- crmsh
-
- Update to version 4.6.2+20250924.52a1e2bf:
* Fix: cibverify: If no errors found, treat crm_verify result as success (bsc#1250349)
* Dev: utils: Introduce utils.handle_deprecated_ms_command function
* Fix: cibconfig: Add utils.auto_convert_role=True flag in method CibObjectSetCli.save
* Dev: report: Update HA related packages for crm report to check and verify
* Fix: ui_cluster: Call crm report directly for the legacy `crm cluster health` command (bsc#1230324)
* Dev: bootstrap: Enable to remove pacemaker remote node
* Dev: xmlutil: Add instance method get_res_id_of_remote_node
* Dev: xmlutil: Add is_non_stonith_resource_running() and use for cluster restart checks
* Dev: ui_node: Don't unpack node info from node_state for `node show` command
* Dev: xmlutil: Refactor CrmMonXmlParser.get_node_list to be an instance method
* Dev: utils: Refactor validate_and_get_reachable_nodes for clearer logic
* Dev: xmlutil: Use a single node_type parameter instead of two mutually exclusive parameters
* Dev: utils: Skip reachable checking for pacemaker remote node
* Dev: ui_node: Enable maintenance pacemaker remote node
* Dev: ui_node: Enable standby/online pacemaker remote node
* Dev: xmlutil: Drop xmlutil.listnodes function
* Fix: log: missing LF after a progress bar (#1886)
* Fix: doc: Add TimeoutFormulas help topic (bsc#1242981)
* Dev: sbd: Add pcmk_delay_max back to calculate SBD_DELAY_START
* Fix: sbd: Avoid negative value for the property 'stonith-watchdog-timeout' (bsc#1246622)
* Dev: utils: Add get_default parameter to get_property function
* Fix: ui_context: should not require root privilege when using subcommand 'help' (#1791)
* Dev: sbd: Remove pcmk_delay_max while cacaulating stonith timeout value
* Dev: utils: Validate if local node is a cluster member on peer node's view
* Dev: ui_cluster: Enhance membership validation for `cluster run` command
* Dev: corosync: Get value from runtime.config prefix
- grub2
-
- Fix boot hangs in setting up serial console when ACPI SPCR table is present
and redirection is disabled (bsc#1249088)
* 0001-term-ns8250-spcr-Return-if-redirection-is-disabled.patch
- python-certifi
-
- Add python36-certifi provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-decorator
-
- Add python36-decorator provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-idna
-
- Add python36-idna provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-importlib-metadata
-
- Add python36-importlib-metadata provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-packaging
-
- Add python36-packaging provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-pyasn1
-
- Add python36-pyasn1 provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-pycparser
-
- Add python36-pycparser provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-python-dateutil
-
- Add python36-python-dateutil provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-pytz
-
- Add python36-pytz provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-py
-
- Add python36-py provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-requests
-
- Add python36- provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-six
-
- Add python36-six provides/obsoletes to enable SLE-12 ->
SLE-15 migration, bsc#1233012
- python-xmltodict
-
- Cherry-pick security-fix-prereqs.patch to allow backport of CVE fix
- Cherry-pick CVE-2025-9375.patch to fix multiple XML Injection
vulnerabilities in XML parser (bsc#1249036, CVE-2025-9375)
- rubygem-puma
-
- update to version 5.6.9 (bsc#1218638)
This update includes fixed for CVE-2024-21647
as well as for CVE-2024-45614, CVE-2024-21647, CVE-2023-40175
- Remove CVE-2024-45614.patch
- Remove CVE-2024-21647.patch
- Remove CVE-2023-40175.patch
- Add CVE-2024-45614.patch to fix bsc#1230848, CVE-2024-45614
Prevent underscores from clobbering hyphen headers
- Add CVE-2024-21647.patch to fix bsc#1218638, CVE-2024-21647
Fixed versions limit the size of chunk extensions. Without this
limit, an attacker could cause unbounded resource
(CPU, network bandwidth) consumption.