Container summary for
SUSE-CU-2023:1338-1
| Container Advisory ID | SUSE-CU-2023:1338-1 |
| Container Tags | caasp/v4/helm-tiller:2.16.12 , caasp/v4/helm-tiller:2.16.12-rev3 , caasp/v4/helm-tiller:2.16.12-rev3-build3.12.472 |
| Container Release | 3.12.472 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2022:337-1
|
| Released | Fri Feb 4 10:24:28 2022 |
| Summary | Recommended update for libzypp |
| Type | recommended |
| Severity | important |
| References | 1193007,1194597,1194898 |
Description:
This update for libzypp fixes the following issues:
- RepoManager: remember execution errors in exception history (bsc#1193007)
- Fix exception handling when reading or writing credentials (bsc#1194898)
- Fix install path for parser (bsc#1194597)
- Fix Legacy include (bsc#1194597)
- Public header files on older distros must use c++11 (bsc#1194597)
| Advisory ID | SUSE-RU-2022:473-1
|
| Released | Thu Feb 17 10:29:42 2022 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1195326 |
Description:
This update for libzypp, zypper fixes the following issues:
- Fix handling of redirected command in-/output (bsc#1195326)
This fixes delays at the end of zypper operations, where
zypper unintentionally waits for appdata plugin scripts to
complete.
| Advisory ID | SUSE-RU-2022:511-1
|
| Released | Fri Feb 18 12:41:53 2022 |
| Summary | Recommended update for coreutils |
| Type | recommended |
| Severity | moderate |
| References | 1082318,1189152 |
Description:
This update for coreutils fixes the following issues:
- Add 'fuse.portal' as a dummy file system (used in flatpak implementations) (bsc#1189152).
- Properly sort docs and license files (bsc#1082318).
| Advisory ID | SUSE-RU-2022:523-1
|
| Released | Fri Feb 18 12:49:09 2022 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1193759,1193841 |
Description:
This update for systemd fixes the following issues:
- systemctl: exit with 1 if no unit files found (bsc#1193841).
- add rules for virtual devices (bsc#1193759).
- enforce 'none' for loop devices (bsc#1193759).
| Advisory ID | SUSE-RU-2022:674-1
|
| Released | Wed Mar 2 13:24:38 2022 |
| Summary | Recommended update for yast2-network |
| Type | recommended |
| Severity | moderate |
| References | 1187512 |
Description:
This update for yast2-network fixes the following issues:
- Don't crash at the end of installation when storing wifi configuration for NetworkManager. (bsc#1187512)
| Advisory ID | SUSE-RU-2022:692-1
|
| Released | Thu Mar 3 15:46:47 2022 |
| Summary | Recommended update for filesystem |
| Type | recommended |
| Severity | moderate |
| References | 1190447 |
Description:
This update for filesystem fixes the following issues:
- Release ported filesystem to LTSS channels (bsc#1190447).
| Advisory ID | SUSE-SU-2022:702-1
|
| Released | Thu Mar 3 18:22:59 2022 |
| Summary | Security update for cyrus-sasl |
| Type | security |
| Severity | important |
| References | 1196036,CVE-2022-24407 |
Description:
This update for cyrus-sasl fixes the following issues:
- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
| Advisory ID | SUSE-RU-2022:787-1
|
| Released | Thu Mar 10 11:20:13 2022 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for openldap2 fixes the following issue:
- restore CLDAP functionality in CLI tools (jsc#PM-3288)
| Advisory ID | SUSE-RU-2022:789-1
|
| Released | Thu Mar 10 11:22:05 2022 |
| Summary | Recommended update for update-alternatives |
| Type | recommended |
| Severity | moderate |
| References | 1195654 |
Description:
This update for update-alternatives fixes the following issues:
- Break bash - update-alternatives cycle rewrite of '%post' in 'lua'. (bsc#1195654)
| Advisory ID | SUSE-RU-2022:808-1
|
| Released | Fri Mar 11 06:07:58 2022 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | moderate |
| References | 1195468 |
Description:
This update for procps fixes the following issues:
- Stop registering signal handler for SIGURG, to avoid `ps` failure if
someone sends such signal. Without the signal handler, SIGURG will
just be ignored. (bsc#1195468)
| Advisory ID | SUSE-SU-2022:823-1
|
| Released | Mon Mar 14 15:16:37 2022 |
| Summary | Security update for protobuf |
| Type | security |
| Severity | moderate |
| References | 1195258,CVE-2021-22570 |
Description:
This update for protobuf fixes the following issues:
- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
| Advisory ID | SUSE-SU-2022:832-1
|
| Released | Mon Mar 14 17:27:03 2022 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1193625,1194640,1194768,1194770,1195560,CVE-2015-8985,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219 |
Description:
glibc was updated to fix the following issues:
Security issues fixed:
- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)
Also the following bug was fixed:
- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
| Advisory ID | SUSE-SU-2022:845-1
|
| Released | Tue Mar 15 11:40:52 2022 |
| Summary | Security update for chrony |
| Type | security |
| Severity | moderate |
| References | 1099272,1115529,1128846,1162964,1172113,1173277,1174075,1174911,1180689,1181826,1187906,1190926,1194229,CVE-2020-14367 |
Description:
This update for chrony fixes the following issues:
Chrony was updated to 4.1, bringing features and bugfixes.
Update to 4.1
* Add support for NTS servers specified by IP address (matching
Subject Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE
server
- Ensure the correct pool packages are installed for openSUSE
and SLE (bsc#1180689).
- Fix pool package dependencies, so that SLE prefers chrony-pool-suse
over chrony-pool-empty. (bsc#1194229)
- Enable syscallfilter unconditionally [bsc#1181826].
Update to 4.0
- Enhancements
- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of
unauthenticated sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented
configuration
- Add sourcedir directive and 'reload sources' command to
support dynamic NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point
(DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included
files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
option
- Avoid replacing NTP sources with sources that have
unreachable address
- Improve pools to repeat name resolution to get 'maxsources'
sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state
to online
- Update clock synchronisation status and leap status more
frequently
- Update seccomp filter
- Add 'add pool' command
- Add 'reset sources' command to drop all measurements
- Add authdata command to print details about NTP
authentication
- Add selectdata command to print details about source
selection
- Add -N option and sourcename command to print original names
of sources
- Add -a option to some commands to print also unresolved
sources
- Add -k, -p, -r options to clients command to select, limit,
reset data
- Bug fixes
- Don’t set interface for NTP responses to allow asymmetric
routing
- Handle RTCs that don’t support interrupts
- Respond to command requests with correct address on
multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets
(chrony 2.x clients using non-MD5/SHA1 keys need to use
option 'version 3')
- Drop support for line editing with GNU Readline
- By default we don't write log files but log to journald, so
only recommend logrotate.
- Adjust and rename the sysconfig file, so that it matches the
expectations of chronyd.service (bsc#1173277).
Update to 3.5.1:
* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)
- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Use iburst in the default pool statements to speed up initial
synchronisation (bsc#1172113).
