new reload4j. (jsc#SLE-23217)
Do not build the org.apache.log.output.lf5 package
aws-sdk-java:
Build with java source and target levels 8. (jsc#SLE-23217)
Build against the standalone JavaEE modules unconditionally
Double the maximum memory for javadoc to avoid out-of-memory on certain architectures
Force generating javadoc with maven-javadoc-plugin, since the xmvn javadoc mojo doesn't work here.
axis:
Require glassfish-activation-api in order to prevent missing APIs when running the ant task. (jsc#SLE-23217)
Unify the dependency on glassfish-activation-api instead of jaf and gnu-jaf. (jsc#SLE-23217)
On systems where the JavaEE modules exist, allow building against newer versions of APIs (jsc#SLE-23217)
Alias relevant artifacts to org.apache.axis (jsc#SLE-23217)
Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
Require Java >= 1.8 (jsc#SLE-23217)
base64coder:
Provide base64coder 20101219 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
beust-jcommander:
Provide beust-jcommander 1.71 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
bnd-maven-plugin:
Update bnd-maven-plugin from version 3.5.2 to version 5.2.0. (jsc#SLE-23217)
* Produce bytecode compatible with Java 8
* Port to OSGI 7.0.0
* Require maven-mapping
bouncycastle:
Update bouncycastle from version 1.64 to version 1.71. (jsc#SLE-23217)
* Relevant fixes
- CVE-2020-28052: OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the
password. (bsc#1180215)
- CVE-2020-15522: Timing issue within the EC math library. (bsc#1186328)
- Blake 3 output limit is enforced.
- The PKCS12 KeyStore was relying on default precedence for its key Cipher implementation so was sometimes failing
if used from the keytool. The KeyStore class now makes sure it uses the correct Cipher implementation.
- ASN.1: More robust handling of high tag numbers and definite-length forms.
- BCJSSE: Don't log sensitive system property values (GH#976).
- The IES AlgorithmParameters object has been re-written to properly support all the variations of
IESParameterSpec.
- PGPPublicKey.getBitStrength() now properly recognises EdDSA keys.
- In line with GPG the PGP API now attempts to preserve comments containing non-ascii UTF8 characters.
- An accidental partial dependency on Java 1.7 has been removed from the TLS API.
- Lightweight and JCA conversion of Ed25519 keys in the PGP API could drop the leading byte as it was zero. This
has been fixed.
- Marker packets appearing at the start of PGP public key rings could cause parsing failure. This has been fixed.
- ESTService could fail for some valid Content-Type headers. This has been fixed.
- CertificateFactory.generateCertificates()/generateCRLs() would throw an exception if extra data was found at
the end of a PEM file even if valid objects had been found. Extra data is now ignored providing at least
one object found.
- PGP ArmoredInputStream now fails earlier on malformed headers.
- Ed25519 keys being passed in via OpenSSH key spec are now validated in the KeyFactory.
- Blowfish keys are now range checked on cipher construction.
- The BasicConstraintsValidation class in the BC cert path validation tools has improved conformance to RFC 5280.
- Fix various conversions and interoperability for XDH and EdDSA between BC and SunEC providers.
- TLS: Prevent attempts to use KeyUpdate mechanism in versions before TLS 1.3.
- Some BigIntegers utility methods would fail for BigInteger.ZERO. This has been fixed.
- PGPUtil.isKeyRing() was not detecting secret sub-keys in its input. This has been fixed.
- BCJSSE: Lock against multiple writers - a possible synchronization issue has been removed.
- Certificates/CRLs with short signatures could cause an exception in toString() in the BC X509 Certificate
implmentation
- In line with latest changes in the JVM, SignatureSpis which don't require parameters now return null on
engineGetParameters()
- The RSA KeyFactory now always preferentially produces RSAPrivateCrtKey where it can on requests for a KeySpec
based on an RSAPrivateKey
- CMSTypedStream$FullReaderStream now handles zero length reads correctly
- CMS with Ed448 using a direct signature was using id-shake256-len rather than id-shake256.
- Use of GCMParameterSpec could cause an AccessControlException under some circumstances.
- DTLS: Fixed high-latency HelloVerifyRequest handshakes.
- An encoding bug for rightEncoded() in KMAC has been fixed.
- For a few values the cSHAKE implementation would add unnecessary pad bytes where the N and S strings produced
encoded data that was block aligned.
- DLExternal would encode using DER encoding for tagged SETs.
- ChaCha20Poly1305 could fail for large (>~2GB) files.
- ChaCha20Poly1305 could fail for small updates when used via the provider.
- Properties.getPropertyValue could ignore system property when other local overrides set.
- The entropy gathering thread was not running in daemon mode, meaning there could be a delay in an application
shutting down due to it.
- A recent change in Java 11 could cause an exception with the BC Provider's implementation of PSS.
- BCJSSE: TrustManager now tolerates having no trusted certificates.
- BCJSSE: Choice of credentials and signing algorithm now respect the peer's signature_algorithms extension
properly.
* Additional Features and Functionality
- Missing PGP CRC checksums can now be optionally ignored using setDetectMissingCRC() (default false) on
ArmoredInputStream.
- PGPSecretKey.copyWithNewPassword() now has a variant which uses USAGE_SHA1 for key protection if a
PGPDigestCalculator is passed in.
- PGP ASCII armored data now skips '\t', '\v', and '\f'.
- PKCS12 files with duplicate localKeyId attributes on certificates will now have the incorrect attributes
filtered out, rather than the duplicate causing an exception.
- PGPObjectFactory will now ignore packets representing unrecognised signature versions in the input stream.
- The X.509 extension generator will now accumulate some duplicate X.509 extensions into a single extension
where it is possible to do so.
- Removed support for maxXofLen in Kangaroo digest.
- Ignore marker packets in PGP Public and Secret key ring collection.
- An implementation of LEA has been added to the low-level API.
- Access, recovery, and direct use for PGP session keys has been added to the OpenPGP API for processing
encrypted data.
- A PGPCanonicalizedDataGenerator has been added which converts input into canonicalized literal data for
text and UTF-8 mode.
- A getUserKeyingMaterial() method has been added to the KeyAgreeRecipientInformation class.
- ASN.1: Tagged objects (and parsers) now support all tag classes. Special code for ApplicationSpecific has been
deprecated and re-implemented in terms of TaggedObject.
- ASN.1: Improved support for nested tagging.
- ASN.1: Added support for GraphicString, ObjectDescriptor, RelativeOID.
- ASN.1: Added support for constructed BitString encodings, including efficient parsing for large values.
- TLS: Added support for external PSK handshakes.
- TLS: Check policy restrictions on key size when determining cipher suite support.
- A performance issue in KeccakDigest due to left over debug code has been identified and dealt with.
- BKS key stores can now be used for collecting protected keys (note: any attempt to store such a store will cause
an exception).
- A method for recovering user keying material has been added to KeyAgreeRecipientInformation.
- Support has been added to the CMS API for SHA-3 based PLAIN-ECDSA.
- The low level BcDefaultDigestProvider now supports the SHAKEfamily of algorithms and the SM3 alogirthm.
- PGPKeyRingGenerator now supports creation of key-rings with direct-key identified keys.
- The PQC NIST candidate, signature algorithm SPHINCS+ has been added to the low-level API.
- ArmoredInputStream now explicitly checks for a '\n' if in crLF mode.
- Direct support for NotationDataOccurances, Exportable,Revocable, IntendedRecipientFingerPrints, and AEAD
algorithm preferences has been added to PGPSignatureSubpacketVector.
- Further support has been added for keys described using S-Expressions in GPG 2.2.X.
- Support for OpenPGP Session Keys from the (draft) Stateless OpenPGP CLI has been added.
- Additional checks have been added for PGP marker packets in the parsing of PGP objects.
- A CMSSignedData.addDigestAlgorithm() has been added to allow for adding additional digest algorithm identifiers
to CMS SignedData structures when required.
- Support has been added to CMS for the LMS/HSS signature algorithm.
- The system property 'org.bouncycastle.jsse.client.assumeOriginalHostName' (default false) has been added for
dealing with SNI problems related to the host name not being propagate by the JVM.
- The JcePKCSPBEOutputEncryptorBuilder now supports SCRYPT with ciphers that do not have algorithm
parameters (e.g. AESKWP).
- Support is now added for certificates using ETSI TS 103 097, 'Intelligent Transport Systems (ITS)' in
the bcpkix package.
- Added support for OpenPGP regular expression signature packets.
- added support for OpenPGP PolicyURI signature packets.
- A utility method has been added to PGPSecretKeyRing to allow for inserting or replacing a PGPPublicKey.
- The NIST PQC Finalist, Classic McEliece has been added to the low level API and the BCPQC provider.
- The NIST PQC Alternate Candidate, SPHINCS+ has been added to the BCPQC provider.
- The NIST PQC Alternate Candidate, FrodoKEM has been added to the low level API and the BCPQC provider.
- The NIST PQC Finalist, SABER has been added to the low level API and the BCPQC provider.
- KMAC128, KMAC256 has been added to the BC provider (empty customization string).
- TupleHash128, TupleHash256 has been added to the BC provider (empty customization string).
- ParallelHash128, ParallelHash256 has been added to the BC provider (empty customization string,
block size 1024 bits).
- Two new properties: 'org.bouncycastle.rsa.max_size' (default 15360) and 'org.bouncycastle.ec.fp_max_size'
(default 1042) have been added to cap the maximum size of RSA and EC keys.
- RSA modulus are now checked to be provably composite using the enhanced MR probable prime test.
- Imported EC Fp basis values are now validated against the MR prime number test before use. The certainty level
of the prime test can be determined by 'org.bouncycastle.ec.fp_certainty' (default 100).
- The BC entropy thread now has a specific name: 'BC-ENTROPY-GATHERER'.
- Utility methods have been added for joining/merging PGP public keys and signatures.
- Blake3-256 has been added to the BC provider.
- DTLS: optimisation to delayed handshake hash.
- Further additions to the ETSI 102 941 support in the ETSI/ITS package: certification request, signed message
generation and verification now supported.
- CMSSignedDataGenerator now supports the direct generation of definite-length data.
- The NetscapeCertType class now has a hasUsages() method on it for querying usage settings on its bit string.
- Support for additional input has been added for deterministic (EC)DSA.
- The OpenPGP API provides better support for subkey generation.
- BCJSSE: Added boolean system properties
'org.bouncycastle.jsse.client.dh.disableDefaultSuites' and
'org.bouncycastle.jsse.server.dh.disableDefaultSuites'.
Default 'false'. Set to 'true' to disable inclusion of DH
cipher suites in the default cipher suites for client/server
respectively.
- GCM-SIV has been added to the lightweight API and the provider.
- Blake3 has been added to the lightweight API.
- The OpenSSL PEMParser can now be extended to add specialised parsers.
- Base32 encoding has now been added, the default alphabet is from RFC 4648.
- The KangarooTwelve message digest has been added to the lightweight API.
- An implementation of the two FPE algorithms, FF1 and FF3-1 in SP 800-38G has been added to the lightweight API
and the JCE provider.
- An implementation of ParallelHash has been added to the lightweight API.
- An implementation of TupleHash has been added to the lightweight API.
- RSA-PSS now supports the use of SHAKE128 and SHAKE256 as the mask generation function and digest.
- ECDSA now supports the use of SHAKE128 and SHAKE256.
- PGPPBEEncryptedData will now reset the stream if the initial checksum fails so another password can be tried.
- Iterators on public and secret key ring collections in PGP now reflect the original order of the public/secret
key rings they contain.
- KeyAgreeRecipientInformation now has a getOriginator() method for retrieving the underlying orginator
information.
- PGPSignature now has a getDigestPrefix() method for people wanting exposure to the signature finger print
details.
- The old BKS-V1 format keystore is now disabled by default. If you need to use BKS-V1 for legacy reasons, it can
be re-enabled by adding: org.bouncycastle.bks.enable_v1=true to the java.security file. We would be interested
in hearing from anyone that needs to do this.
- PLAIN-ECDSA now supports the SHA3 digests.
- Some highlevel support for RFC 4998 ERS has been added for ArchiveTimeStamp and EvidenceRecord. The new classes
are in the org.bouncycastle.tsp.ers package.
- ECIES has now also support SHA256, SHA384, and SHA512.
- digestAlgorithms filed in CMS SignedData now includes counter signature digest algorithms where possible.
- A new property 'org.bouncycastle.jsse.config' has been added which can be used to configure the BCJSSE provider
when it is created using the no-args constructor.
- In line with changes in OpenSSL 1.1.0, OpenSSLPBEParametersGenerator can now be configured with a digest.
- PGPKeyRingGenerator now includes a method for adding a subkey with a primary key binding signature.
- Support for ASN.1 PRIVATE tags has been added.
- Performance enhancements to Nokeon, AES, GCM, and SICBlockCipher.
- Support for ecoding/decoding McElieceCCA2 keys has been added to the PQC API
- BCJSSE: Added support for jdk.tls.maxCertificateChainLength system property (default is 10).
- BCJSSE: Added support for jdk.tls.maxHandshakeMessageSize system property (default is 32768).
- BCJSSE: Added support for jdk.tls.client.enableCAExtension (default is 'false').
- BCJSSE: Added support for jdk.tls.client.cipherSuites system property.
- BCJSSE: Added support for jdk.tls.server.cipherSuites system property.
- BCJSSE: Extended ALPN support via standard JSSE API to JDK 8 versions after u251/u252.
- BCJSSE: Key managers now support EC credentials for use with TLS 1.3 ECDSA signature schemes (including
brainpool).
- TLS: Add TLS 1.3 support for brainpool curves per RFC 8734.
- BCJSSE: Added support for system property com.sun.net.ssl.requireCloseNotify. Note that we are using a
default value of 'true'.
- BCJSSE: 'TLSv1.3' is now a supported protocol for both client and server. For now it is only enabled by default
for the 'TLSv1.3' SSLContext, but can be explicitly enabled using 'setEnabledProtocols' on an SSLSocket or
SSLEngine, or via SSLParameters.
- BCJSSE: Session resumption is now also supported for servers in TLS 1.2 and earlier. For now it is disabled by
default, and can be enabled by setting the boolean system property
org.bouncycastle.jsse.server.enableSessionResumption to 'true'.
