Recommended update for SUSE Manager 4.0.12.1 Release Notes
Announcement ID: | SUSE-RU-2021:0632-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 10 vulnerabilities and has one fix can now be installed.
Description:
This update for SUSE Manager 4.0.12.1 Release Notes provides the following additions:
Release notes for SUSE Manager:
- Revision 4.0.12.1
- Bugs mentioned bsc#1181550, bsc#1181556, bsc#1181557, bsc#1181558, bsc#1181559, bsc#1181560, bsc#1181561, bsc#1181562, bsc#1181563, bsc#1181564, bsc#1181565, CVE-2021-25281, CVE-2021-25282, CVE-2021-3197, CVE-2021-25283, CVE-2020-28243, CVE-2020-35662, CVE-2021-25284, CVE-2020-28972, CVE-2021-3148, CVE-2021-3144
Release notes for SUSE Manager proxy:
- Update to 4.0.12.1
- Bugs mentioned bsc#1181550, bsc#1181556, bsc#1181557, bsc#1181558, bsc#1181559, bsc#1181560, bsc#1181561, bsc#1181562, bsc#1181563, bsc#1181564, bsc#1181565, CVE-2021-25281, CVE-2021-25282, CVE-2021-3197, CVE-2021-25283, CVE-2020-28243, CVE-2020-35662, CVE-2021-25284, CVE-2020-28972, CVE-2021-3148, CVE-2021-3144
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Manager Proxy 4.0
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-632=1
-
SUSE Manager Retail Branch Server 4.0
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-632=1
-
SUSE Manager Server 4.0
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-632=1
Package List:
-
SUSE Manager Proxy 4.0 (x86_64)
- release-notes-susemanager-proxy-4.0.12.1-0.16.52.1
-
SUSE Manager Retail Branch Server 4.0 (x86_64)
- release-notes-susemanager-proxy-4.0.12.1-0.16.52.1
-
SUSE Manager Server 4.0 (ppc64le s390x x86_64)
- release-notes-susemanager-4.0.12.1-3.68.1
References:
- https://www.suse.com/security/cve/CVE-2020-28243.html
- https://www.suse.com/security/cve/CVE-2020-28972.html
- https://www.suse.com/security/cve/CVE-2020-35662.html
- https://www.suse.com/security/cve/CVE-2021-25281.html
- https://www.suse.com/security/cve/CVE-2021-25282.html
- https://www.suse.com/security/cve/CVE-2021-25283.html
- https://www.suse.com/security/cve/CVE-2021-25284.html
- https://www.suse.com/security/cve/CVE-2021-3144.html
- https://www.suse.com/security/cve/CVE-2021-3148.html
- https://www.suse.com/security/cve/CVE-2021-3197.html
- https://bugzilla.suse.com/show_bug.cgi?id=1181550
- https://bugzilla.suse.com/show_bug.cgi?id=1181556
- https://bugzilla.suse.com/show_bug.cgi?id=1181557
- https://bugzilla.suse.com/show_bug.cgi?id=1181558
- https://bugzilla.suse.com/show_bug.cgi?id=1181559
- https://bugzilla.suse.com/show_bug.cgi?id=1181560
- https://bugzilla.suse.com/show_bug.cgi?id=1181561
- https://bugzilla.suse.com/show_bug.cgi?id=1181562
- https://bugzilla.suse.com/show_bug.cgi?id=1181563
- https://bugzilla.suse.com/show_bug.cgi?id=1181564
- https://bugzilla.suse.com/show_bug.cgi?id=1181565