Update to 3.5:
- Add support for more accurate reading of PHC on Linux 5.0
- Add support for hardware timestamping on interfaces with read-only timestamping configuration
- Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
- Update seccomp filter to work on more architectures
- Validate refclock driver options
- Fix bindaddress directive on FreeBSD
- Fix transposition of hardware RX timestamp on Linux 4.13 and later
- Fix building on non-glibc systems
- Fix location of helper script in chrony-dnssrv@.service
(bsc#1128846).
- Read runtime servers from /var/run/netconfig/chrony.servers to
fix bsc#1099272.
- Move chrony-helper to /usr/lib/chrony/helper, because there
should be no executables in /usr/share.
Update to version 3.4
* Enhancements
+ Add filter option to server/pool/peer directive
+ Add minsamples and maxsamples options to hwtimestamp directive
+ Add support for faster frequency adjustments in Linux 4.19
+ Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd
without root privileges to remove it on exit
+ Disable sub-second polling intervals for distant NTP sources
+ Extend range of supported sub-second polling intervals
+ Get/set IPv4 destination/source address of NTP packets on FreeBSD
+ Make burst options and command useful with short polling intervals
+ Modify auto_offline option to activate when sending request failed
+ Respond from interface that received NTP request if possible
+ Add onoffline command to switch between online and offline state
according to current system network configuration
+ Improve example NetworkManager dispatcher script
* Bug fixes
+ Avoid waiting in Linux getrandom system call
+ Fix PPS support on FreeBSD and NetBSD
Update to version 3.3
* Enhancements:
+ Add burst option to server/pool directive
+ Add stratum and tai options to refclock directive
+ Add support for Nettle crypto library
+ Add workaround for missing kernel receive timestamps on Linux
+ Wait for late hardware transmit timestamps
+ Improve source selection with unreachable sources
+ Improve protection against replay attacks on symmetric mode
+ Allow PHC refclock to use socket in /var/run/chrony
+ Add shutdown command to stop chronyd
+ Simplify format of response to manual list command
+ Improve handling of unknown responses in chronyc
* Bug fixes:
+ Respond to NTPv1 client requests with zero mode
+ Fix -x option to not require CAP_SYS_TIME under non-root user
+ Fix acquisitionport directive to work with privilege separation
+ Fix handling of socket errors on Linux to avoid high CPU usage
+ Fix chronyc to not get stuck in infinite loop after clock step
| Advisory ID | SUSE-SU-2022:853-1
|
| Released | Tue Mar 15 19:27:30 2022 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1196877,CVE-2022-0778 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
| Advisory ID | SUSE-RU-2022:861-1
|
| Released | Tue Mar 15 23:30:48 2022 |
| Summary | Recommended update for openssl-1_1 |
| Type | recommended |
| Severity | moderate |
| References | 1182959,1195149,1195792,1195856 |
Description:
This update for openssl-1_1 fixes the following issues:
openssl-1_1:
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
glibc:
- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
linux-glibc-devel:
- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1
libxcrypt:
- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1
zlib:
- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
| Advisory ID | SUSE-RU-2022:867-1
|
| Released | Wed Mar 16 07:14:44 2022 |
| Summary | Recommended update for libtirpc |
| Type | recommended |
| Severity | moderate |
| References | 1193805 |
Description:
This update for libtirpc fixes the following issues:
- Fix memory leak in client protocol version 2 code (bsc#1193805)
| Advisory ID | SUSE-RU-2022:874-1
|
| Released | Wed Mar 16 10:40:52 2022 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1197004 |
Description:
This update for openldap2 fixes the following issue:
- Revert jsc#PM-3288 - CLDAP ( -DLDAP_CONNECTIONLESS ) due to regression (bsc#1197004)
| Advisory ID | SUSE-RU-2022:936-1
|
| Released | Tue Mar 22 18:10:17 2022 |
| Summary | Recommended update for filesystem and systemd-rpm-macros |
| Type | recommended |
| Severity | moderate |
| References | 1196275,1196406 |
Description:
This update for filesystem and systemd-rpm-macros fixes the following issues:
filesystem:
- Add path /lib/modprobe.d (bsc#1196275, jsc#SLE-20639)
systemd-rpm-macros:
- Make %_modprobedir point to /lib/modprobe.d (bsc#1196275, bsc#1196406)
| Advisory ID | SUSE-RU-2022:1021-1
|
| Released | Tue Mar 29 13:24:21 2022 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1195899 |
Description:
This update for systemd fixes the following issues:
- allow setting external core size to infinity (bsc#1195899 jsc#SLE-23868 jsc#SLE-23870)
| Advisory ID | SUSE-RU-2022:1047-1
|
| Released | Wed Mar 30 16:20:56 2022 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1196093,1197024 |
Description:
This update for pam fixes the following issues:
- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.
This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)
| Advisory ID | SUSE-SU-2022:1061-1
|
| Released | Wed Mar 30 18:27:06 2022 |
| Summary | Security update for zlib |
| Type | security |
| Severity | important |
| References | 1197459,CVE-2018-25032 |
Description:
This update for zlib fixes the following issues:
- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
| Advisory ID | SUSE-SU-2022:1073-1
|
| Released | Fri Apr 1 11:45:01 2022 |
| Summary | Security update for yaml-cpp |
| Type | security |
| Severity | moderate |
| References | 1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292 |
Description:
This update for yaml-cpp fixes the following issues:
- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).
| Advisory ID | SUSE-RU-2022:1099-1
|
| Released | Mon Apr 4 12:53:05 2022 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1194883 |
Description:
This update for aaa_base fixes the following issues:
- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)
- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8
multi byte characters as well as support the vi mode of readline library
| Advisory ID | SUSE-RU-2022:1109-1
|
| Released | Mon Apr 4 17:50:01 2022 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | important |
| References | 1172427,1194642 |
Description:
This update for util-linux fixes the following issues:
- Improve throughput and reduce clock sequence increments for high load situation with time based
version 1 uuids. (bsc#1194642)
- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
- Warn if uuidd lock state is not usable. (bsc#1194642)
- Fix 'su -s' bash completion. (bsc#1172427)
| Advisory ID | SUSE-SU-2022:1131-1
|
| Released | Fri Apr 8 09:43:53 2022 |
| Summary | Security update for libsolv, libzypp, zypper |
| Type | security |
| Severity | important |
| References | 1184501,1194848,1195999,1196061,1196317,1196368,1196514,1196925,1197134 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
Security relevant fix:
- Harden package signature checks (bsc#1184501).
libsolv to 0.7.22:
- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members
('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime
libzypp to 17.30.0:
- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
Pay attention that header and payload are secured by a valid
signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
A previously released ISO image may need a bit more time to
release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm
protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf<>patch resolver conflicts (bsc#1194848)
zypper to 1.14.52:
- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
| Advisory ID | SUSE-SU-2022:1158-1
|
| Released | Tue Apr 12 14:44:43 2022 |
| Summary | Security update for xz |
| Type | security |
| Severity | important |
| References | 1198062,CVE-2022-1271 |
Description:
This update for xz fixes the following issues:
- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
| Advisory ID | SUSE-RU-2022:1302-1
|
| Released | Fri Apr 22 10:04:46 2022 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 1196939 |
Description:
This update for e2fsprogs fixes the following issues:
- Add support for 'libreadline7' for Leap. (bsc#1196939)
| Advisory ID | SUSE-RU-2022:1409-1
|
| Released | Tue Apr 26 12:54:57 2022 |
| Summary | Recommended update for gcc11 |
| Type | recommended |
| Severity | moderate |
| References | 1195628,1196107 |
Description:
This update for gcc11 fixes the following issues:
- Add a list of Obsoletes to libstdc++6-pp-gcc11 so updates from
packages provided by older GCC work. Add a requires from that
package to the corresponding libstc++6 package to keep those
at the same version. [bsc#1196107]
- Fixed memory corruption when creating dependences with the D language frontend.