- The provider RSA-PSS signature names that follow the JCA naming convention.
- FIPS mode for the BCJSSE now enforces namedCurves for any presented certificates.
- PGPSignatureSubpacketGenerator now supports editing of a pre-existing sub-packet list.
- Performance improvement of Argon2 and Noekeon
- A setSessionKeyObfuscation() method has been added to PublicKeyKeyEncryptionMethodGenerator to allow turning
off of session key obfuscation (default is on, method primarily to get around early version GPG issues
with AES-128 keys)
- Implemented 'safegcd' constant-time modular inversion (as well as a variable-time variant). It has replaced
Fermat inversion in all our EC code, and BigInteger.modInverse in several other places, particularly signers.
This improves side-channel protection, and also gives a significant performance boost
- Performance of custom binary ECC curves and Edwards Curves has been improved
- BCJSSE: New boolean system property 'org.bouncycastle.jsse.keyManager.checkEKU' allows to disable
ExtendedKeyUsage restrictions when selecting credentials (although the peer may still complain)
- Initial support has been added for 'Composite Keys and Signatures For Use In Internet PKI' using the test OID.
Please note there will be further refinements to this as the draft is standardised
- The BC EdDSA signature API now supports keys implementing all methods on the EdECKey and XECKey interfaces
directly
- Further optimization work has been done on GCM
- A NewHope based processor, similar to the one for Key Agreement has been added for trying to 'quantum hard'
KEM algorithms
- PGP clear signed signatures now support SHA-224
- Treating absent vs NULL as equivalent can now be configured by a system property. By default this is not enabled
- Mode name checks in Cipher strings should now make sure an improper mode name always results in a
NoSuchAlgorithmException
- In line with changes in OpenSSL, the OpenSSLPBKDF now uses UTF8 encoding
- The qTESLA signature algorithm has been updated to v2.8 (20191108).
- BCJSSE: Client-side OCSP stapling now supports status_request_v2 extension.
- Support has been added for 'ocsp.enable', 'ocsp.responderURL' and PKIXRevocationChecker for users of
Java 8 and later.
- Support has been added for 'org.bouncycastle.x509.enableCRLDP' to the PKIX validator.
- BCJSSE: Now supports system property 'jsse.enableFFDHE'
- BCJSSE: Now supports system properties 'jdk.tls.client.SignatureSchemes' and 'jdk.tls.server.SignatureSchemes'.
- Multi-release support has been added for Java 11 XECKeys.
- Multi-release support has been added for Java 15 EdECKeys.
- The MiscPEMGenerator will now output general PrivateKeyInfo structures.
- A new property 'org.bouncycastle.pkcs8.v1_info_only' has been added to make the provider only produce version 1
PKCS8 PrivateKeyInfo structures.
- The PKIX CertPathBuilder will now take the target certificate from the target constraints if a specific
certificate is given to the selector.
- BCJSSE: A range of ARIA and CAMELLIA cipher suites added to supported list.
- BCJSSE: Now supports the PSS signature schemes from RFC 8446 (TLS 1.2 onwards).
- Performance of the Base64 encoder has been improved.
- The PGPPublicKey class will now include direct key signatures when checking for key expiry times.
- LMS and HSS (RFC 8554) support has been added to the low level library and the PQC provider.
- SipHash128 support has been added to the low level library and the JCE provider.
- BCJSSE: BC API now supports explicitly specifying the session to resume.
- BCJSSE: Ed25519, Ed448 are now supported when TLS 1.2 or higher is negotiated (except in FIPS mode).
- BCJSSE: Added support for extended_master_secret system properties: jdk.tls.allowLegacyMasterSecret,
jdk.tls.allowLegacyResumption, jdk.tls.useExtendedMasterSecret.
- BCJSSE: Ed25519, Ed448 are now supported when TLS 1.2 or higher is negotiated (except in FIPS mode).
- BCJSSE: KeyManager and TrustManager now check algorithm constraints for keys and certificate chains.
- BCJSSE: KeyManager selection of server credentials now prefers matching SNI hostname (if any).
- BCJSSE: KeyManager may now fallback to imperfect credentials (expired, SNI mismatch).
- BCJSSE: Client-side OCSP stapling support (beta version: via status_request extension only, provides
jdk.tls.client.enableStatusRequestExtension, and requires CertPathBuilder support).
- TLS: DSA in JcaTlsCrypto now falls back to stream signing to work around NoneWithDSA limitations in
default provider.
* Notes
- The deprecated QTESLA implementation has been removed from the BCPQC provider.
- The submission update to SPHINCS+ has been added. This changes the generation of signatures - particularly
deterministic ones.
- While this release should maintain source code compatibility, developers making use of some parts of the ASN.1
library will find that some classes need recompiling. Apologies for the inconvenience.
- There is a small API change in the PKIX package to the DigestAlgorithmIdentifierFinder interface as a find()
method that takes an ASN1ObjectIdentifier has been added to it. For people wishing to extend their own
implementations, see DefaultDigestAlgorithmIdentifierFinder for a sample implementation.
- A version of the bcmail API supporting Jakarta Mail has now been added (see bcjmail jar).
- Some work has been done on moving out code that does not need to be in the provider jar. This has reduced the
size of the provider jar and should also make it easier for developers to patch the classes involved as they no
longer need to be signed. bcpkix and bctls are both dependent on the new bcutil jar.
- The qTESLA update breaks compatibility with previous versions. Private keys now include a hash of the public
key at the end, and signatures are no longer interoperable with previous versions.
Add build dependencies on mvn(jakarta.activation:jakarta.activation-api) and mvn(jakarta.mail:jakarta.mail-api)
Remove unneeded script bouncycastle_getpoms.sh from sources
Build against the standalone JavaEE modules unconditionally
Build with source/target levels 8
Add glassfish-activation-api dependency so that we can build with JDK that does not contain the JavaEE modules
Add bouncycastle_getpoms.sh to get pom files from Maven repos
Add OSGi manifests to the distributed jars so that they can be used from eclipse (default enabled protocols).
bsf:
Provide bsf 2.4.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
bsh2:
Provide bsh2 2.0.0.b6 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
cal10n:
Update cal10n from version 0.7.7 to version 0.8.1.10. (jsc#SLE-23217)
* Fetch sources using source service from ch.qos git
* Upgrade to the 10th commit after 0.8.1 calling it 0.8.1.10
* Add the cal10n-ant-task to built artifacts
* This release adds JSR-269 support. In other words, verification of bundles can be performed at compilation time.
See the related documentation for more details.
* Fix issue with Eclipse not finding existing resources. Eclipse will find bundles located under
'src/main/resources' but still fail to find bundles located under 'src/test/resources/'.
* When reading in bundles, the verify method in MessageKeyVerifier now uses the locale passed as parameter instead
of always Locale.FR.
* Update build.xml-0.7.7.tar.xz to build.xml-0.8.1.tar.xz with references to version 0.8.1 to build correctly
versioned jar files.
cbi-plugins:
Build only on architectures where eclipse is supported. (jsc#SLE-23217)
Do not build against the legacy version of guava any more. (jsc#SLE-23217)
Fix build with newer auto version by adding the auto-value-annotations artifact to the dependencies
cdi-api:
Update cdi-api from version 1.2 to version 2.0.2. (jsc#SLE-23217)
* Build with java source and target levels 8
* Remove dependency on glassfish-el
cglib:
Update cglib from version 3.2.4 to version 3.3.0. (jsc#SLE-23217)
* Remove links between artifacts and their parent since we are not building with maven
* Don't inject true in cglib pom, as 3.3.0 already provides that option and it
makes the POM xml incorrect.
checker-qual:
Provide checker-qual version 3.22.0. (jsc#SLE-23217)
* Checker Qual contains annotations (type qualifiers) that a programmer writes to specify Java code for
type-checking by the Checker Framework.
* This is a dependency of Guava
classmate:
Provide classmate version 1.5.1 (jsc#SLE-23217)
codemodel:
Provide codemodel version 2.6 (jsc#SLE-23217)
codenarc:
Do not generate test stubs by gmavenplus-plugin, since we are not building or running tests during build.
Build with source and target levels 8 (jsc#SLE-23217)
concurrentlinkedhashmap-lru:
Provide concurrentlinkedhashmap-lru version 1.3.2 (jsc#SLE-23217)
decentxml:
Build with source and target levels 8 (jsc#SLE-23217)
dom4j:
Build against the standalone JavaEE modules unconditionally. (jsc#SLE-23217)
Add alias to the new artifact coordinates org.dom4j:dom4j. (jsc#SLE-23217)
Add jaxb-api dependency for relevant distribution versions so that we can build with JDKs that do not include the
JavaEE modules. (jsc#SLE-23217)
ecj:
Update ecj from version 4.12 to version 4.18. (jsc#SLE-23217)
* the encoding needs to be set for all JDK versions
* Upgrade to eclipse 4.18 ecj
* Switch java14api to java15api to be compatible to JDK 15
* Switch to JDK 11 for build a JDK 8 is not supported anymore by ecj
* Switch java10api to java14api to be compatible to JDK 14
eclipse:
Update eclipse from version 4.9.0 to version 4.15. (jsc#SLE-23217)
* Force building with Java 11, since tycho is not knowing about any Java >= 15
* Add support for riscv64
* Allow building with objectweb-asm 9.x
* Do not require Java10 APIs artifact when building with java 11
* Fix unresolved symbols when trying to load libkeystorelinuxnative.so on platforms that have it
* Build only on 64-bit architectures, since 32-bit support was dropped upstream
* Fix build with gcc 10
* Build against jgit, since jgit-bootstrap does not exist
* The dependencies of felix-scr changed. So stop linking xpp3 and kxml and link osgi.cmpn as symlink plugins.
* Filter out the *SUNWprivate_1.1* symbols from requires
eclipse-ecf:
Update eclipse-ecffrom version 3.14.1 to version 3.14.8. (jsc#SLE-23217)
* Build against jgit, since jgit-bootstrap does not exist
* Allow building with objectweb-asm 9.x
* Force building with Java 11, since tycho is not knowing about any Java >= 15
eclipse-egit:
Update eclipse-egit from version 5.1.3 to version 5.11.0. (jsc#SLE-23217)
* Needed because of change of eclipse-jgit to 5.11.0
* Force building with Java 11, since tycho is not knowing about any Java >= 15
* Build only on 64-bit architectures, since 32-bit support was dropped upstream
eclipse-emf:
Update eclipse-emf from version 2.15.0~gitd1e5fdd to version 2.22.0. (jsc#SLE-23217)
* Build against jgit, since jgit-bootstrap does not exist
* Force building with Java 11, since tycho is not knowing about any Java >= 15
* Build only on 64-bit architectures, since 32-bit support was dropped upstream
eclipse-jgit:
Update eclipse-jgit from version 5.1.3 to version 5.11.0. (jsc#SLE-23217)
* Fix build against apache-sshd 2.7.0
* Restore java 8 compatibility when building with java 9+
* Split the build into two spec files instead of multibuild. One produces the maven artifacts, the jgit
command-line and the other produces eclipse features.
eclipse-license:
Update eclipse-license from version 2.0.1 to version 2.0.2. (jsc#SLE-23217)
* Build only on architectures where eclipse is supported
* Force building with Java 11, since tycho is not knowing about any Java >= 15
* Update the eclipse-license2 feature to 2.0.0
eclipse-swt:
Provide eclipse-swt version 4.9.0 for i586 architecture. (jsc#SLE-23217)
ed25519-java:
Provide ed25519-java version 0.3.0. (jsc#SLE-23217)
ee4j:
Provide ee4j veersion 1.0.7
exec-maven-plugin:
Update exec-maven-plugin from version 1.6.0 to version 3.0.0. (jsc#SLE-23217)
extra166y:
Build with source and target levels 8 (jsc#SLE-23217)
ezmorph:
Do not build against the log4j12 packages. (jsc#SLE-23217)
Build with source and target levels 8. (jsc#SLE-23217)
felix-bundlerepository:
Provide felix-bundlerepository version 2.0.10. (jsc#SLE-23217)
felix-gogo-command:
Remove forcing of maven.compiler.release, since it is not needed anymore. (jsc#SLE-23217)
felix-gogo-runtime:
Rewrite the build system to ant so that is it possible to eventually avoid build cycles with maven-plugin-bundle
built against felix-bundlerepository. (jsc#SLE-23217)
felix-osgi-compendium:
Build with source and target levels 8 (jsc#SLE-23217)
felix-osgi-foundation:
Build with source and target levels 8 (jsc#SLE-23217)
felix-osgi-obr:
Provide felix-osgi-obr version 1.0.2. (jsc#SLE-23217)
felix-scr:
Update felix-scr from version 2.0.14 to version 2.1.16. (jsc#SLE-23217)
* Drop dependencies on kxml and xpp, use the system SAX implementation instead
* Do not embed dependencies, use import-package instead
felix-shell:
Rewrite the build system to ant so that is it possible to eventually avoid build cycles with maven-plugin-bundle
built against felix-bundlerepository. (jsc#SLE-23217)
Build against OSGi R7 APIs
felix-utils:
Update felix-utils from version 1.10.4 to version 1.11.4. (jsc#SLE-23217)
* Migrate away from the old felix-osgi implementation
fmpp:
Build with source and target levels 8 (jsc#SLE-23217)
freemarker:
Update freemarker from version 2.3.28 to version 2.3.31. (jsc#SLE-23217)
* Fix build with javacc 7.0.11
* Package the manual. Add build dependency on docbook5-xsl-stylesheets
* On supported platforms, avoid building with OpenJ9, in order to prevent build cycles
geronimo-specs:
Set version for the specs comming from tag 1_1_1 in order to avoid unexpanded version macros in pom files.