- Add gcc11-PIE, similar to gcc-PIE but affecting gcc11 [bsc#1195628]
- Put libstdc++6-pp Requires on the shared library and drop
to Recommends.
| Advisory ID | SUSE-RU-2022:1452-1
|
| Released | Thu Apr 28 10:48:06 2022 |
| Summary | Recommended update for perl |
| Type | recommended |
| Severity | moderate |
| References | 1193489 |
Description:
This update for perl fixes the following issues:
- Fix Socket::VERSION evaluation and stabilize Socket:VERSION comparisons (bsc#1193489)
| Advisory ID | SUSE-RU-2022:1655-1
|
| Released | Fri May 13 15:36:10 2022 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1197794 |
Description:
This update for pam fixes the following issue:
- Do not include obsolete header files (bsc#1197794)
| Advisory ID | SUSE-RU-2022:1658-1
|
| Released | Fri May 13 15:40:20 2022 |
| Summary | Recommended update for libpsl |
| Type | recommended |
| Severity | important |
| References | 1197771 |
Description:
This update for libpsl fixes the following issues:
- Fix libpsl compilation issues (bsc#1197771)
| Advisory ID | SUSE-SU-2022:1688-1
|
| Released | Mon May 16 14:02:49 2022 |
| Summary | Security update for e2fsprogs |
| Type | security |
| Severity | important |
| References | 1198446,CVE-2022-1304 |
Description:
This update for e2fsprogs fixes the following issues:
- CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault
and possibly arbitrary code execution. (bsc#1198446)
| Advisory ID | SUSE-RU-2022:1691-1
|
| Released | Mon May 16 15:13:39 2022 |
| Summary | Recommended update for augeas |
| Type | recommended |
| Severity | moderate |
| References | 1197443 |
Description:
This update for augeas fixes the following issue:
- Sysctl keys can contain some more non-alphanumeric characters. (bsc#1197443)
| Advisory ID | SUSE-SU-2022:1750-1
|
| Released | Thu May 19 15:28:20 2022 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | important |
| References | 1196490,1199132,CVE-2022-23308,CVE-2022-29824 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
- CVE-2022-29824: Fixed integer overflow that could have led to an out-of-bounds write in buf.c (xmlBuf*) and tree.c (xmlBuffer*) (bsc#1199132).
| Advisory ID | SUSE-SU-2022:1832-1
|
| Released | Tue May 24 11:52:33 2022 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | important |
| References | 1191157,1197004,1199240,CVE-2022-29155 |
Description:
This update for openldap2 fixes the following issues:
Security:
- CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240).
Bugfixes:
- allow specification of max/min TLS version with TLS1.3 (bsc#1191157)
- libldap was able to be out of step with openldap in some cases which could cause incorrect installations and symbol
resolution failures. openldap2 and libldap now are locked to their related release versions. (bsc#1197004)
- restore CLDAP functionality in CLI tools (jsc#PM-3288)
| Advisory ID | SUSE-RU-2022:1887-1
|
| Released | Tue May 31 09:24:18 2022 |
| Summary | Recommended update for grep |
| Type | recommended |
| Severity | moderate |
| References | 1040589 |
Description:
This update for grep fixes the following issues:
- Make profiling deterministic. (bsc#1040589, SLE-24115)
| Advisory ID | SUSE-RU-2022:2019-1
|
| Released | Wed Jun 8 16:50:07 2022 |
| Summary | Recommended update for gcc11 |
| Type | recommended |
| Severity | moderate |
| References | 1192951,1193659,1195283,1196861,1197065 |
Description:
This update for gcc11 fixes the following issues:
Update to the GCC 11.3.0 release.
- includes SLS hardening backport on x86_64. [bsc#1195283]
- includes change to adjust gnats idea of the target, fixing the build of gprbuild. [bsc#1196861]
- fixed miscompile of embedded premake in 0ad on i586. [bsc#1197065]
- use --with-cpu rather than specifying --with-arch/--with-tune
- Fix D memory corruption in -M output.
- Fix ICE in is_this_parameter with coroutines. [bsc#1193659]
- fixes issue with debug dumping together with -o /dev/null
- fixes libgccjit issue showing up in emacs build [bsc#1192951]
- Package mwaitintrin.h
| Advisory ID | SUSE-SU-2022:2068-1
|
| Released | Tue Jun 14 10:14:47 2022 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1185637,1199166,CVE-2022-1292 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
| Advisory ID | SUSE-SU-2022:2179-1
|
| Released | Fri Jun 24 14:05:25 2022 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1200550,CVE-2022-2068 |
Description:
This update for openssl fixes the following issues:
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
| Advisory ID | SUSE-SU-2022:2311-1
|
| Released | Wed Jul 6 15:16:17 2022 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1201099,CVE-2022-2097 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode (bsc#1201099).
| Advisory ID | SUSE-SU-2022:2361-1
|
| Released | Tue Jul 12 12:05:01 2022 |
| Summary | Security update for pcre |
| Type | security |
| Severity | important |
| References | 1199232,CVE-2022-1586 |
Description:
This update for pcre fixes the following issues:
- CVE-2022-1586: Fixed unicode property matching issue. (bsc#1199232)
| Advisory ID | SUSE-SU-2022:2405-1
|
| Released | Fri Jul 15 11:47:57 2022 |
| Summary | Security update for p11-kit |
| Type | security |
| Severity | moderate |
| References | 1180065,CVE-2020-29362 |
Description:
This update for p11-kit fixes the following issues:
- CVE-2020-29362: Fixed a 4 byte overread in p11_rpc_buffer_get_byte_array which could lead to crashes (bsc#1180065)
| Advisory ID | SUSE-RU-2022:2471-1
|
| Released | Thu Jul 21 04:42:58 2022 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1148309,1191502,1195529,1200170 |
Description:
This update for systemd fixes the following issues:
- Allow control characters in environment variable values (bsc#1200170)
- basic/env-util: Allow newlines in values of environment variables
- man: tweak description of auto/noauto (bsc#1191502)
- shared/install: avoid overwriting 'r' counter with a partial result (bsc#1148309)
- shared/install: fix error codes returned by install_context_apply()
- shared/install: ignore failures for auxiliary files
- systemctl: suppress enable/disable messages when `-q` is given
- test-env-util: Verify that \r is disallowed in env var values
- test-env-util: print function headers
- udev: 60-persistent-storage-tape.rules: handle duplicate device ID (bsc#1195529)
| Advisory ID | SUSE-RU-2022:2571-1
|
| Released | Thu Jul 28 04:20:52 2022 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1194550,1197684,1199042 |
Description:
This update for libzypp, zypper fixes the following issues:
libzypp:
- appdata plugin: Pass path to the repodata/ directory inside the cache (bsc#1197684)
- zypp-rpm: flush rpm script output buffer before sending endOfScriptTag
- PluginRepoverification: initial version hooked into repo::Downloader and repo refresh
- Immediately start monitoring the download.transfer_timeout. Do not wait until the first data arrived (bsc#1199042)
- singletrans: no dry-run commit if doing just download-only
- Work around cases where sat repo.start points to an invalid solvable. May happen if (wrong arch) solvables were
removed at the beginning of the repo.