On supported platforms, avoid building with OpenJ9, in order to prevent build cycles.
glassfish-activation:
Provide glassfish-activation version 1.2.0. (jsc#SLE-23217)
glassfish-annotation-api:
Build with source and target levels 8 (jsc#SLE-23217)
glassfish-dtd-parser:
Provide glassfish-dtd-parser version 1.4 (jsc#SLE-23217)
glassfish-fastinfoset:
Provide glassfish-fastinfoset version 1.2.15. (jsc#SLE-23217)
glassfish-jaxb-api:
Provide glassfish-activation version 2.4.0. (jsc#SLE-23217)
glassfish-jaxb:
Provide glassfish-jaxb version 2.3.1. (jsc#SLE-23217)
glassfish-jax-rs-api:
Change the tarball location, since the old location does not work anymore
glassfish-jsp:
Build with source and target levels 8 (jsc#SLE-23217)
glassfish-servlet-api:
Provide glassfish-servlet-api 3.1.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
glassfish-transaction-api:
Build with target source and target levels 8. (jsc#SLE-23217)
Specify specMode=javaee to be able to use newer spec-version-maven-plugin.
gmavenplus-plugin:
Update gmavenplus-plugin from version 1.5 to version 1.13.1. (jsc#SLE-23217)
* Relevant fixes:
+ Using bindAllProjectProperties and bindSessionUserOverrideProperties together can cause an NPE.
+ Certain AST transformations had classloader issues because 1.12.0 was no longer setting the context classloader.
+ The classloader project dependencies are loaded onto is
reused between modules, so each module was a superset of all
modules that preceded it. Also, the console, execute, and
shell mojos didn't pass the classloader to use into the
instantiated GroovyConsole/GroovyShell, so it accidentally was
using the plugin classloader, even when configured to use
PROJECT_ONLY classpath.
Potentially breaking changes: This should be a non-breaking change (except for unusual situations that were
relying on the previous incorrect behavior). However, since it's a significant change, there's a version bump
for highlighitng the potential issue.
+ Disable system exits by default, to avoid potential thread safety issues.
* Potentially breaking changes: changes the default of not allowing System.exits to allowing them.
* Enhancements:
+ Add support for targetting Java 10, 11, 13, 14, 15, 17, 18.
+ Update Ant from 1.10.8 to 1.10.11.
+ Update Jansi to 2.x.
+ Change JDK compatibility check to also account for Java 16.
+ Some tweaks for Groovy 4 (most notably, invokedynamic is enabled by default for Groovy 4 and cannot be disabled).
+ New parameter (attachGroovyDocAnnotation) to enable attaching GroovyDoc annotation.
+ New parameter (parallelParsing) to enable parallel parsing (enabled by default with Groovy 4).
+ Remove previewFeatures parameter from stub generation goals, since it's not used there.
+ Ability to override classes used to generate GroovyDoc (#91)
+ Ability to override GStringTemplates used for GroovyDoc (#105)
+ Ability to bind overridden properties (by binding project properties and/or session user properties) (#72)
+ Ability to load a script when launching GroovyConsole (#165)
+ Change default GroovyDoc jar artifact type to javadoc, so its
extension gets set to 'jar' by the artifact handler instead of
'groovydoc' by the default handler logic which uses the type
for the extension in the case of unknown types (#151).
+ Add skipBytecodeCheck property and parameter, so if a Java
version comes out the plugin doesn't recognize, you can use it
without having to wait for an update.
+ Use groovy.ant.AntBuilder instead of groovy.util.AntBuilder (if available).
+ Support Java preview features (#125)
+ New goals to create GroovyDoc jars (#124)
+ Use the new 'groovy.console.ui.Console' package, if available, fall back to 'groovy.ui.Console'
+ [36] - Allow script files to be executed as filenames as well
as URLs (see Significant changes of note for an example)
+ [41] - Verify Groovy version supports target bytecode (See
Potentially breaking changes for a description)
+ [46] - Remove scriptExtensions config option
+ [31/58] - Goals not consistantly named / IntelliJ improperly
adding stub directories to sources
+ [61] - You can now skip Groovydoc generation with new
skipGroovyDoc property (Thanks rvenutolo!)
+ [45] - GROOVY-7423 (JEP 118) Support (requires Groovy
2.5.0-alpha-1 or newer and enabled with new parameters boolean
property)
* Potentially breaking changes:
+ 46 will break your build if you are using scriptExtensions.
But the fix is simple, just the delete the configuration option and GMavenPlus will automatically do the right
thing.
+ 41 will break your build if you were passing an invalid target bytecode. GMavenPlus will no longer allow Groovy
to silently default to 1.4 or 1.5. It will verify that the bytecode is supported by your Groovy version (that
is, the option exists in org.codehaus.groovy.control.CompilerConfiguration), and fail if it isn't.
+ 58 will require renaming goals testGenerateStubs to
generateTestStubs and testCompile to compileTests. IntelliJ has hard-coded the goal names in their plugin,
and these names will make IntelliJ work with both GMaven and GMavenPlus.
+ In order to support using the latest Maven plugins (and to make GMavenPlus easier to maintain), GMavenPlus
now requires Java 6 or newer and Maven 3.0.1 or newer (previously was Java 5 or newer and Maven 2.2.1 or newer).
+ testStubsOutputDirectory and stubsOutputDirectory inadvertently got renamed to outputDirectory, which conflicts
with the configuration in the compile and compileTests goals.
You may need to setup separate executions with separate configurations for each if you need to set that
configuration option.
+ The Jansi upgrade should generally be compatible, but could cause issues with scripts that were using Jansi 1.x
specific classes.
+ If you were using the previewFeatures parameter without also
including a compilation goal that would make that config
valid, the build will fail because it's no longer a valid
parameter. The fix would be to move that configuration to the
appropriate execution(s).
+ GroovyDoc jars and test GroovyDoc jars will now be of type
'javadoc' and have extension 'jar'. Rather than type and
extension 'groovydoc'. If you do not wish to transition to
this new behavior, set the new artifactType or
testArtifactType property to 'groovydoc' to revert to the
previous behavior.
Notes: while the artifact type of GroovyDoc jars has changed, the
Maven classifier has not. It remains 'groovydoc', and you can
still override that, just as before.
+ maven.groovydoc.skip property was renamed to skipGroovydoc so
it matches the pattern of the other properties and won't seem
to imply it's a property for a standard Maven plugin.
+ Using groovy.ant.AntBuilder instead of groovy.util.AntBuilder (when available on classpath).
+ Bundling Ant 1.10.7 instead of 1.10.5.
+ Bundling Ivy 2.5.0 instead of 2.4.0.
+ If you were using useSharedClasspath before, you will
need to replace it with new values. Please, check the docuemntation for the full details.
+ Another notable difference is that when using this new
configuration parameter in compile, compileTests,
generateStubs, or generateTestStubs goals, now also uses the
configurator to add the project dependencies to the classpath
with the plugin's dependencies. Previously, this only happened
in the goals other than the ones mentioned.
+ corrects an inadvertent breaking change made in 1.6.0
Please, check the documentation the full list of changes.
+ In addition, unused parameters have been removed:
* addSources
* -> skipTests
* -> testSources
* addStubSources
* -> skipTests
* -> sources
* -> testSources
* addTestSources
* -> outputDirectory
* -> skipTests
* -> sources
* addTestStubSources
* -> sources
* -> testSources
* compile
* -> skipTests
* -> testSources
* compileTests
* -> sources
* console
* -> skipTests
* execute
* -> skipTests
* generateStubs
* -> skipTests
* -> testSources
* generateTestStubs
* -> sources
* groovydoc
* -> skipTests
* -> testSources
* -> testGroovyDocOutputDirectory
* groovydocTests
* -> skipTests
* -> sources
* removeStubs
* -> skipTests
* -> sources
* -> testSources
* removeTestStubs
* -> sources
* -> testSources
* shell
* -> skipTests
+ Lastly, addTestStubSources and removeTestStubs now respect the skipTests flag, for consistency.
* Notes:
+ Now officially requires Java 7 instead of 6. This is not a breaking change, however, since this was actually
already required because of plexus-classworlds. This just wasn't discovered until an enforcer rule was added
to check bytecode versions of dependencies.
gmetrics:
Do not generate test stubs by gmavenplus-plugin, since we are not building or running tests during
build. (jsc#SLE-23217)
google-errorprone-annotations:
Provide google-errorprone-annotations 2.11.0. (jsc#SLE-23217)
* This is a new dependency of Guava
google-gson:
Update google-gson to version 2.8.9. (jsc#SLE-24261)
* Make OSGi bundle's dependency on sun.misc optional.
* Deprecate Gson.excluder() exposing internal Excluder class.
* Prevent Java deserialization of internal classes.
* Improve number strategy implementation.
* Fix LongSerializationPolicy null handling being inconsistent with Gson.
* Support arbitrary Number implementation for Object and Number deserialization.
* Bump proguard-maven-plugin from 2.4.0 to 2.5.1.
* Fix RuntimeTypeAdapterFactory depending on internal Streams class.
* Build with Java >= 9 in order to produce a modular jar by compiling the module-info.java sources with all other
classes built with release 8 and still compatible with Java 8
google-guice:
Avoid using xmvn-resolve and xmvn-install in order to avoid build cycles with new dependencies in dependent packages
Build only the NO_AOP version of the guice.jar and alias accordingly so that it provides both (jsc#SLE-23217)
Build with source/target 8 so that the default override from the interface can be used
Build javadoc with source level 8
Do not build against the compatibility guava20 (jsc#SLE-23217)
google-http-java-client:
Build with source and target levels 8 (jsc#SLE-23217)
google-oauth-java-client:
Build with source and target levels 8 (jsc#SLE-23217)
gpars:
Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
Build against the org.jboss.netty:netty artifact, since the compat versions are not existing any more
Build with source and target levels 8
gradle-bootstrap:
Update gradle-bootstrap from version 2.4.16 to version 2.4.21. (jsc#SLE-23217)
* Regenerate to account for changes in gradle and groovy packages
* Modify the launcher so that gradle-bootstrap can work with Java 17
* Adapt to the change in jline/jansi dependencies of gradle
* The org.jboss.netty:netty artifact does not exist any more under compatibility versions
* Regenerate to account for maven-resolver upgrade to 1.7.3 and the new added maven-resolver-named-locks artifact
* Regenerate to account for aqute-bnd upgrade to 5.1.1 and related changes in other libraries
* Regenerate to account for guava upgrade to 30.1.1
* Regenerate to account for groovy upgrade to 2.4.21
gradle:
Allow actually build gradle using Java 16+
Modify the launcher so that gradle can work with Java 17
Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
Build against jansi 2.x
Remove the jansi-native and hawtjni-runtime dependencies, since jansi 2.x does not depend on them
Fix build with maven-resolver 1.7.x
Remove from build dependencies some artifacts that are not needed
Add osgi-compendium to the dependencies, since newer qute-bnd uses it
Do not build against the legacy guava20 package any more
Port gradle 4.4.1 to guava 30.1.1
Set source level to 1.8, since guava 30 uses default functions in interfaces, which is Java 8+ feature
groovy:
Solve illegal reflective access with Java 16+
Do not force building with java <= 15, since we now can run gradle-bootstrap with Java 17 too. (jsc#SLE-23217)
Add the content of org.gradle.jvmargs to to the forked jvm in root compileJava task
Fixes build with Java 17
Port to build against jansi 2.4.0
Build the whole with java source and target levels 8
Resolve parameter ambiguities with recent Java versions
Remove a bogus dependency on old asm3
groovy18:
Fix build against jansi 2.4.0
Port to use jline 2.x instead of 1.x
Do not fork the groovyc and java tasks in the ant build.xml file, so that the ANT_OPTS are propagated to the tasks
Fix build with jdk17
Build with source and target levels 8. (jsc#SLE-23217)
Cast to Collection to help compiler to resolve ambiguities with new JDKs
Remove dependency on the old asm3
guava20:
Build with java source and target levels 8. (jsc#SLE-23217)
Add bundle manifest to the guava jar so that it might be usable from eclipse
guava:
Update Guava from version 25.0 to version 30.1.1. (jsc#SLE-23217)
* CVE-2020-8908: A temp directory creation vulnerability allows an attacker with access to the machine to
potentially access data in a temporary directory created by the Guava
com.google.common.io.Files.createTempDir(). (bsc#1179926)
* Remove parent reference from ALL distributed pom files
hamcrest:
Build with source/target levels 8
Fix build with jdk17
hawtjni-maven-plugin:
Update hawtjni-maven-pluginfrom version 1.17 to version 1.18. (jsc#SLE-23217)
* Build with java source and target levels 8
* Use commons-lang3 instead of the old commons-lang
hawtjni-runtime:
Update hawtjni-runtime from version 1.17 to version 1.18. (jsc#SLE-23217)
* Build with java source and target levels 8
* Use commons-lang3 instead of the old commons-lang
* Use in the path of hawtjni-generator the asm-all.jar that is not modular. This solves some problems with ASM
version mismatch.
http-builder:
Build with source and target levels 8. (jsc#SLE-23217)
Do not require gmavenplus-plugin, since it is only necessary to generate test stubs, but we do not run tests during
build
httpcomponents-client:
Update httpcomponents-client from version 4.5.6 to version 4.5.12. (jsc#SLE-23217)
* Build with source/target levels 8
httpcomponents-core:
Update httpcomponents-core from version 4.4.10 to version 4.4.13. (jsc#SLE-23217)
* Build with source/target levels 8
icu4j:
Update icu4j from version 63.1 to version 71.1. (jsc#SLE-23217)
* Remove build-dependency on java-javadoc, since it is not necessary with this version.
* Updates to CLDR 41 locale data with various additions and corrections.
* Adds phrase-based line breaking for Japanese. Existing line breaking methods follow standards and conventions for
body text but do not work well for short Japanese text, such as in titles and headings. This new feature is
optimized for these use cases.
* Adds support for Hindi written in Latin letters (hi_Latn). The CLDR data for this increasingly popular locale has
been significantly revised and expanded. Note that based on user expectations, hi_Latn incorporates a large amount
of English, and can also be referred to as 'Hinglish'.
* ICU 71 and CLDR 41 are minor releases, mostly focused on bug fixes and small enhancements.
* Updates to the time zone data version 2022a. Note that pre-1970 data for a number of time zones has been removed,
as has been the case in the upstream tzdata release since 2021b.