- Fix misplaced #endif SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER
zypper:
- Basic JobReport for 'cmdout/monitor'
- versioncmp: if verbose, also print the edition 'parts' which are compared
- Make sure MediaAccess is closed on exception (bsc#1194550)
- Display plus-content hint conditionally
- Honor the NO_COLOR environment variable when auto-detecting whether to use color
- Define table columns which should be sorted natural [case insensitive]
- lr/ls: Use highlight color on name and alias as well
| Advisory ID | SUSE-SU-2022:2717-1
|
| Released | Tue Aug 9 12:54:16 2022 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1198627,CVE-2022-29458 |
Description:
This update for ncurses fixes the following issues:
- CVE-2022-29458: Fixed segfaulting out-of-bounds read in convert_strings in tinfo/read_entry.c (bsc#1198627).
| Advisory ID | SUSE-SU-2022:2829-1
|
| Released | Wed Aug 17 13:33:11 2022 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1199223,1199224,1200735,1200737,CVE-2022-27781,CVE-2022-27782,CVE-2022-32206,CVE-2022-32208 |
Description:
This update for curl fixes the following issues:
- CVE-2022-27781: Fixed an issue where curl will get stuck in an infinite
loop when trying to retrieve details about a TLS server's certificate chain (bnc#1199223).
- CVE-2022-27782: Fixed an issue where TLS and SSH connections would
be reused even when a related option had been changed (bsc#1199224).
- CVE-2022-32206: Fixed an uncontrolled memory consumption issue caused
by an unbounded number of compression layers (bsc#1200735).
- CVE-2022-32208: Fixed an incorrect message verification issue when
performing FTP transfers using krb5 (bsc#1200737).
| Advisory ID | SUSE-SU-2022:2830-1
|
| Released | Wed Aug 17 14:36:26 2022 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | important |
| References | 1196167,1202020,CVE-2021-4209,CVE-2022-2509 |
Description:
This update for gnutls fixes the following issues:
- CVE-2022-2509: Fixed a double free issue during PKCS7 verification (bsc#1202020).
- CVE-2021-4209: Fixed null pointer dereference in MD_UPDATE (bsc#1196167).
| Advisory ID | SUSE-RU-2022:2905-1
|
| Released | Fri Aug 26 05:30:33 2022 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1198341 |
Description:
This update for openldap2 fixes the following issues:
- Prevent memory reuse which may lead to instability (bsc#1198341)
| Advisory ID | SUSE-RU-2022:2944-1
|
| Released | Wed Aug 31 05:39:14 2022 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | important |
| References | 1181475 |
Description:
This update for procps fixes the following issues:
- Fix 'free' command reporting misleading 'used' value (bsc#1181475)
| Advisory ID | SUSE-SU-2022:2947-1
|
| Released | Wed Aug 31 09:16:21 2022 |
| Summary | Security update for zlib |
| Type | security |
| Severity | important |
| References | 1202175,CVE-2022-37434 |
Description:
This update for zlib fixes the following issues:
- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).
| Advisory ID | SUSE-SU-2022:2991-1
|
| Released | Thu Sep 1 16:04:30 2022 |
| Summary | Security update for libtirpc |
| Type | security |
| Severity | important |
| References | 1198752,1200800,1201680,CVE-2021-46828 |
Description:
This update for libtirpc fixes the following issues:
- CVE-2021-46828: Fixed an uncontrolled file descriptor consumption,
which could be exploited by remote attackers to prevent applications
using the library from accepting new connections (bsc#1201680).
Non-security fixes:
- Exclude ipv6 addresses in client protocol version 2 code (bsc#1200800)
- Fix memory leak in params.r_addr assignement (bsc#1198752)
| Advisory ID | SUSE-RU-2022:2994-1
|
| Released | Fri Sep 2 10:44:54 2022 |
| Summary | Recommended update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame |
| Type | recommended |
| Severity | moderate |
| References | 1198925 |
Description:
This update for lame, libass, libcdio-paranoia, libdc1394, libgsm, libva, libvdpau, libvorbis, libvpx, libwebp, openjpeg, opus, speex, twolame adds some missing 32bit libraries to some products. (bsc#1198925)
No codechanges were done in this update.
| Advisory ID | SUSE-RU-2022:3129-1
|
| Released | Wed Sep 7 04:42:53 2022 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | moderate |
| References | 1197178,1198731,1200842 |
Description:
This update for util-linux fixes the following issues:
- su: Change owner and mode for pty (bsc#1200842)
- agetty: Resolve tty name even if stdin is specified (bsc#1197178)
- libmount: When moving a mount point, update all sub mount entries in utab (bsc#1198731)
- mesg: use only stat() to get the current terminal status (bsc#1200842)
| Advisory ID | SUSE-SU-2022:3144-1
|
| Released | Wed Sep 7 11:04:23 2022 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | important |
| References | 1201225,CVE-2022-34903 |
Description:
This update for gpg2 fixes the following issues:
- CVE-2022-34903: Fixed a potential signature forgery via injection
into the status line when certain unusual conditions are met (bsc#1201225).
| Advisory ID | SUSE-RU-2022:3221-1
|
| Released | Fri Sep 9 04:31:28 2022 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1199895,1200993,1201092,1201576,1201638 |
Description:
This update for libzypp, zypper fixes the following issues:
libzypp:
- Improve handling of package locks, allowing to reset the status of its initial state (bsc#1199895)
- Fix issues when receiving exceptions from curl_easy_cleanup (bsc#1201092)
- Don't auto-flag kernel-firmware as 'reboot-needed' (bsc#1200993)
- Remove Medianetwork and its dependent code. First reason for this is that MediaNetwork was just meant as a way to test
the new CURL based downloaded. Second the Provide API is going to completely replace the current media backend.