* Unicode 13 (ICU-20893, same as in ICU 66)
* CLDR 37
+ New language at Modern coverage: Nigerian Pidgin
+ New languages at Basic coverage: Fulah (Adlam), Maithili, Manipuri, Santali, Sindhi (Devanagari), Sundanese
+ Unicode 13 root collation data and Chinese data for collation and transliteration
* DateTimePatternGenerator now obeys the 'hc' preference in the locale identifier (ICU-20442)
* Various other improvements for ECMA-402 conformance
* Number skeletons have a new 'concise' form that can be used in MessageFormat strings (ICU-20418)
* Currency formatting options for formal and other currency display name variants (ICU-20854)
* ListFormatter: new public API to select the style and type
* Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272)
* LocaleMatcher: New option to ignore one-way matches, and other tweaks to the code and data
isorelax:
Build with java target and source version 1.8 (jsc#SLE-23217)
istack-commons:
Provide istack-commons version 3.0.7 (jsc#SLE-23217)
j2objc-annotations:
Provide j2objc-annotations version 2.2 (jsc#SLE-23217)
* This is a new dependency of Guava
jackson-modules-base:
Provide jackson-modules-base version 2.13.3 (jsc#SLE-23217)
jackson-parent:
Update jackson-parent from version 2.10 to version 2.13. (jsc#SLE-23217)
* Add 'mvnw' wrapper
* 'JsonSubType.Type' should accept array of names
* Jackson version alignment with Gradle 6
* Add '@JsonIncludeProperties'
* Add '@JsonTypeInfo(use=DEDUCTION)'
* Ability to use '@JsonAnyGetter' on fields
* Add '@JsonKey' annotation
* Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
* Add 'namespace' property for '@JsonProperty' (for XML module)
* Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue' (was missing for some reason)
* 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
* Remove `jackson-annotations` baseline dependency, version
* Upgrade to oss-parent 43 (jacoco, javadoc plugin versions)
* Remove managed junit version (due to [jackson-bom#43]), promoted higher up on parent pom stack (to 'jackson-base')
* JDK baseline now JDK 8
jackson:
Remove all dependencies on asm3
Build with java source and target levels 1.8 (jsc#SLE-23217)
Do not hardcode source and target levels, so that they can be overriden on command-line
Set classpath correctly so that the project builds with standalone JavaEE modules too
jakarta-activation:
Provide jakarta-activation version 2.1.0. (jsc#SLE-23217)
* Required by bouncycastle-jmail.
jakarta-commons-discovery:
Distribute commons-discovery as maven artifact
Build with source and target levels 8
Added build support for Enterprise Linux.
jakarta-commons-modeler:
Update jakarta-commons-modeler from version 2.0 to version 2.0.1. (jsc#SLE-23217)
* Build with java source and target levels 8
* Modeler 2.0.1 is binary and source compatible with Modeler 2.0
jakarta-mail:
Provide jakarta-mail version 2.1.0. (jsc#SLE-23217)
* Requrired by bouncycastle-jmail.
jakarta-taglibs-standard:
Provide jakarta-taglibs-standard 1.1.1 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
jandex:
Provide jandex version 2.4.2. (jsc#SLE-23217)
janino:
Update janino from version 2.7.8 to version 3.1.6. (jsc#SLE-23217)
* Build with source and target levels 8
* Require javapackages-tools
* Provide commons-compiler subpackage that is needed by gradle
jansi-native:
Build with source and target levels 8 (jsc#SLE-23217)
jansi:
Update jansi from version 1.17.1 to version 2.4.0. (jsc#SLE-23217)
* Build with source and target levels 8
* Give a possibility to load the native libjansi.so from system
* Make the jansi package archful since it installs a native library and jni jar
* Do not depend on jansi-native and hawtjni-runtime
* Integrates jansi-native libraries
jarjar:
Filter out the distributionManagement section from pom files, since we use aliases and not relocations
Drop maven2-plugin. (jsc#SLE-23217)
jatl:
Build with source and target levels 8 (jsc#SLE-23217)
javacc-maven-plugin:
Build with source and target levels 8 (jsc#SLE-23217)
javacc:
Update javacc from version 7.0.4 to version 7.0.11. (jsc#SLE-23217)
* The following changes are not upward compatible with the previous 7.0.5 version but have a very little impact on
existing grammars. Main advantage is to prepare a more smooth upgrade with the upcoming javacc-8.0.0 major release.
* C++ generation: renaming the option TOKEN_EXTENDS by TOKEN_SUPER_CLASS
* C++ generation: renaming the option TOKEN_INCLUDES by TOKEN_INCLUDE
* C++ generation: renaming the option PARSER_INCLUDES by PARSER_INCLUDE
* C++ generation: renaming the option TOKEN_MANAGER_INCLUDES by TOKEN_MANAGER_INCLUDE
* Add support for Java7 language features.
* Allow empty type parameters in Java code of grammar files.
* LookaheadSuccess creation performance improved.
* Removing IDE specific files.
* Declare trace_indent only if debug parser is enabled.
* CPPParser.jj grammar added to grammars.
* Build with Maven is working again.
* WARNING: Required Java Platform: Standard Edition 7.0: known under Eclipse as JavaSE-1.7
* Build with source/target levels 8
java-cup:
Update java-cup from version 11a to version 11b. (jsc#SLE-23217)
* Regenerate the generated files with newer flex
* Fetch sources using source service
java-cup-bootstrap:
Update java-cup-bootstrap from version 11a to version 11b. (jsc#SLE-23217)
* Regenerate the generated files with newer flex
* Fetch sources using source service
javaewah:
Build with source and target levels 8 (jsc#SLE-23217)
javamail:
Add alias to com.sun.mail:jakarta.mail needed by ant-javamail
Remove all parents, since this package is not built with maven
Assure that every dependency has a version, or at least 'any' and fixes use with gradle. (jsc#SLE-23217)
Build against the standalone JavaEE modules unconditionally
Build with source/target levels 8
Add glassfish-activation-api dependency for relevant distribution versions to make buildable with JDK that does
not contain the JavaEE modules
javapackages-meta:
Fix requires not to have to redo the package on each javapackages-tools update. (jsc#SLE-23217)
javapackages-tools:
Update javapackages-tools from version 5.3.0 to version 5.3.1. (jsc#SLE-23217)
* Let maven_depmap.py generate metadata with dependencies under certain circumstances
* Fix the python subpackage generation with python-rpm-macro
* Support python subpackages for each flavor
* Replace old nose with pytest gh#fedora-java/javapackages#86
* when building extra flavor, BuildRequire javapackages-filesystem: /etc/java is being cleaned out of the
filesystems package.
javaparser:
Update javaparser from version 3.3.5 to version 3.24.2. (jsc#SLE-23217)
* Upgrade needed to be able to upgrade jctools and make them not depend hard on Java 8.
For the full changelog, please refer to the official documentation.
javassist:
Update javassist from version 3.23.1 to version 3.29.0. (jsc#SLE-23217)
* Requires java >= 1.8
* Add OSGi manifest to the javassist.jar
* For the full changelog, please check the official documentation.
jboss-interceptors-1.2-api:
Build with source and target levels 8 (jsc#SLE-23217)
jboss-websocket-1.0-api:
Build with source and target levels 8 (jsc#SLE-23217)
jcache:
Provide jcache version 1.1.0 (jsc#SLE-23217)
jcifs:
Build with source and target levels 8 (jsc#SLE-23217)
jcip-annotations:
Provide jcip-annotations 1.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
jcsp:
Build with source and target levels 8 (jsc#SLE-23217)
jctools:
Update jctools from version 2.1.2 to version 3.3.0. (jsc#SLE-23217)
* Build with java source and target levels 8
* API Changes:
* Removed MpscLinkedQueue7 and MpscLinkedQueue8 and consolidated into parent. This removes the need for the
builder method on MpscLinkedQueue.
* Deprecated QueueFactory and spec package classes. These are not used by any users and are only used for
testing internally.
* Removed some internal classes and reduced visibility of internal utilities where practical. The @InternalAPI
tagging annotation is also used more extensively to discourage dependency.
* XADD unbounded mpsc/mpmc queue: highly scalable linked array queues
* New blocking consumer MPSC
* Enhancements:
* Xadd queues consumers can help producers
* Update to latest JCStress
* New features:
* MpscBlockingConsumerArrayQueue
* After long incubation and following a user request we move counters into core
* Merging some experimental utils and we add a 'PaddedAtomicLong'
* MpscBlockingConsumerArrayQueue::offerIfBelowThreshold is added
jdependency:
Build with source and target levels 8 (jsc#SLE-23217)
jdepend:
Update jdepend from version 2.9.1 to version 2.10. (jsc#SLE-23217)
* Specify the source/target levels 8 on ant invocation
* Official release that includes support for Java 8 constants
* Updated license from BSD-3 Clause to MIT (as per LICENSE.md file).
jdom:
Update jdom from version 1.1.1 to version 1.1.6. (jsc#SLE-23217)
* CVE-2021-33813: XXE issue in SAXBuilder can cause a denial of service via a crafted HTTP request (bsc#1187446)
* Remove unneeded dependency on glassfish-jaxb-api
* Build against the standalone JavaEE modules unconditionally
* Build with source/target levels 8
* Build against standalone jaxb-api on distributions that have JDK without the JavaEE modules
* Alias the xom artifact to the new com.io7m.xom groupId
* Update jaxen to version 1.1.6
* Increase java stack size to avoid overflow
jdom2:
Update jdom2 from version 2.0.6 to version 2.0.6.1. (jsc#SLE-23217)
* CVE-2021-33813: Fixed XXE issue in SAXBuilder that can cause a denial of service via a crafted HTTP request.
(bsc#1187446)
* Build with java-devel >= 1.7
jettison:
Update from version 1.3.7 to version 1.5.3 (jsc#SLE-23217)
CVE-2022-45685: Fixed stack overflow on malformed input. (bsc#1206400)
CVE-2022-45693: Fixed stack overflow when creating a JSON from a HashMap. (bsc#1206401)
CVE-2022-40149: Fixed stack overflow on malformed JSONs. (bsc#1203515)
CVE-2022-40150: Fixed infinite loop on non-terminated comments. (bsc#1203516)
Introducing new static methods to set the recursion depth limit
Incorrect recursion depth check in JSONTokener
Build with source and target levels 8
jetty-minimal:
Update jetty-minimal from version 9.4.43.v20210629 to version 9.4.48.v20220622 (jsc#SLE-23217)
* CVE-2022-2047: Invalid URI parsing may produce invalid HttpURI.authority. (bsc#1201317)
* CVE-2022-2048: Invalid HTTP/2 requests can lead to denial of service (bsc#1201316)
* Make importing of package sun.misc optional since not all jdk versions export it
* Build with java source and target levels 8
* Fix javadoc generation on JDK >= 13
* Option --write-module-graph produces wrong .dot file
* ArrayTrie getBest fails to match the empty string entry in certain cases
* For the full set of changes, please check the official documentation.
jetty-websocket:
Update jetty-websocket from version 9.4.43.v20210629 to version 9.4.48.v20220622 (jsc#SLE-23217)
* CVE-2022-2047: Invalid URI parsing may produce invalid HttpURI.authority. (bsc#1201317)
* CVE-2022-2048: Invalid HTTP/2 requests can lead to denial of service (bsc#1201316)
* Make importing of package sun.misc optional since not all jdk versions export it
* Build with java source and target levels 8
* Fix javadoc generation on JDK >= 13
* Option --write-module-graph produces wrong .dot file
* Make importing of package sun.misc optional since not all jdk versions export it
jeuclid:
Update jeuclid from version 3.1.3 to version 3.1.9. (jsc#SLE-23217)
* Build with source and target levels 8
* This version includes several changes and improvements. For the full overview please check the changelog.
jflex:
Update jflex from version 1.4.3 to version 1.8.2. (jsc#SLE-23217)
* Build against the standalone JavaEE modules unconditionally
* Build against standalone glassfish-annotation-api for relevant distribution versions that have JDK that does not
contain the JavaEE modules
* Fix build with recent java-cup
* Build the bootstrap package using ant with a generated build.xml
* Build the non-bootstrap package using maven, since its dependency auto is already built with maven
* Do not process auto-value-annotations in bootstrap build
jflex-bootstrap:
Update jflex-bootstrap from version 1.4.3 to version 1.8.2. (jsc#SLE-23217)
* Build against the standalone JavaEE modules unconditionally
* Build against standalone glassfish-annotation-api for relevant distribution versions that have JDK that does not
contain the JavaEE modules
* Fix build with recent java-cup
* Build the bootstrap package using ant with a generated build.xml
* Build the non-bootstrap package using maven, since its dependency auto is already built with maven
* Do not process auto-value-annotations in bootstrap build
jformatstring:
Build with source and target levels 8 (jsc#SLE-23217)
jgit:
Provide jgit version 5.11.0. (jsc#SLE-23217)
* Fix build against apache-sshd 2.7.0
* Restore java 8 compatibility when building with java 9+
* Split the build into two spec files instead of multibuild. One produces the maven artifacts, the jgit
command-line and the other produces eclipse features.
jhighlight:
Build with source and target levels 8 (jsc#SLE-23217)
jing-trang:
Update jing-trang from version 20151127 to version 20181222. (jsc#SLE-23217)
* Avoid building old saxon validator in order to avoid dependency on old saxon6
* Do not use xmvn-tools, since this is a ring package
* Package maven metadata
* Use testng in build process
* Require com.github.relaxng:relaxngDatatype >= 2011.1
* Require xml-resolver:xml-resolver
jline:
Build with source and target levels 8 (jsc#SLE-23217)
Remove dependency on jansi-native and hawtjni-runtime
Fix jline build against jansi 2.4.x
jline1:
Build with source and target levels 8 (jsc#SLE-23217)
jna:
Update jna from version 5.4.0 to version 5.5.0. (jsc#SLE-23217)
* Build with java source/target levels 8
* Features:
* Add CoreFoundation, IOKit, and DiskArbitration mappings in c.s.j.p.mac.
* c.s.j.p.mac.SystemB now extends c.s.j.p.unix.LibCAPI.
* Add additional OSGi headers for the JNA bundle to support 32bit ARM (hardfloat)
* Include Win32 COM utils (c.s.j.p.win32.com.util and c.s.j.p.win32.com.annotation) in OSGI bundle
joda-convert:
Build with java source and target levels 8. (jsc#SLE-23217)
Do not use the legacy guava20 any more
joda-time:
Build with source and target levels 8 (jsc#SLE-23217)
jsch-agent-proxy:
Build with source and target levels 8 (jsc#SLE-23217)
jsch:
Build with source and target levels 8 (jsc#SLE-23217)
json-lib:
Do not build against the log4j12 packages
Build with source and target levels 8 (jsc#SLE-23217)
Do not depend on the old asm3
Fix build with jdk17
Specify source and target levels 8 for maven-antrun-plugin and for groovyc ant task
jsonp:
Build with java source and target levels 8. (jsc#SLE-23217)
Build against standalone annotation api
jsr-311:
Build with source and target levels 8 (jsc#SLE-23217)
jtidy:
Build with java source and target levels 8. (jsc#SLE-23217)
Rewamp and simplify the build system
junit:
Update junit from version 4.12 to version 4.13.2. (jsc#SLE-23217)
* CVE-2020-1945: insecure temporary file vulnerability (bsc#1171696)
* Build with source/target levels 8
junit5:
Update from version 5.5.2 to version 5.8.2. (jsc#SLE-23217)
* This is a bugfix update. For the complete overview please check the documentation.
jython:
Change dependencies to Python 3. (jsc#SLE-23217)
Build with java source and tartget level 1.8
jzlib:
Build with source and target levels 8 (jsc#SLE-23217)
kryo:
Provide kryo 4.0.2 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
kxml:
Fetch the sources using https instead of http protocol. (bsc#1182284)
Specify java source and target levels 1.8
libreadline-java:
Provide libreadline-java 0.8.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
log4j:
Add dependency on standalone javax.activation-api that is not included in newer JDKs. (jsc#SLE-23217)
logback:
Update logback from version 1.2.8 to version 1.2.11. (jsc#SLE-23217)
* CVE-2021-42550: remote code execution through JNDI call from within its configuration file. (bsc#1193795)
* Hardened logback's JNDI lookup mechanism to only honor requests in the java: namespace. All other types of
requests are ignored.
* SMTPAppender was hardened.
* Temporarily removed DB support for security reasons.
* Removed Groovy configuration support. As logging is so pervasive and configuration with Groovy is probably too
powerful, this feature is unlikely to be reinstated for security reasons.
* Set project.build.sourceEncoding property to ISO-8859-1 to avoid the new maven-resources-plugin chocking on
trying to filter in UTF-8 encoding JKS (binary) resources
* Do not build against the log4j12 packages
lucene:
Update lucene from version 7.1.0 to version 8.5.0. (jsc#SLE-23217)
* Do not abort compilation on html5 errors with javadoc 17
* Upgrade forbiddenapis to version 2.7; upgrade Groovy to 2.4.17.
* Upgrade ecj to 3.19.0 to fix sporadic precommit javadoc issues
* This update includes several API changes, runtime behavior, bugfixes and new features. For a full overview,
please check the official documentation.
maven:
Update maven from version 3.6.3 to version 3.8.5. (jsc#SLE-23217)
* CVE-2021-26291: block repositories using http by default. (bsc#1188529)
* CVE-2020-13956: incorrect handling of malformed URI authority component. (bsc#1177488)
* Upgrade Maven Wagon to 3.5.1
* Upgrade Maven JAR Plugin to 3.2.2
* Upgrade Maven Parent to 35
* Upgrade Maven Resolver to 1.6.3
* Upgrade Maven Shared Utils to 3.3.4
* Upgrade Plexus Utils to 3.3.0
* Upgrade Plexus Interpolation to 1.26
* Upgrade Plexus Cipher and Sec Dispatcher to 2.0
* Upgrade Sisu Inject/Plexus to 0.3.5
* Upgrade SLF4J to 1.7.32
* Upgrade Jansi to 2.4.0
* Upgrade Guice to 4.2.2
* Fix syntax error with qdox 2.0.1 and method declarations containing the new keyword 'record' as name of variables
* Fix build with modello-2.0.0
* Remove using of alternatives, since the symlinks are in a separate package that one can decide not to install and
this is the only provider for mvn and mvnDebug links
* Use libalternatives instead of update-alternatives.
* Remove dependency on cglib and aopalliance, since the no_aop version of guice does not really depend on them
* Fix build with the API incompatible maven-resolver 1.7.3
* Link the new maven-resolver-named-locks artifact too
* Add upstream signing key and verify source signature
* Do not build against the compatibility version guava20 any more, but use the default guava package
* This update includes several bugfixes and new features. For a full overview, please check the official
documentation.
maven2:
Fix build with modello 2.0.0. (jsc#SLE-23217)
Build with source and target levels 8
maven-antrun-plugin:
Update maven-antrun-plugin from version 1.8 to version 3.0.0. (jsc#SLE-23217)
* Removal of tasks (use target instead), sourceRoot and testSourceRoot parameters
* Compatibility with new JDK versions
* Build with java source and target levels 8
maven-archiver:
Build with source and target levels 8 (jsc#SLE-23217)
maven-artifact-resolver:
Build with source and target levels 8 (jsc#SLE-23217)
maven-artifact-transfer:
Update maven-artifact-transfer from version 0.11.0 to version 0.13.1. (jsc#SLE-23217)
* Remove the old org.sonatype.aether dependencies, since we don't need maven 3.0.x
* Build with source and target levels 8
* Do not use the legacy guava20 any more
* Fix build against newer maven
maven-assembly-plugin:
Update maven-assembly-plugin from version 3.2.0 to version 3.3.0. (jsc#SLE-23217)
* Add Documentation for duplicateBehaviour option
* Allow to override UID/GID for files stored in TAR
* Apply try-with-resources
* Use HTTPS instead of HTTP to resolve dependencies
* Support concatenation of files
maven-clean-plugin:
Build with source and target levels 8 (jsc#SLE-23217)
maven-common-artifact-filters:
Build with source and target levels 8 (jsc#SLE-23217)
maven-compiler-plugin:
Update maven-compiler-plugin from version 3.8.1 to version 3.10.1. (jsc#SLE-23217)
* Remove deprecated mojos
* Add flag to enable-preview java compiler feature
* Add a boolean to generate missing package-info classes by default
* Check jar files when determining if dependencies changed
* Compile module descriptors with TestCompilerMojo
* Changed dependency detection
maven-dependency-analyzer:
Build with source and target levels 8. (jsc#SLE-23217)
Do not build against the legacy guava20 any more
maven-dependency-plugin:
Update maven-dependency-plugin from version 3.1.1 to version 3.1.2. (jsc#SLE-23217)
* Add a TOC to ease navigating to each goal usage
* Add note on dependecy:tree -Dverbose support in 3.0+
* Perform transformation to artifact keys just once
* Remove @param for a parameter which does not exists.
* Remove newline and trailing space from log line.
* Replace CapturingLog class with Mockito usage
* Rewrite go-offline so it resembles resolve-plugins
* Switch to asfMavenTlpPlgnBuild
* Update ASM so it works with Java 13
* Upgrade maven-artifact-transfer to 0.11.0
* Upgrade maven-common-artifact-filters to 3.1.0
* Upgrade maven-dependency-analyzer to 1.11.1
* Upgrade maven-plugins parent to version 32
* Upgrade maven-shared-utils 3.2.1
* Upgrade parent POM from 32 to 33
* Upgrade plexus-archiver to 4.1.0
* Upgrade plexus-io to 3.1.0
* Upgrade plexus-utils to 3.3.0
* Use https for sigs, hashes and KEYS
* Use sha512 checksums instead of sha1
maven-dependency-tree:
Update maven-dependency-tree from version 3.0 to version 3.0.1. (jsc#SLE-23217)
* Build with java source and target levels 8
* Do not build against the legacy guava20 any more
* Fixed JavaDoc issue for JDK 8
* maven-dependency-tree removes optional flag from managed dependencies
* Change characters used to diplay trees to make relationships clearer
* Pass source+target to m-invoker-p, easiest way to override default values of maven-compiler-plugin
* Upgrade org.codehaus.plexus:plexus-component-metadata to 1.7.1
maven-doxia:
Fix build with modello 2.0.0 (jsc#SLE-23217)
Do not build against the log4j12 packages. (jsc#SLE-23217)
Fix the version of the log4j that doxia-module-fo needs at runtime. (jsc#SLE-23217)
Do not build against the legacy guava20 any more. (jsc#SLE-23217)
maven-doxia-sitetools:
Fix build with modello 2.0.0 (jsc#SLE-23217)
Build with source and target levels 8 (jsc#SLE-23217)
Do not build against the legacy guava20 any more. (jsc#SLE-23217)
maven-enforcer:
Build with source and target levels 8 (jsc#SLE-23217)
maven-file-management:
Build with java source and target levels 8 (jsc#SLE-23217)
Fix build with modello 2.0.0
maven-filtering:
Update maven-filtering from version 3.1.1 to version 3.2.0 (jsc#SLE-23217)
* Allow using a different encoding when filtering properties files
* Upgrade plexus-interpolation to 1.25
* Upgrade maven-shared-utils to 3.2.1
* Upgrade plexus-utils to 3.1.0
* Upgrade parent to 32
* Upgrade maven-surefire/failsafe-plugin to 2.21.0 for JDK 10
* Upgrade maven-artifact-transfer to version 0.9.1
* Upgrade JUnit to 4.12
* Upgrade plexus-interpolation to 1.25
* Build with java source and target levels 8
* Do not build against legacy guava20 any more
maven-install-plugin:
Update maven-install-plugin from version 2.5.2 to version 3.0.0. (jsc#SLE-23217)
* Upgrade plexus-utils to 3.2.0
* Upgrade maven-plugins parent version 32
* Upgrade maven-plugin-testing-harness to 1.3
* Upgrade maven-shared-utils to 3.2.1
* Upgrade maven-shared-components parent to version 33
* Upgrade of commons-io to 2.5.
maven-invoker:
Update maven-invoker from version 3.0.1 to version 3.1.0. (jsc#SLE-23217)
* Build with java source and target levels 8
* Fixes build with maven-shared-utils 3.3.3
* Upgrade maven-shared-utils to 3.2.1
* Upgrade parent to 31
* Upgrade to JDK 7 minimum
* Refactored to use maven-shared-utils instead of plexus-utils.
* Remove hardcoded versions for plexus-component-annotations/plexus-component-metadata
maven-jar-plugin:
Update maven-jar-plugin from version 3.2.0 to version 3.2.2. (jsc#SLE-23217)
* Upgrade Maven Archiver to 3.5.2
* Upgrade Plexus Utils to 3.3.1
* Upgrade plexus-archiver 3.7.0
* Upgrade JUnit to 4.12
* Upgrade maven-plugins parent to version 32
* Build with java source and target levels 8
* Don't log a warning when jar will be empty and creation is forced
* Reproducible Builds: make entries in output jar files reproducible (order + timestamp)
maven-javadoc-plugin:
Update maven-javadoc-plugin from versionn 3.1.1. to version 3.3.2. (jsc#SLE-23217)
* Fix build with modello 2.0.0
* Use the same encoding when writing and getting the stale data
* Fixes build with utf-8 sources on non utf-8 platforms
* Do not build against the legacy guava20 package anymore
maven-mapping:
Provide maven-mapping version 3.0.0. (jsc#SLE-23217)
* Required by bnd-maven-plugin
maven-plugin-build-helper:
Update maven-plugin-build-helper from version 1.9.1 to version 3.2.0. (jsc#SLE-23217)
* Set a property based on the maven.build.timestamp
* rootlocation does not correctly work
* Add profile to avoid showing warnings for maven plugin plugin goals not supported in m2e
* Site: Properly showing 'value' tag on regex-properties usage page
* Integration test reserve-ports-with-urls fails on windows
maven-plugin-bundle:
Fix building with the new maven-reporting-api . (jsc#SLE-23217)
Build with the osgi bundle repository by default
maven-plugin-testing:
Fix build against newer maven. (jsc#SLE-23217)
Do not build against the legacy guava20 package any more
Build with source and target levels 8
maven-plugin-tools:
Fix build with modello 2.0.0. (jsc#SLE-23217)
Do not force building with java-1_8_0-openjdk, since the package builds just fine with higher versions.