zypper:
- Truncate the 'Name' column when using `zypper lr`, if the table is wider than the terminal (bsc#1201638)
- Reject install/remove modifier without argument (bsc#1201576)
- zypper-download: Handle unresolvable arguments as errors
- Put signing key supplying repository name in quotes
| Advisory ID | SUSE-RU-2022:3262-1
|
| Released | Tue Sep 13 15:34:29 2022 |
| Summary | Recommended update for gcc11 |
| Type | recommended |
| Severity | moderate |
| References | 1199140 |
Description:
This update for gcc11 ships some missing 32bit libraries for s390x. (bsc#1199140)
| Advisory ID | SUSE-RU-2022:3304-1
|
| Released | Mon Sep 19 11:43:25 2022 |
| Summary | Recommended update for libassuan |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for libassuan fixes the following issues:
- Add a timeout for writing to a SOCKS5 proxy
- Add workaround for a problem with LD_LIBRARY_PATH on newer systems
- Fix issue in the logging code
- Fix some build trivialities
- Upgrade autoconf
| Advisory ID | SUSE-SU-2022:3307-1
|
| Released | Mon Sep 19 13:26:51 2022 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | moderate |
| References | 1189802,1195773,1201783,CVE-2021-36690,CVE-2022-35737 |
Description:
This update for sqlite3 fixes the following issues:
- CVE-2022-35737: Fixed an array-bounds overflow if billions of bytes are used in a string argument to a C API (bnc#1201783).
- CVE-2021-36690: Fixed an issue with the SQLite Expert extension when a column has no collating sequence (bsc#1189802).
- Package the Tcl bindings here again so that we only ship one copy of SQLite (bsc#1195773).
| Advisory ID | SUSE-SU-2022:3549-1
|
| Released | Fri Oct 7 14:39:40 2022 |
| Summary | Security update for cyrus-sasl |
| Type | security |
| Severity | important |
| References | 1159635,CVE-2019-19906 |
Description:
This update for cyrus-sasl fixes the following issues:
- CVE-2019-19906: Fixed an out-of-bounds write that could lead to unauthenticated remote denial of service in OpenLDAP via a malformed LDAP packet (bsc#1159635).
| Advisory ID | SUSE-RU-2022:3566-1
|
| Released | Tue Oct 11 16:19:09 2022 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | critical |
| References | 1189282,1201972,1203649 |
Description:
This update for libzypp, zypper fixes the following issues:
libzypp:
- Enable 'zck' support for SUSE Linux Enterprise 15 Service Pack 4 and newer (bsc#1189282)
- Fix regression leading to `-allow-vendor-change` and `no-allow-vendor-change` options being ignored (bsc#1201972)
- Remove migration code that is no longer needed (bsc#1203649)
- Store logrotate files in vendor specif directory '/usr/etc/logrotate.d' if so defined
zypper:
- Fix contradiction in the man page: `--download-in-advance` option is the default behavior
- Fix regression leading to `-allow-vendor-change` and `no-allow-vendor-change` options being ignored (bsc#1201972)
- Fix tests to use locale 'C.UTF-8' rather than 'en_US'
- Make sure 'up' respects solver related CLI options (bsc#1201972)
- Remove unneeded code to compute the PPP status because it is now auto established
- Store logrotate files in vendor specif directory '/usr/etc/logrotate.d' if so defined
| Advisory ID | SUSE-SU-2022:3683-1
|
| Released | Fri Oct 21 11:48:39 2022 |
| Summary | Security update for libksba |
| Type | security |
| Severity | critical |
| References | 1204357,CVE-2022-3515 |
Description:
This update for libksba fixes the following issues:
- CVE-2022-3515: Fixed a possible overflow in the TLV parser (bsc#1204357).
| Advisory ID | SUSE-SU-2022:3774-1
|
| Released | Wed Oct 26 12:21:09 2022 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1202593,1204383,CVE-2022-32221,CVE-2022-35252 |
Description:
This update for curl fixes the following issues:
- CVE-2022-32221: Fixed POST following PUT confusion (bsc#1204383).
- CVE-2022-35252: Fixed a potential injection of control characters into cookies (bsc#1202593).
| Advisory ID | SUSE-SU-2022:3784-1
|
| Released | Wed Oct 26 18:03:28 2022 |
| Summary | Security update for libtasn1 |
| Type | security |
| Severity | critical |
| References | 1204690,CVE-2021-46848 |
Description:
This update for libtasn1 fixes the following issues:
- CVE-2021-46848: Fixed off-by-one array size check that affects asn1_encode_simple_der (bsc#1204690)
| Advisory ID | SUSE-SU-2022:3871-1
|
| Released | Fri Nov 4 13:26:29 2022 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | important |
| References | 1201978,1204366,1204367,CVE-2016-3709,CVE-2022-40303,CVE-2022-40304 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).
- CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE (bsc#1204366).
- CVE-2022-40304: Fixed dict corruption caused by entity reference cycles (bsc#1204367).
| Advisory ID | SUSE-RU-2022:3882-1
|
| Released | Mon Nov 7 09:06:03 2022 |
| Summary | Recommended update for openssl-1_1 |
| Type | recommended |
| Severity | moderate |
| References | 1180995 |
Description:
This update for openssl-1_1 fixes the following issues:
- FIPS: Default to RFC7919 groups when generating ECDH parameters
using 'genpkey' or 'dhparam' in FIPS mode. (bsc#1180995)
| Advisory ID | SUSE-RU-2022:3905-1
|
| Released | Tue Nov 8 12:23:17 2022 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | important |
| References | 1196840,1199492,1199918,1199926,1199927 |
Description:
This update for aaa_base and iputils fixes the following issues:
aaa_base:
- Failures in ping for SUSE Linux Enterprise 15 and 15 SP1 due to sysctl setting for ping_group_range (bsc#1199926, bsc#1199927)
- The wrapper rootsh is not a restricted shell (bsc#1199492)
iputils:
- Fix device binding on ping6 for ICMP datagram socket. (bsc#1196840, bsc#1199918, bsc#1199926, bsc#1199927)
| Advisory ID | SUSE-RU-2022:3910-1
|
| Released | Tue Nov 8 13:05:04 2022 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for pam fixes the following issue:
- Update pam_motd to the most current version. (PED-1712)
| Advisory ID | SUSE-RU-2022:3961-1
|
| Released | Mon Nov 14 07:33:50 2022 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | important |
| References | 1203652 |
Description:
This update for zlib fixes the following issues:
- Fix updating strm.adler with inflate() if DFLTCC is used (bsc#1203652)
| Advisory ID | SUSE-RU-2022:3975-1
|
| Released | Mon Nov 14 15:41:13 2022 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | moderate |
| References | 1201959 |
Description:
This update for util-linux fixes the following issues:
- libuuid improvements (bsc#1201959, PED-1150):
libuuid: Fix range when parsing UUIDs.
Improve cache handling for short running applications-increment the cache size over runtime.
Implement continuous clock handling for time based UUIDs.