Do not build against the legacy guava20 package any more
maven-remote-resources-plugin:
Update maven-remote-resources-plugin from version 1.5 to version 1.7.0. (jsc#SLE-23217)
* use reproducible project.build.outputTimestamp
* use sha512 checksums instead of sha1
* use https for sigs, hashes and KEYS
* Upgrade plexus-utils from 3.0.24 to 3.1.0
* Upgrade plexus-interpolation to 1.25
* Upgrade JUnit to 4.12
* Upgrade parent to 32
* Upgrade maven-filtering to 3.1.1
* Upgrade plexus-resources from 1.0-alpha-7 to 1.0.1
* Avoid overwrite of the destination file if the produced contents is the same
* Remove unused dependency maven-monitor
* Upgrade to maven-plugins parent version 27
* Upgrade maven-plugin-testing-harness to 1.3
* Updated plexus-archiver
* Build with source and target levels 8
maven-reporting-api:
Update maven-reporting-api from version 3.0 to version 3.1.0. (jsc#SLE-23217)
* Build with source and target levels 8
* make build Reproducible
* Upgrade to Doxia 1.11.1
maven-resolver:
Update maven-resolver from version 1.4.1 to version 1.7.3. (jsc#SLE-23217)
* Build against the standalone JavaEE modules unconditionally
* Remove the javax.annotation:javax.annotation-api dependency on distribution versions that do not incorporate the
JavaEE modules
* Add the glassfish-annotation-api jar to the build classpath
* Upgrade Sisu Components to 0.3.4
* Upgrade SLF4J to 1.7.30
* Update mockito-core to 2.28.2
* Update Wagon Provider API to 3.4.0
* Update HttpComponents
* Update Plexus Components
* Remove synchronization in TrackingFileManager
* Move GlobalSyncContextFactory to a separate module
* Migrate from maven-bundle-plugin to bnd-maven-plugin
* Support SHA-256 and SHA-512 as checksums
* Upgrade Redisson to 3.15.6
* Change of API and incompatible with maven-resolver < 1.7
maven-resources-plugin:
Update maven-resources-plugin from version 3.1.0 to version 3.2.0. (jsc#SLE-23217)
* ISO8859-1 properties files get changed into UTF-8 when filtered
* Upgrade plexus-interpolation 1.26
* Add m2e lifecycle Metadata to plugin
* make build Reproducible
* Upgrade maven-plugins parent to version 32
* Upgrade plexus-utils 3.3.0
* Make Maven 3.1.0 the minimum version
* Update to maven-filtering 3.2.0
* Build with java source and target levels 8
maven-shared-incremental:
Build with source and target levels 8 (jsc#SLE-23217)
maven-shared-io:
Build with source and target levels 8 (jsc#SLE-23217)
maven-shared-utils:
Update maven-shared-utils from version 3.2.1 to 3.3.3. (jsc#SLE-23217)
* Commandline class shell injection vulnerabilities (bsc#1198833, CVE-2022-29599)
* Build with source and target levels 8
* make build Reproducible
* Upgrade maven-shared-parent to 32
* Upgrade parent to 31
maven-source-plugin:
Build with source and target levels 8 (jsc#SLE-23217)
maven-surefire:
Build with source and target levels 8 (jsc#SLE-23217)
Update generate-tarball.sh to use https URL (bsc#1182708)
maven-verifier:
Build with source and target levels 8 (jsc#SLE-23217)
maven-wagon:
Provide maven-wagon 3.2.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
minlog:
Provide minlog 1.3.0 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
modello-maven-plugin:
Update modello-maven-plugin from version 1.10.0 to version 2.0.0. (jsc#SLE-23217)
* Add Modello 2.0.0 model XSD
* Build with java source and target levels 8
* Bump actions/cache to 2.1.6
* Bump actions/checkout to 2.3.4
* Bump actions/setup-java to 2.3.1
* Bump checkstyle to 9.3
* Bump jackson-bom to 2.13.1
* Bump jaxb-api to 2.3.1
* Bump jsoup to 1.14.3
* Bump junit to 4.13.1
* Bump maven-assembly-plugin to 3.3.0
* Bump maven-checkstyle-plugin to 3.1.1
* Bump maven-clean-plugin to 3.1.0
* Bump maven-compiler-plugin to 3.9.0
* Bump maven-dependency-plugin to 3.2.0
* Bump maven-enforcer-plugin to 3.0.0-M3
* Bump maven-gpg-plugin to 3.0.1
* Bump maven-jar-plugin to 3.2.2
* Bump maven-javadoc-plugin to 3.3.2
* Bump maven-jxr-plugin to 3.1.1
* Bump maven-pmd-plugin to 3.15.0
* Bump maven-project-info-reports-plugin to 3.1.2
* Bump maven-release-plugin to 3.0.0-M5
* Bump maven-resources-plugin to 3.2.0
* Bump maven-scm-publish-plugin to 3.1.0
* Bump maven-shared-resources to 4
* Bump maven-site-plugin to 3.10.0
* Bump maven-surefire-plugin to 2.22.2
* Bump maven-surefire-report-plugin to 2.22.2
* Bump maven-verifier-plugin to 1.1
* Bump mavenPluginTools to 3.6.4
* Bump org.eclipse.sisu.plexus to 0.3.5
* Bump persistence-api to 1.0.2
* Bump plexus-compiler-api to 2.9.0
* Bump plexus-compiler-javac to 2.9.0
* Bump plexus-utils to 3.4.1
* Bump plexus-velocity to 1.3
* Bump release-drafter/release-drafter to 5.18.0
* Bump snakeyaml to 1.30
* Bump stax2-api to 4.2.1
* Bump taglist-maven-plugin to 3.0.0
* Bump woodstox-core to 6.2.8
* Bump xercesImpl to 2.12.1
* Bump xercesImpl to 2.12.2 in /modello-plugins/modello-plugin-jsonschema
* Bump xercesImpl to 2.12.2 in /modello-plugins/modello-plugin-xsd
* Bump xml-apis to 2.0.2
* Bump xmlunit to 1.6
* Bump xmlunit-core to 2.9.0
* Depend on the jackson and jsonschema plugins too
* Manage xdoc anchor name conflicts (2 classes with same anchor)
* Migrate from codehaus:wstx to com.fasterxml.woodstox:woodstox-core 6.2.4
* Require Maven 3.1.1
* Security upgrade org.jsoup:jsoup to 1.14.2
modello:
Update modello from version 1.10.0 to version 2.0.0. (jsc#SLE-23217)
* New features and improvements
+ Add Modello 2.0.0 model XSD
+ Manage xdoc anchor name conflicts (2 classes with same anchor)
+ Drop unnecessary check for identical branches
+ Require Maven 3.1.1
+ Use a caching writer to avoid overwriting identical files
+ Migrate from codehaus:wstx to com.fasterxml.woodstox:woodstox-core 6.2.4
+ Make location handling more memory efficient
+ Xpp3 extended writer
+ Refactor some old java APIs usage
+ Add a new field fileComment
* Bug Fixes
+ Fix javaSource default value
+ Fix modello-plugin-snakeyaml
* Dependency updates
+ Bump actions/cache to 2.1.6
+ Bump actions/checkout from 2 to 2.3.4
+ Bump actions/setup-java to 2.3.1
+ Bump checkstyle to 9.3
+ Bump jackson-bom to 2.13.1
+ Bump jaxb-api from 2.1 to 2.3.1
+ Bump jsoup from 1.14.2 to 1.14.3
+ Bump junit from 4.12 to 4.13.1
+ Bump junit from 4.12 to 4.13.1 in /modello-maven-plugin/src/it/maven-model
+ Bump maven-assembly-plugin from 3.2.0 to 3.3.0
+ Bump maven-checkstyle-plugin from 2.15 to 3.1.1
+ Bump maven-clean-plugin from 3.0.0 to 3.1.0
+ Bump maven-compiler-plugin to 3.9.0
+ Bump maven-dependency-plugin to 3.2.0
+ Bump maven-enforcer-plugin from to 3.0.0-M3
+ Bump maven-gpg-plugin from 1.6 to 3.0.1
+ Bump maven-jar-plugin from 3.2.0 to 3.2.2
+ Bump maven-javadoc-plugin to 3.3.2
+ Bump maven-jxr-plugin from to 3.1.1
+ Bump maven-pmd-plugin to 3.15.0
+ Bump maven-project-info-reports-plugin from 3.1.1 to 3.1.2
+ Bump maven-release-plugin from 3.0.0-M4 to 3.0.0-M5
+ Bump maven-resources-plugin from 3.0.1 to 3.2.0
+ Bump maven-scm-publish-plugin from 3.0.0 to 3.1.0
+ Bump maven-shared-resources from 3 to 4
+ Bump maven-site-plugin to 3.10.0
+ Bump maven-surefire-plugin to 2.22.2
+ Bump maven-surefire-report-plugin to 2.22.2
+ Bump maven-verifier-plugin from 1.0 to 1.1
+ Bump mavenPluginTools to 3.6.4
+ Bump org.eclipse.sisu.plexus from 0.3.4 to 0.3.5
+ Bump persistence-api from 1.0 to 1.0.2
+ Bump plexus-compiler-api to 2.9.0
+ Bump plexus-compiler-javac to 2.9.0
+ Bump plexus-utils from 3.2.0 to 3.4.1
+ Bump plexus-velocity from 1.2 to 1.3
+ Bump release-drafter/release-drafter to 5.18.0
+ Bump snakeyaml to 1.30
+ Bump stax2-api from 4.2 to 4.2.1
+ Bump taglist-maven-plugin to 3.0.0
+ Bump woodstox-core to 6.2.8
+ Bump xercesImpl from 2.12.1 to 2.12.2 in /modello-plugins/modello-plugin-jsonschema
+ Bump xercesImpl from 2.12.1 to 2.12.2 in /modello-plugins/modello-plugin-xsd
+ Bump xml-apis from 1.3.04 to 2.0.2
+ Bump xmlunit from 1.2 to 1.6
+ Bump xmlunit-core to 2.9.0
+ Security upgrade org.jsoup:jsoup from 1.13.1 to 1.14.2
Build with java source and target levels 8
Build the jackson and jsonschema plugins too
mojo-parent:
Update mojo-parent from version 40 to version 60. (jsc#SLE-23217)
msv:
Build with source and target levels 8 (jsc#SLE-23217)
multiverse:
Build with source and target levels 8 (jsc#SLE-23217)
mx4j:
Build against the standalone JavaEE modules unconditionally (jsc#SLE-23217)
Depend on glassfish-activation-api instead of on gnu-jaf (jsc#SLE-23217)
Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
Require for build gnu-jaf instead of a virtual jaf provider in order to avoid build cycles (jsc#SLE-23217)
On supported platforms, avoid building with OpenJ9, in order to prevent build cycles (jsc#SLE-23217)
mybatis-parent:
Provide mybatis-parent version 31 (jsc#SLE-23217)
mybatis:
Provide mybatis version 3.5.6 (jsc#SLE-23217)
* CVE-2020-26945: remote code execution due to mishandles deserialization of object streams (bsc#1177568)
mysql-connector-java:
Update mysql-connector-java from version 5.1.47 to version 8.0.29. (jsc#SLE-23217)
* CVE-2021-2471: mysql-connector-java: unauthorized access (bsc#1195557)
* CVE-2020-2875, CVE-2020-2933, CVE-2020-2934: Vulnerability in the MySQL Connectors product of Oracle
MySQL (bsc#1173600)
* Historically, MySQL has used utf8 as an alias for utf8mb3. Since release 8.0.29, utf8mb3 has become a recognized
(though deprecated) character set on its own for MySQL Server. Therefore, Connector/J has added utf8mb3 to its
character set mapping, and users are encouraged to update to Connector/J 8.0.29 to avoid potential issues when
working with MySQL Server 8.0.29 or later.
* A new connection property socksProxyRemoteDns has been added, which, when set to true, makes the
SocksProxySocketFactory execute its own connect() implementation that passes the unresolved InetSocketAddress of
a MySQL Server host to the created proxy socket, instead of having the address resolved locally.
* The code for prepared statements has been refactored to make the code simpler and the logic for binding more
consistent between ServerPreparedStatement and ClientPreparedStatement.
* Connector/J now supports Fast Identity Online (FIDO) Authentication. See Connecting Using Fast Identity
Online (FIDO) Authentication for details.
* Do not build against the log4j12 packages, use the new reload4j
* This update provide several fixes and enhancements. Please, check the chenges for a full overview.
nailgun:
Build with source and target levels 8 (jsc#SLE-23217)
native-platform:
Build with source and target levels 8 (jsc#SLE-23217)
nekohtml:
Update nekohtml from version 1.9.22 to version 1.9.22.noko2. (jsc#SLE-23217)
* CVE-2022-28366: Uncontrolled Resource Consumption in nekohtml. (bsc#1198404)
* CVE-2022-24839: Denial of service via crafted Processing Instruction (PI) input. (bsc#1198739)
* Use the security patched fork at https://github.com/sparklemotion/nekohtml
* Build with source and target levels 8
netty3:
Remove dependency on javax.activation. (jsc#SLE-23217)
Build again against mvn(log4j:log4j). (jsc#SLE-23217)
Use the standalone JavaEE modules unconditionally
Remove the compat versions, since the io.netty:netty artifact coordinates exist only in version 3.x. (jsc#SLE-23217)
netty-tcnative:
Update netty-tcnative to version 2.0.36. (jsc#SLE-23217)
* Upgrade to OpenSSL 1.1.1i
* Update to latest openssl version for static build
* Update to LibreSSL 3.1.4
* Update to latest stable libressl release
* Cleanup BoringSSL TLSv1.3 support and consistent handle empty ciphers.
* Support TLSv1.3 with compiling against boringssl
* Return 0 for SSL_OP_NO_TLSv1_3 when TLSv1.3 is not supported.
* Allow to load a private key from the OpenSSL engine.
* Support KeyManagerFactory if compiled against OpenSSL < 1.0.2 but using OpenSSL >= 1.0.2 at runtime.
* Build with java source and target levels 1.8
objectweb-asm:
Update objectweb-asm from version 7.2 to version 9.3. (jsc#SLE-23217)
* new Opcodes.V19 constant for Java 19
* new size() method in ByteVector
* checkDataFlow option in CheckClassAdapter can now be used without valid maxStack and maxLocals values
* New Maven BOM
* Build asm as modular jar files to be used as such by java >= 9
* Leave asm-all.jar as a non-modular jar
* JDK 18 support
* Replace -debug flag in Printer with -nodebug (-debug continues to work)
* New V15 constant
* Experimental support for PermittedSubtypes and RecordComponent
* This update provide several fixes and enhancements. Please, check the chenges for a full overview.
objenesis:
Fix build with javadoc 17 (jsc#SLE-23217)
opentest4j:
Update opentest4j from version 1.0.0 to version 1.2.0. (jsc#SLE-23217)
* Build with java source and target levels 8
* Remove unused dependency on commons-codec
* Rename serialized output file for clarity
* Create an OSGi compatible MANIFEST.MF
oro:
Build with source and target levels 8 (jsc#SLE-23217)
osgi-annotation:
Update osgi-annotation from version 6.0.0 to version 7.0.0. (jsc#SLE-23217)
* Build with source and target levels 8
osgi-compendium:
Update osgi-compendium from version 6.0.0 to version 7.0.0. (jsc#SLE-23217)
* Build with source and target levels 8
osgi-core:
Update osgi-core from version 6.0.0 to version 7.0.0. (jsc#SLE-23217)
* Build with source and target levels 8
os-maven-plugin:
Update os-maven-plugin from version 1.2.3 to version 1.7.0. (jsc#SLE-23217)
* Build with java source and target levels 8
* Changes:
+ Added a new property os.detected.arch.bitness
+ Added detection of RISC-V architecture, riscv
+ Added an abstraction layer for System property and file system access
+ Added thread safety information to Maven plugin metadata so that Maven doesn't warn about thread safety anymore
+ Added detection of z/OS operating system
+ Added m2e life cycle mapping metadata so os-maven-plugin works better with Eclipse m2e
+ Added support for MIPS and MIPSEL 32/64-bit architecture
mips_32 - if the value is one of: mips, mips32
mips_64 - if the value is mips64
mipsel_32 - if the value is one of: mipsel, mips32el
mipsel_64 - if the value is mips64el
+ Added support for PPCLE 32-bit architecture
ppcle_32 - if the value is one of: ppcle, ppc32le
+ Added support for IA64N and IA64W architecture
itanium_32 - if the value is ia64n
itanium_64 - if the value is one of: ia64, ia64w (new), itanium64
+ Fixed classpath conflicts due to outdated Guava version in transitive dependencies
+ Fixed incorrect prerequisite
paradise:
Build with source and target levels 8 (jsc#SLE-23217)
paranamer:
Build with source and target levels 8 (jsc#SLE-23217)
parboiled:
Build with source and target levels 1.8 (jsc#SLE-23217)
pegdown:
Build with source and target levels 8 (jsc#SLE-23217)
picocli:
Update picocli from version 4.0.4 to version 4.6.2. (jsc#SLE-23217)
* Full changes from previous versions are in https://github.com/remkop/picocli/blob/v4.6.2/RELEASE-NOTES.md
plexus-ant-factory:
Build with source and target levels 8 (jsc#SLE-23217)
plexus-archiver:
Do not compile the test build against the legacy guava20 any more. (jsc#SLE-23217)
plexus-bsh-factory:
Build with source and target levels 8 (jsc#SLE-23217)
plexus-build-api:
Build with source and target levels 8 (jsc#SLE-23217)
Fix an error of tag in javadoc
plexus-cipher:
Update plexus-cipher from version 1.7 to version 2.0. (jsc#SLE-23217)
* Switch from Sonatype to Plexus
* Switch to the Eclipse sisu-maven-plugin
* Bump junit from 4.12 to 4.13.1
* Bump plexus from 6.5 to 8
* Fix surefire warnings
* This version is needed by maven 3.8.4 and plexus-sec-dispatcher 2.0
plexus-classworlds:
Update plexus-classworlds from version 2.5.2 to version 2.6.0. (jsc#SLE-23217)
* Modular java JPMS support
plexus-cli:
Do not compile/run tests against the legacy guava20 package. (jsc#SLE-23217)
Build with java source and target levels 8. (jsc#SLE-23217)
Replace raw java.util.List with typed java.util.List interface
The GnuParser and OptionBuilder classes are deprecated in commons-cli since version 1.3
plexus-compiler:
Update plexus-compiler from version 2.8.2 to version 2.11.1. (jsc#SLE-23217)
* Plexus testing is a dependency with scope test
* Removed: jikes compiler
* New features and improvements
+ add paremeter to configure javac feature --enable-preview
+ make java 11 as project base but keep javac release 8, we will be able to upgrade ecj and errorprone
+ Bump plexus-components from 6.5 to 6.6 and upgrade to junit5
+ add adopt-openj9 build
+ Fix AspectJ basics
+ fix methods of lint and warning
+ Add new showLint compiler configuration
+ add jdk distribution to the matrix
+ Added primitive support for --processor-module-path
+ Refactor and add unit tests for support for multiple --add-exports custom compiler arguments
+ Add Maven Compiler Plugin compiler it tests
+ Close StandardJavaFileManager
+ Use latest ecj from official Eclipse release
* Bug fixes:
+ [eclipse-compiler] Resort sources to have module-info.java first
+ Issue #106: Retain error messages from annotation processors
+ Issue #147: Support module-path for ECJ
+ Issue #166: Fix maven dependencies
+ eclipse compiler: set generated source dir even if no annotation processor is configured
+ CSharp compiler: fix role
+ Eclipse compiler: close the StandardJavaFileManager
+ Use plexus annotations rather than doclet to fix javadoc with java11
+ fix Java15 build
+ Update Error prone 2.4
+ Rename method, now that EA of JDK 16 is available
+ Eclipse Compiler Support release specifier instead of source/target
+ Issue #73: Use configured file encoding for JSR-199 Eclipse compiler
* Dependency updates
+ Bump actions/cache to 2.1.6
+ Bump animal-sniffer-maven-plugin to 1.21
+ Bump aspectj.version from 1.9.2 to 1.9.6
+ Bump assertj-core from 3.21.0 to 3.22.0
+ Bump ecj to 3.28.0
+ Bump error_prone_core to 2.10.0
+ Bump junit to 4.13.2
+ Bump junit-jupiter-api from 5.8.1 to 5.8.2
+ Bump maven-artifact from 2.0 to 2.2.1
+ Bump maven-enforcer-plugin from 3.0.0-M3 to 3.0.0
+ Bump maven-invoker-plugin from 3.2.1 to 3.2.2
+ Bump maven-settings from 2.0 to 2.2.1
+ Bump plexus-component-annotations to 2.1.1
+ Bump plexus-components to 6.6 and upgrade to junit5
+ Bump release-drafter/release-drafter to 5.18.1
* needed by the latest maven-compiler-plugin
* Rewrite the plexus metadata generation in the ant build files
plexus-component-api:
Build with source and target levels 8 (jsc#SLE-23217)
plexus-component-metadata:
Update plexus-component-metadata from version 2.1.0 to version 2.1.1. (jsc#SLE-23217)
* Build using asm >= 7
* Build with java source and target levels 8
plexus-containers:
Update plexus-containers from version 2.1.0 to version 2.1.1. (jsc#SLE-23217)
* This is the last version before deprecation
* Security upgrade org.jdom:jdom2 from 2.0.6 to 2.0.6.1
* Build with java source and target levels 8
* Upgrade ASM to 9.2
* Requires Java 7 and Maven 3.2.5+
plexus-i18n:
Build with java source and target levels 8 (jsc#SLE-23217)
Do not compile/run tests against the legacy guava20 package (jsc#SLE-23217)
plexus-interactivity:
Build with source and target levels 8 (jsc#SLE-23217)
plexus-interpolation:
Build with java source and target levels 1.8
plexus-io:
Do not build/run tests against the legacy guava20 package (jsc#SLE-23217)
plexus-languages:
Update plexus-languages from version 1.0.3 to version 1.1.1. (jsc#SLE-23217)
* Build using java >= 9
* Build as multirelease modular jar
* Fix builds with a mix of modular and classic jar files
* generate-tarball.sh: use safe temporary directory, avoid accidental deletion of *.jar, *.class in the current
working directory.
plexus-metadata-generator:
Update plexus-metadata-generator from version 2.1.0 to version 2.1.1 (jsc#SLE-23217)
* Build using asm >= 7
* Build with java source and target levels 8
* Do not use the deprecated plexus-cli functions, but port the generator to the recommended replacement
plexus-resources:
Build with source and target levels 8 (jsc#SLE-23217)
plexus-sec-dispatcher:
Update plexus-sec-dispatcher from version 1.4 to version 2.0. (jsc#SLE-23217)
* Fix build with modello-2.0.0
* Changes:
+ Bump plexus-utils to 3.4.1
+ Bump plexus from 6.5 to 8
+ Switch from Sonatype to Plexus
+ Update pom to use modello source 1.4
* needed for maven 3.8.4 and plexus-cipher 2.0
plexus-utils:
Update plexus-utils from version 3.3.0 to version 3.3.1. (jsc#SLE-23217)
* Build with source and target levels 8 (jsc#SLE-23217)
* Don't ignore valid SCM files
* This is the latest version still supporting Java 8
plexus-velocity:
Do not compiler/run the test build against legacy guava20 anymore. (jsc#SLE-23217)
Build with java source and target levels 8. (jsc#SLE-23217)
Simplify the build file and remove tests which depend onapache-commons-lang. (jsc#SLE-23217)
qdox:
Update qdox from version 2.0.M9 to version 2.0.1. (jsc#SLE-23217)
* Don't use deprecated inputstreamctor option
* Add Automatic-Module-Name to the manifest
* Generate ant build file from maven pom and build using ant
* Update jflex-maven-plugin to 1.8.2
* Changes:
* Support Lambda Expression
* Add SEALED / NON_SEALED tokens
* CodeBlock for Annotation with FieldReference should prefix field with canonical name
* Add UnqualifiedClassInstanceCreationExpression
* Add reference to grammar documentation and hints to transform it
* Support Text Blocks
* Support Sealed Classes
* Support records
* Get interface via javaProjectBuilder.getClassByName
reflectasm:
Build with source and target levels 8 (jsc#SLE-23217)
regexp:
Build with source and target levels 8 (jsc#SLE-23217)
relaxngcc:
Provide relaxngcc version 1.12 (jsc#SLE-23217)
relaxngDatatype:
Build with source and target levels 8 (jsc#SLE-23217)
reload4j:
Update from version 1.2.19 to version 1.2.20. (jsc#SLE-23217)
* Build with source/target levels 8
* For enabled logging statements, the performance of iterating on appenders attached to a logger has been
significantly improved.
replacer:
Build with source and target levels 8 (jsc#SLE-23217)
rhino:
Update rhino from version 1.7R3 to version 1.7.14. (jsc#SLE-23217)
sat4j:
Build with source and target levels 8 (jsc#SLE-23217)
saxon9:
Build with source and target levels 8 (jsc#SLE-23217)
sbt-launcher:
Build with source/target levels 8 (jsc#SLE-23217)
Fix build against ivy 2.5.0
sbt:
Do not depend on hawtjni-runtime and jansi-native anymore (jsc#SLE-23217)
Fix build against maven 3.8.5
Fix build against apache-ivy 2.5.0
Override javax.inject:javax:inject artifact coordinates in order to be able to build against newer atinject
versions if needed
Fix build with maven-resolver 1.7.3
Build package as noarch, since it does not have archfull binaries
Build with java 8
scala-pickling:
Build with source and target levels 8 (jsc#SLE-23217)
scala:
No longer package /usr/share/mime-info (bsc#1062631)
* Drop scala.keys and scala.mime source files. (jsc#SLE-23217)
Fix the scala build to find correctly the jansi.jar file
Make the package that links the jansi.jar file archfull
Bootstrap the build with our own built jar instead of downloading prebuilt binaries from www.scala-lang.org
servletapi4:
Provide servletapi4 4.0.4 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
signpost-core:
Build with source and target levels 8 (jsc#SLE-23217)
sisu:
Update siu from version 0.3.3 to version 0.3.5 (jsc#SLE-23217)
* Remove dependency on glassfish-servlet-api
* Relax bytecode check in scanner so it can scan up to and including Java14
* Support reproducible builds by sorting generated javax.inject.Named index
* Build with java source and target levels 8
* Change to generate maven meta-data using the %%add_maven_depmap so that it can be built before the xmvn-tools
slf4j:
Update slf4j from version 1.7.30 to version 1.7.36. (jsc#SLE-23217)
* Don't use %%mvn_artifact, but %%add_maven_depmap
* In the jcl-over-slf4j module avoid Object to String conversion.
* In the log4j-over-slf4j module added empty constructors for ConsoleAppender.
* In the slf4j-simple module, SimpleLogger now caters for concurrent access.
* Fix build against reload4j
* Fix dependencies of the module slf4j-log4j12
* Depend for build on reload4j
* Do not use a separate spec file for sources.
* slf4j-log4j12 artifact automatically instructs Maven to use the slf4j-reload4j artifact instead.
* slf4j releases are now reproducible.
* Build with source/target levels 8
* Add symlink to reload4j -> log4j12 for applications that expect that name.
snakeyaml:
Update snakeyaml from version 1.31 to version 1.33. (jsc#SLE-23217)
* Output error grow the rhn_web_ui.log rapidly (bsc#1204173)
* CVE-2022-38752: Uncaught exception in java.base/java.util.ArrayList.hashCode (bsc#1203154)
spec-version-maven-plugin:
Update spec-version-maven-plugin from 1.2 version to version 2.1 (jsc#SLE-23217)
* Support both the jakarta.* and the javax.* apis
* Build with java source and target levels 8
stax2-api:
Build with source and target levels 8 (jsc#SLE-23217)
stax-ex:
Provide stax-ex version 1.8 (jsc#SLE-23217)
stringtemplate4:
Build with source and target levels 8 (jsc#SLE-23217)
string-template-maven-plugin:
Build with source and target levels 8 (jsc#SLE-23217)
stringtemplate:
tagsoup:
Build with source and target levels 8 (jsc#SLE-23217)
template-resolver:
Build with source and target levels 8 (jsc#SLE-23217)
tesla-polyglot:
Update tesla-polyglot from version 0.2.1 to version 0.4.5. (jsc#SLE-23217)
* Build with source and target levels 8
* Remove upper bound for JDK version to allow Java 11 and newer
* polyglot-kotlin - revert automatic source folder setting to koltin
* Update xstream version in test resources to avoid security alerts
* Avoid assumption about replacement pom file being readable
* Upgrade scala-maven-plugin, clojure-maven-plugin and Clojure
* polyglot-kotlin: Set source folders to kotlin
* Upgrade to kotlin 1.3.60
* Provide a mechanism to override properties of a polyglot build
* TeslaModelProcessor.locatePom(File) ignores files ending in.xml
* Use platform encoding in ModelReaderSupport
* Invoker plugin update
* takari parent update
* plexus-component-metadata update to 2.1.0
* maven-enforcer-plugin update to 3.0.0-M3
* polyglot-kotlin: Avoid IllegalStateException
* polyglot-kotlin: improved support for IntelliJ Idea usage
* polyglot-kotlin: kotlin update and numerous improvements to more idiomatic kotlin
* polyglot-common:
+ Execute tasks are now installed with inheritable set to false
+ The ExecuteContext interface now has default implementations
+ The ExecuteContext now includes getMavenSession()
+ the ExecuteContext now includes getLog() to comport with Java bean conventions. The log() operation has been
deprecated.
+ the ExecuteContext now includes getBasedir() to comport with Java bean conventions. The basedir() operation has
been deprecated.
* polyglot-kotlin:
+ Updates Kotlin to 1.3.21
+ Includes support for Maven's ClassRealm
+ Includes full support for the entire Maven model
+ Includes support for execute tasks via as inline lambdas or as external scripts.