Check clock value from clock file to provide seamless libuuid.
| Advisory ID | SUSE-SU-2022:4081-1
|
| Released | Fri Nov 18 15:40:46 2022 |
| Summary | Security update for dpkg |
| Type | security |
| Severity | low |
| References | 1199944,CVE-2022-1664 |
Description:
This update for dpkg fixes the following issues:
- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).
| Advisory ID | SUSE-SU-2022:4155-1
|
| Released | Mon Nov 21 14:36:17 2022 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | important |
| References | 1205126,CVE-2022-42898 |
Description:
This update for krb5 fixes the following issues:
- CVE-2022-42898: Fixed integer overflow in PAC parsing (bsc#1205126).
| Advisory ID | SUSE-RU-2022:4256-1
|
| Released | Mon Nov 28 12:36:32 2022 |
| Summary | Recommended update for gcc12 |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for gcc12 fixes the following issues:
This update ship the GCC 12 compiler suite and its base libraries.
The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.
The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP3 and SP4, and provided in the 'Development Tools' module.
The Go, D and Ada language compiler parts are available unsupported via the
PackageHub repositories.
To use gcc12 compilers use:
- install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
- override your Makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.
For a full changelog with all new GCC12 features, check out
https://gcc.gnu.org/gcc-12/changes.html
| Advisory ID | SUSE-SU-2022:4628-1
|
| Released | Wed Dec 28 09:23:13 2022 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | moderate |
| References | 1206337,CVE-2022-46908 |
Description:
This update for sqlite3 fixes the following issues:
- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,
when relying on --safe for execution of an untrusted CLI script (bsc#1206337).
| Advisory ID | SUSE-SU-2023:56-1
|
| Released | Mon Jan 9 11:13:43 2023 |
| Summary | Security update for libksba |
| Type | security |
| Severity | moderate |
| References | 1206579,CVE-2022-47629 |
Description:
This update for libksba fixes the following issues:
- CVE-2022-47629: Fixed an integer overflow vulnerability in the CRL
signature parser (bsc#1206579).
| Advisory ID | SUSE-RU-2023:181-1
|
| Released | Thu Jan 26 21:55:43 2023 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 1206412 |
Description:
This update for procps fixes the following issues:
- Improve memory handling/usage (bsc#1206412)
- Make sure that correct library version is installed (bsc#1206412)
| Advisory ID | SUSE-RU-2023:188-1
|
| Released | Fri Jan 27 12:07:19 2023 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | important |
| References | 1203652 |
Description:
This update for zlib fixes the following issues:
- Follow up fix for bug bsc#1203652 due to libxml2 issues
| Advisory ID | SUSE-SU-2023:308-1
|
| Released | Tue Feb 7 17:33:37 2023 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1207533,1207534,1207536,CVE-2022-4304,CVE-2023-0215,CVE-2023-0286 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).
- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).
- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).
| Advisory ID | SUSE-RU-2023:446-1
|
| Released | Fri Feb 17 09:52:43 2023 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | moderate |
| References | 1194038,1205646 |
Description:
This update for util-linux fixes the following issues:
- Fix tests not passing when '@' character is in build path:
Fixes rpmbuild %checks fail when @ in the directory path (bsc#1194038).
- libuuid continuous clock handling for time based UUIDs:
Prevent use of the new libuuid ABI by uuidd %post before update
of libuuid1 (bsc#1205646).
| Advisory ID | SUSE-RU-2023:676-1
|
| Released | Wed Mar 8 14:33:23 2023 |
| Summary | Recommended update for libxml2 |
| Type | recommended |
| Severity | moderate |
| References | 1204585 |
Description:
This update for libxml2 fixes the following issues:
- Add W3C conformance tests to the testsuite (bsc#1204585):
* Added file xmlts20080827.tar.gz
| Advisory ID | SUSE-RU-2023:776-1
|
| Released | Thu Mar 16 17:29:23 2023 |
| Summary | Recommended update for gcc12 |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for gcc12 fixes the following issues:
This update ships gcc12 also to the SUSE Linux Enterprise 15 SP1 LTSS and 15 SP2 LTSS products.
SUSE Linux Enterprise 15 SP3 and SP4 get only refreshed builds without changes
This update ship the GCC 12 compiler suite and its base libraries.
The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.
The new compilers for C, C++, and Fortran are provided in the SUSE Linux
Enterprise Module for Development Tools.
To use gcc12 compilers use:
- install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
- override your makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.
For a full changelog with all new GCC12 features, check out
https://gcc.gnu.org/gcc-12/changes.html
| Advisory ID | SUSE-RU-2023:787-1
|
| Released | Thu Mar 16 19:37:18 2023 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | important |
| References | 1178233,1203248,1203249,1203715,1204548,1204956,1205570,1205636,1206949 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
libsolv:
- Do not autouninstall SUSE PTF packages
- Ensure 'duplinvolvedmap_all' is reset when a solver is reused
- Fix 'keep installed' jobs not disabling 'best update' rules
- New '-P' and '-W' options for `testsolv`
- New introspection interface for weak dependencies similar to ruleinfos
- Ensure special case file dependencies are written correctly in the testcase writer
- Support better info about alternatives
- Support decision reason queries
- Support merging of related decisions
- Support stringification of multiple solvables
- Support stringification of ruleinfo, decisioninfo and decision reasons
libzypp:
- Avoid calling getsockopt when we know the info already.
This patch should fix logging on WSL, getsockopt seems to not be fully supported but the code required it when
accepting new socket connections (bsc#1178233)
- Avoid redirecting 'history.logfile=/dev/null' into the target
- Create '.no_auto_prune' in the package cache dir to prevent auto cleanup of orphaned repositories (bsc#1204956)
- Enhance yaml-cpp detection
- Improve download of optional files
- MultiCurl: Make sure to reset the progress function when falling back.
- Properly reset range requests (bsc#1204548)
- Removing a PTF without enabled repos should always fail (bsc#1203248)
Without enabled repos, the dependent PTF-packages would be removed (not replaced!) as well.
To remove a PTF `zypper install -- -PTF` or a dedicated `zypper removeptf PTF` should be used. This will update the
installed PTF packages to theit latest version.
- Skip media.1/media download for http repo status calc.
This patch allows zypp to skip a extra media.1/media download to calculate if a repository needs to be refreshed.
This optimisation only takes place if the repo does specify only downloading base urls.
- Use a dynamic fallback for BLKSIZE in downloads.
When not receiving a blocklist via metalink file from the server MediaMultiCurl used to fallback to a fixed,
relatively small BLKSIZE. This patch changes the fallback into a dynamic value based on the filesize using a similar
metric as the MirrorCache implementation on the server side.
- ProgressData: enforce reporting the INIT||END state (bsc#1206949)
- ps: fix service detection on newer Tumbleweed systems (bsc#1205636)
zypper:
- Allow to (re)add a service with the same URL (bsc#1203715)
- Bump dependency requirement to libzypp-devel 17.31.7 or greater
- Explain outdatedness of repositories
- patterns: Avoid dispylaing superfluous @System entries (bsc#1205570)
- Provide `removeptf` command (bsc#1203249)
A remove command which prefers replacing dependant packages to removing them as well.