+ Resolves ClassLoader issues that affected integration with IntelliJ IDEA
* polyglot-java: fixed depMgt conversion
* polyglot-ruby: java9+ support improvement
* added polyglot-kotlin
* polyglot-scala:
+ Convenience methods for Dependency (classifier, intransitive, % (scope))
+ Support reporting-section in pom
+ Added default value for pom property modelversion (4.0.0)
+ Updated used Scala Version (2.11.12)
+ Made output dir to pom.scala files compilation configurable via system property polyglot.scala.outputdir
+ Improved support and docs for configuration elements of plugins
* Upgrade to latest takari-pom parent
* polyglot-yaml: Support for xml attributes
* polyglot-yaml: exclude pomFile property from serialization
* polyglot-java: Linux support and test fixes
* polyglot-java: Moved examples into polyglot-maven-examples
* Updated Scala version
* Scala warning fixes
* polyglot-scala: Scala syntax friendly include preprocessor
* Added link to user of yml version
* polyglot-scala: Use Zinc server for Scala module
* polyglot-scala: Support more valid XML element name chars in dynamic Config
* Experimental addition of Java as polyglot language.
test-interface:
Build with source and target levels 8 (jsc#SLE-23217)
testng:
Update testng from version 6.14.3 to version 7.4.0. (jsc#SLE-23217)
* CVE-2020-11022: jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (bsc#1190663)
* CVE-2020-11023: jquery: Untrusted code execution while passing HTML containing
tomcat:
Update from version 9.0.31 to version 9.0.43 (jsc#SLE-23217)
CVE-2021-43980: Improve the recycling of Processor objects to make it more robust. (bsc#1203868)
CVE-2022-42252: Fixed a request smuggling. (bsc#1204918)
set logrotate for localhost.log, manager.log, host-manager.log and localhost_access_log.txt
use logrotate for catalina.out and configure server.xml
Use catalina.out for logging (bsc#1205647)
Do not hardcode /usr/libexec but use %%_libexecdir during the build where /usr/libexec
and %%_libexecdir are different.
Build with source, target and release levels 8 (bsc#1201081)
treelayout:
Build with source and target levels 8 (jsc#SLE-23217)
trilead-ssh2:
Build with source and target levels 8 (jsc#SLE-23217)
tycho:
Update tycho from version 1.2.0 to version 1.6.0. (jsc#SLE-23217)
* Fix bootstrapping with new version of maven-install-plugin
* Assure that all classes in tycho are understood by Java 8 (bsc#1198279)
* Force building with java 11, since there is no config in tycho for java >= 15
* Do not force building with java 1.8, but with any java >= 1.8
* Drop support for obsolete modular JVMs (10 and 12)
* Plexus Utils has been updated to version 3.3.0 as a prerequisite for other dependency updates.
* ECJ has been updated to version 3.19.0. This version adds support for Java 12 bytecode and features.
* JGit has been updated to version 5.5.0.
* Equinox and p2 has been updated to their 2019-09 versions.
* ObjectWeb ASM has been updated to version 7.0 from 5.0.3 which provides Java 11
compatibility in artifactcomparator.
* Java 11: JDT was updated to 3.15.1
univocity-parsers:
Update univocity-parsers from version 2.5.5 to version 2.9.1. (jsc#SLE-23217)
* Build with source and target levels 8
utfcpp:
Provide utfcpp version 3.2.1. (jsc#SLE-23217)
* Required by antlr4.
velocity:
Build with java source and target levels 8 (jsc#SLE-23217)
Do not build against the log4j12 packages, use the new reload4j
werken-xpath:
Build with source and target levels 8 (jsc#SLE-23217)
woodstox-core:
Update from version 5.2.0 to version 6.2.8. (jsc#SLE-23217)
* Build with java source and target levels 8
wsdl4j:
Build with source and target levels 8
Alias to axis:axis-wsdl4j
ws-jaxme:
Do not build against the log4j12 packages, use the new reload4j (jsc#SLE-23217)
On relevant distributions, build against the standalone jaxb-api
Build with source/target levels 8
Build against the standalone JavaEE modules unconditionally
xalan-j2:
Do not link to the java_cup* compatibility links, but to the java-cup* ones
Build with source/target levels 8
xbean:
Update xbean from version 4.5 to version 4.20 (jsc#SLE-23217)
* Do not build against the log4j12 packages, use the new reload4j
* Upgrade to asm 9.1
* Remove unnecessary dependency on log4j and commons-logging
xerces-j2:
Update xerces-j2 from version 2.12.0 to versionn 2.12.2 (jsc#SLE-23217)
* CVE-2022-23437: Infinite loop within Apache XercesJ xml parser (bsc#1195108)
* Build with source/target levels 8
xml-commons-apis:
Build with source and target levels 8 (jsc#SLE-23217)
xml-commons-resolver:
Build with source and target levels 8 (jsc#SLE-23217)
xmlgraphics-batik:
Update from version 1.10 to version 1.15 (jsc#SLE-23217)
* CVE-2022-38398: Fixed information disclosure due to Jar url not being blocked by DefaultExternalResourceSecurity
(bsc#1203674)
* CVE-2022-38648: Fixed information disclosure due to missing blocking of external resource before calling fop
(bsc#1203673)
* CVE-2022-40146: Fixed information disclosure due to Jar url not being blocked by DefaultScriptSecurity
(bsc#1203672)
* CVE-2020-11987: Fixed SSRF due to improper input validation by the NodePickerPanel (bsc#1182748).
* CVE-2019-17566: Fixed SSRF via 'xlink:href' attributes (bsc#1172961).
xmlgraphics-commons:
CVE-2020-11988: Fixed a server-side request forgery caused by improper input validation by the XMPParser. (bsc#281607)
Build with source/target levels 8
xmlgraphics-fop:
Update xmlgraphics-fop from version 2.1 to version 2.7. (jsc#SLE-23217)
* Update PDFBox to 2.0.24
* Upgrade ant to 1.9.15
* Make the build reproducible (bsc#1047218)
* Build against fontbox from apache-pdfbox >= 2
* Requires batik >= 1.11
* Package xmlgraphics-fop-hyph.jar and xmlgraphics-fop-sandbox.jar (bsc#1145693)
xml-maven-plugin:
Build with source and target levels 8 (jsc#SLE-23217)
xmlstreambuffer:
Provide xmlstreambuffer version 1.5.4 (jsc#SLE-23217)
xmlunit:
Update xmlunit from version 1.5 to version 1.6 (jsc#SLE-23217)
* Build with java source and target levels 8
xmvn-connector:
Rename xmvn-connector-aether to xmvn-connector and provide it as version 4.0.0. (jsc#SLE-23217)
xmvn-connector-gradle:
Update xmvn-connector-gradle from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Make it standalone from xmvn sources
xmvn-connector-ivy:
Update xmvn-connector-ivy from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Make it standalone from xmvn sources
xmvn-mojo:
Update xmvn-mojo from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Bump codecov/codecov-action to 2.0.2
* Bump commons-compress from 1.20 to 1.21 in /xmvn-parent
* Bump junit from 4.12 to 4.13.1
* Update compiler source/target to JDK 11
xmvn-parent:
Update xmvn-parent from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Bump codecov/codecov-action to 2.0.2
* Bump commons-compress from 1.20 to 1.21 in /xmvn-parent
* Update compiler source/target to JDK 11
xmvn-tools:
Update xmvn-tools from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Build with modello 2.0.0
* Bump codecov/codecov-action to 2.0.2
* Drop bisect tool
* Update compiler source/target to JDK 11
xmvn:
Update xmvn from version 3.1.0 to version 4.0.0. (jsc#SLE-23217)
* Bump codecov/codecov-action to 2.0.2
* Bump commons-compress from 1.20 to 1.21 in /xmvn-parent
* Fix Javadoc generation for non-JPMS project with JDK 11
* Remove superflous JARs from assembly
* Rename xmvn-connector-aether to xmvn-connector
* Move release plugins to pluginManagement
* Move prerequisites on Maven version to xmvn-mojo
* Bump junit 4.13.1
* Bump slf4jVersion from 1.8.0-beta4 to 2.0.0-alpha2 in /xmvn-parent
* Update Maven plugin versions
* Drop Ivy
* Drop Gradle
* Switch to SHA-256 in CacheManager
* Update dependency xmlunit.assertj to xmlunit.assertj3
* Update compiler source/target to JDK 11
* Require the maven-libs we built against in order to avoid hanging symlinks
xpp2:
Build with source/target levels 8
xpp3:
Build with source and target levels 8 (jsc#SLE-23217)
xsom:
Provide xsom version 0~20140925. (jsc#SLE-23217)
xstream:
Build against the standalone JavaEE modules unconditionally
Build against standalone activation-api and jaxb-api on systems where the JavaEE modules are not part of JDK
xz-java:
Provide xz-java 1.8 and solve installation issues. (jsc#SLE-23217)
There are no source changes.
zinc:
Disambiguate the requirements. Require directly sbt non-bootstrap
Build only *.scala and *.java files
Advisory ID
SUSE-RU-2023:776-1
Released
Thu Mar 16 17:29:23 2023
Summary
Recommended update for gcc12
Type
recommended
Severity
moderate
References
Description:
This update for gcc12 fixes the following issues:
This update ships gcc12 also to the SUSE Linux Enterprise 15 SP1 LTSS and 15 SP2 LTSS products.
SUSE Linux Enterprise 15 SP3 and SP4 get only refreshed builds without changes
This update ship the GCC 12 compiler suite and its base libraries.
The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.
The new compilers for C, C++, and Fortran are provided in the SUSE Linux
Enterprise Module for Development Tools.
To use gcc12 compilers use:
install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
override your makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.
For a full changelog with all new GCC12 features, check out
https://gcc.gnu.org/gcc-12/changes.html
elf: Allow dlopen of filter object to work (bsc#1207571)
powerpc: Fix unrecognized instruction errors with recent GCC
x86: Cache computation for AMD architecture (bsc#1207957)
Advisory ID
SUSE-RU-2023:1779-1
Released
Thu Apr 6 08:16:58 2023
Summary
Recommended update for systemd
Type
recommended
Severity
moderate
References
1208432
Description:
This update for systemd fixes the following issues:
Fix return non-zero value when disabling SysVinit service (bsc#1208432)
Drop build requirement on libpci, it's not no longer needed
Move systemd-boot and all components managing (secure) UEFI boot into udev
sub-package, so they aren't installed in systemd based containers
Advisory ID
SUSE-RU-2023:1805-1
Released
Tue Apr 11 10:12:41 2023
Summary
Recommended update for timezone
Type
recommended
Severity
important
References
Description:
This update for timezone fixes the following issues:
Version update from 2022g to 2023c:
* Egypt now uses DST again, from April through October.
* This year Morocco springs forward April 23, not April 30.
* Palestine delays the start of DST this year.
* Much of Greenland still uses DST from 2024 on.
* America/Yellowknife now links to America/Edmonton.
* tzselect can now use current time to help infer timezone.
* The code now defaults to C99 or later.
Advisory ID
SUSE-SU-2023:1852-1
Released
Fri Apr 14 15:09:39 2023
Summary
Security update for harfbuzz
Type
security
Severity
important
References
1207922,CVE-2023-25193
Description:
This update for harfbuzz fixes the following issues:
CVE-2023-25193: Fixed vulnerability that allowed attackers to trigger O(n^2) growth via consecutive marks (bsc#1207922).
Advisory ID
SUSE-RU-2023:1939-1
Released
Fri Apr 21 11:14:30 2023
Summary
Recommended update for mozilla-nss
Type
recommended
Severity
moderate
References
1191546,1207209,1208242,1208999
Description:
This update for mozilla-nss fixes the following issues:
FIPS 140-3: Adjust SLI reporting for PBKDF2 parameter validation (bsc#1208999)
FIPS 140-3: Update session->lastOpWasFIPS before destroying the key after
derivation in the CKM_TLS12_KEY_AND_MAC_DERIVE,
CKM_NSS_TLS_KEY_AND_MAC_DERIVE_SHA256,
CKM_TLS_KEY_AND_MAC_DERIVE and CKM_SSL3_KEY_AND_MAC_DERIVE cases. (bsc#1191546)
FIPS 140-3: more changes for pairwise consistency checks. (bsc#1207209)
This update for systemd fixes the following issues:
udev-rules: fix nvme symlink creation on namespace changes (bsc#1207410)
Optimize when hundred workers claim the same symlink with the same priority (bsc#1203141)
Add nss-resolve and systemd-network to Packagehub-Subpackages (MSC-626)
Advisory ID
SUSE-feature-2023:2269-1
Released
Mon May 22 14:50:34 2023
Summary
Feature update for javapackages-tools
Type
feature
Severity
moderate
References
Description:
This update for javapackages-tools fixes the following issues:
Version update from 5.3.1 to 6.1.0 (jsc#SLE-23217):
* Add apache-rat-plugin to skippedPlugins
* Add bootstrap metadata to XMvn resolver config
* Add location of java binary used by the java-1.8.0-openjdk (JRE) package so that setting JAVA_HOME will work correctly
* Add lua interpreter to check and GH actions
* Add Lua scripts for removing annotations
* Add more tests, fix behaviour
* Add separate subpackage with RPM generators
* Adding ppc64le architecture support on travis-ci
* Delete run_tests.py
* Drop deprecated add_maven_depmap macro
* Drop SCL support
* Fix builddep snippet generation
* Fix extra XML handling of pom_change_dep
* Fix invalid in XMvn configuration
* Fix provides matching
* Fix running tests without coverage
* Implement separate simple class name matching
* Introduce common and extra subpackages
* Make generated javadoc package noarch
* Make scripts compatible with rpmlua
* Migrate CI from TravisCI to GitHub Actions
* Modularize Lua scripts
* Remove dependency on Six compatibility library
* Remove explicit import of Python 3 features
* Remove license headers from wrapper scripts
* Remove Python 3.5 from .travis.yml
* Replace nose by pytest
* Skip execution of various Maven plugins
* Update build status badge in README.md
* Update documentation
* Update ivy-local-classpath
* Use XMvn Javadoc MOJO by default
Remove requirement to python-six as it is not needed
Advisory ID
SUSE-SU-2023:2484-1
Released
Mon Jun 12 08:49:58 2023
Summary
Security update for openldap2
Type
security
Severity
moderate
References
1211795,CVE-2023-2953
Description:
This update for openldap2 fixes the following issues:
CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).