A PTF is typically removed as soon as the fix it provides is applied to the latest official update of the dependant
packages. However it is not desired for the dependant packages to be removed together with the PTF, which is what the
remove command would do. The `removeptf` command however will aim to replace the dependant packages by their official
update versions.
- Update man page and explain '.no_auto_prune' (bsc#1204956)
| Advisory ID | SUSE-SU-2023:1748-1
|
| Released | Tue Apr 4 09:06:59 2023 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1209624,CVE-2023-0464 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2023-0464: Fixed excessive Resource Usage Verifying X.509 Policy Constraints (bsc#1209624).
| Advisory ID | SUSE-SU-2023:1825-1
|
| Released | Wed Apr 12 15:39:59 2023 |
| Summary | Security update for helm |
| Type | security |
| Severity | low |
| References | 1206469,CVE-2022-23525 |
Description:
This update for helm fixes the following issues:
- CVE-2022-23525: Fixed denial of service through repository index file (bsc#1206469).
| Advisory ID | SUSE-SU-2023:1908-1
|
| Released | Wed Apr 19 08:38:53 2023 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1209873,1209878,CVE-2023-0465,CVE-2023-0466 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2023-0465: Fixed ignored invalid certificate policies in leaf certificates (bsc#1209878).
- CVE-2023-0466: Fixed disabled certificate policy check (bsc#1209873).
| Advisory ID | SUSE-RU-2023:1991-1
|
| Released | Tue Apr 25 13:22:19 2023 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1160285,1210096 |
Description:
This update for permissions fixes the following issues:
- mariadb: settings for new auth_pam_tool (bsc#1160285, bsc#1210096)
| Advisory ID | SUSE-SU-2023:2002-1
|
| Released | Tue Apr 25 18:03:34 2023 |
| Summary | Security update for helm |
| Type | security |
| Severity | critical |
| References | 1200528,CVE-2022-1996 |
Description:
This update for helm fixes the following issues:
- CVE-2022-1996: Fixed a bug that could lead to CORS bypass in go-restful. (bsc#1200528)
| Advisory ID | SUSE-SU-2023:2048-1
|
| Released | Wed Apr 26 21:05:45 2023 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | important |
| References | 1065270,1199132,1204585,1210411,1210412,CVE-2021-3541,CVE-2022-29824,CVE-2023-28484,CVE-2023-29469 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2023-29469: Fixed inconsistent result when hashing empty strings (bsc#1210412).
- CVE-2023-28484: Fixed NULL pointer dereference in xmlSchemaFixupComplexType (bsc#1210411).
- CVE-2022-29824: Fixed integer overflow leading to out-of-bounds write in buf.c (bsc#1199132).
The following non-security bugs were fixed:
- Added W3C conformance tests to the testsuite (bsc#1204585).
- Fixed NULL pointer dereference when parsing invalid data (glgo#libxml2!15) (bsc#1065270) .
SUSE-CU-2022:79-1
| Container Advisory ID | SUSE-CU-2022:79-1 |
| Container Tags | caasp/v4/helm-tiller:2.16.12 , caasp/v4/helm-tiller:2.16.12-rev3 , caasp/v4/helm-tiller:2.16.12-rev3-build3.12.172 |
| Container Release | 3.12.172 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2020:3853-1
|
| Released | Wed Dec 16 12:27:27 2020 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | moderate |
| References | 1084671,1169006,1174942,1175514,1175623,1178554,1178825 |
Description:
This update for util-linux fixes the following issue:
- Do not trigger the automatic close of CDROM. (bsc#1084671)
- Try to automatically configure broken serial lines. (bsc#1175514)
- Avoid `sulogin` failing on not existing or not functional console devices. (bsc#1175514)
- Build with `libudev` support to support non-root users. (bsc#1169006)
- Avoid memory errors on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix warning on mounts to `CIFS` with mount –a. (bsc#1174942)
| Advisory ID | SUSE-RU-2020:3942-1
|
| Released | Tue Dec 29 12:22:01 2020 |
| Summary | Recommended update for libidn2 |
| Type | recommended |
| Severity | moderate |
| References | 1180138 |
Description:
This update for libidn2 fixes the following issues:
- The library is actually dual licensed, GPL-2.0-or-later or LGPL-3.0-or-later,
adjusted the RPM license tags (bsc#1180138)
| Advisory ID | SUSE-RU-2020:3943-1
|
| Released | Tue Dec 29 12:24:45 2020 |
| Summary | Recommended update for libxml2 |
| Type | recommended |
| Severity | moderate |
| References | 1178823 |
Description:
This update for libxml2 fixes the following issues:
Avoid quadratic checking of identity-constraints, speeding up XML validation (bsc#1178823)
- key/unique/keyref schema attributes currently use quadratic loops
to check their various constraints (that keys are unique and that
keyrefs refer to existing keys).
- This fix uses a hash table to avoid the quadratic behaviour.
| Advisory ID | SUSE-SU-2021:129-1
|
| Released | Thu Jan 14 12:26:15 2021 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1178909,1179503,CVE-2020-25709,CVE-2020-25710 |
Description:
This update for openldap2 fixes the following issues:
Security issues fixed:
- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
Non-security issue fixed:
- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)
| Advisory ID | SUSE-RU-2021:220-1
|
| Released | Tue Jan 26 14:00:51 2021 |
| Summary | Recommended update for keyutils |
| Type | recommended |
| Severity | moderate |
| References | 1180603 |
Description:
This update for keyutils fixes the following issues:
- Adjust the library license to be LPGL-2.1+ only (the tools are GPL2+, the library is just LGPL-2.1+) (bsc#1180603)
| Advisory ID | SUSE-RU-2021:233-1
|
| Released | Wed Jan 27 12:15:33 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1141597,1174436,1175458,1177490,1179363,1179824,1180225 |
Description:
This update for systemd fixes the following issues:
- Added a timestamp to the output of the busctl monitor command (bsc#1180225)
- Fixed a NULL pointer dereference bug when attempting to close the journal file handle (bsc#1179824)
- Improved the caching of cgroups member mask (bsc#1175458)
- Fixed the dependency definition of sound.target (bsc#1179363)
- Fixed a bug that could lead to a potential error, when daemon-reload is called between
StartTransientUnit and scope_start() (bsc#1174436)
- time-util: treat /etc/localtime missing as UTC (bsc#1141597)
- Removed mq-deadline selection from 60-io-scheduler.rules (bsc#1177490)
| Advisory ID | SUSE-RU-2021:265-1
|
| Released | Mon Feb 1 15:06:45 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1178775,1180885 |
Description:
This update for systemd fixes the following issues:
- Fix for udev creating '/dev/disk/by-label' symlink for 'LUKS2' to avoid mount issues. (bsc#1180885, #8998))
- Fix for an issue when container start causes interference in other containers. (bsc#1178775)
| Advisory ID | SUSE-RU-2021:293-1
|
| Released | Wed Feb 3 12:52:34 2021 |
| Summary | Recommended update for gmp |
| Type | recommended |
| Severity | moderate |
| References | 1180603 |
Description:
This update for gmp fixes the following issues:
- correct license statements of packages (library itself is no GPL-3.0) (bsc#1180603)
| Advisory ID | SUSE-RU-2021:305-1
|
| Released | Thu Feb 4 15:00:37 2021 |
| Summary | Recommended update for libprotobuf |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
libprotobuf was updated to fix:
- ship the libprotobuf-lite15 on the base products. (jsc#ECO-2911)
| Advisory ID | SUSE-RU-2021:307-1
|
| Released | Fri Feb 5 05:30:34 2021 |
| Summary | Recommended update for libselinux |
| Type | recommended |
| Severity | low |
| References | 1180603 |
Description:
This update for libselinux fixes the following issues:
- Corrected the license to public domain (bsc#1180603)
| Advisory ID | SUSE-OU-2021:339-1
|
| Released | Mon Feb 8 13:16:07 2021 |
| Summary | Optional update for pam |
| Type | optional |
| Severity | low |
| References | |
Description:
This update for pam fixes the following issues:
- Added rpm macros for this package, so that other packages can make use of it
This patch is optional to be installed - it doesn't fix any bugs.
| Advisory ID | SUSE-SU-2021:653-1
|
| Released | Fri Feb 26 19:53:43 2021 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1178386,1179694,1179721,1180038,1181505,1182117,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2020-29573,CVE-2021-3326 |
Description:
This update for glibc fixes the following issues:
- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)
| Advisory ID | SUSE-SU-2021:723-1
|
| Released | Mon Mar 8 16:45:27 2021 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | important |
| References | 1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420,CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212 |
Description:
This update for openldap2 fixes the following issues:
- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
X.509 DN parsing in decode.c ber_next_element, resulting in denial
of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
in the Certificate List Exact Assertion processing, resulting in
denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch->bv_len miscalculation and slapd
crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
Assertion processing, resulting in denial of service (schema_init.c
serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
control handling, resulting in denial of service (double free and
out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
in the issuerAndThisUpdateCheck function via a crafted packet,
resulting in a denial of service (daemon exit) via a short timestamp.
This is related to schema_init.c and checkTime.
| Advisory ID | SUSE-SU-2021:753-1
|
| Released | Tue Mar 9 17:09:57 2021 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1182331,1182333,CVE-2021-23840,CVE-2021-23841 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
| Advisory ID | SUSE-RU-2021:786-1
|
| Released | Mon Mar 15 11:19:23 2021 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1176201 |
Description:
This update for zlib fixes the following issues:
- Fixed hw compression on z15 (bsc#1176201)
| Advisory ID | SUSE-SU-2021:890-1
|
| Released | Fri Mar 19 15:51:41 2021 |
| Summary | Security update for glib2 |
| Type | security |
| Severity | important |
| References | 1182328,1182362,CVE-2021-27218,CVE-2021-27219 |
Description:
This update for glib2 fixes the following issues:
- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
| Advisory ID | SUSE-RU-2021:924-1
|
| Released | Tue Mar 23 10:00:49 2021 |
| Summary | Recommended update for filesystem |
| Type | recommended |
| Severity | moderate |
| References | 1078466,1146705,1175519,1178775,1180020,1180083,1180596,1181011,1181831,1183094 |
Description:
This update for filesystem the following issues:
- Remove duplicate line due to merge error
- Add fix for 'mesa' creating cache with perm 0700. (bsc#1181011)
- Fixed an issue causing failure during installation/upgrade a failure. (rh#1548403) (bsc#1146705)
- Allows to override config to add cleanup options of '/var/tmp'. (bsc#1078466)
- Create config to cleanup '/tmp' regular required with 'tmpfs'. (bsc#1175519)
This update for systemd fixes the following issues:
- Fix for a possible memory leak. (bsc#1180020)
- Fix for a case when to a bind mounted directory results inactive mount units. (#7811) (bsc#1180596)
- Fixed an issue when starting a container conflicts with another one. (bsc#1178775)
- Drop most of the tmpfiles that deal with generic paths and avoid warnings. (bsc#1078466, bsc#1181831)
- Don't use shell redirections when calling a rpm macro. (bsc#1183094)
- 'systemd' requires 'aaa_base' >= 13.2. (bsc#1180083)
| Advisory ID | SUSE-SU-2021:934-1
|
| Released | Wed Mar 24 12:18:21 2021 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | important |
| References | 1183456,1183457,CVE-2021-20231,CVE-2021-20232 |
Description:
This update for gnutls fixes the following issues:
- CVE-2021-20232: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183456).
- CVE-2021-20231: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183457).
| Advisory ID | SUSE-SU-2021:948-1
|
| Released | Wed Mar 24 14:31:34 2021 |
| Summary | Security update for zstd |
| Type | security |
| Severity | moderate |
| References | 1183370,1183371,CVE-2021-24031,CVE-2021-24032 |
Description:
This update for zstd fixes the following issues:
- CVE-2021-24031: Added read permissions to files while being compressed or uncompressed (bsc#1183371).
- CVE-2021-24032: Fixed a race condition which could have allowed an attacker to access world-readable destination file (bsc#1183370).
| Advisory ID | SUSE-SU-2021:956-1
|
| Released | Thu Mar 25 19:19:02 2021 |
| Summary | Security update for libzypp, zypper |
| Type | security |
| Severity | moderate |
| References | 1050625,1174016,1177238,1177275,1177427,1177583,1178910,1178966,1179083,1179222,1179816,1179847,1179909,1180077,1180663,1180721,1181328,1181622,1182629,CVE-2017-9271 |
Description:
This update for libzypp, zypper fixes the following issues:
Update zypper to version 1.14.43:
- doc: give more details about creating versioned package locks
(bsc#1181622)
- man: Document synonymously used patch categories (bsc#1179847)
- Fix source-download commands help (bsc#1180663)
- man: Recommend to use the --non-interactive global option rather than the command option -y (bsc#1179816)
- Extend apt packagemap (fixes #366)
- --quiet: Fix install summary to write nothing if there's nothing todo (bsc#1180077)
- Prefer /run over /var/run.
Update libzypp to 17.25.8:
- Try to provide a mounted /proc in --root installs (bsc#1181328)
Some systemd tools require /proc to be mounted and fail if it's
not there.
- Enable release packages to request a releaxed suse/opensuse
vendorcheck in dup when migrating. (bsc#1182629)
- Patch: Identify well-known category names (bsc#1179847)
This allows to use the RH and SUSE patch categrory names
synonymously:
(recommended = bugfix) and (optional = feature = enhancement).
- Add missing includes for GCC 11 compatibility.
- Fix %posttrans script execution (fixes #265)
The scripts are execuable. No need to call them through 'sh -c'.
- Commit: Fix rpmdb compat symlink in case rpm got removed.
- Repo: Allow multiple baseurls specified on one line (fixes #285)
- Regex: Fix memory leak and undefined behavior.
- Add rpm buildrequires for test suite (fixes #279)
- Use rpmdb2solv new -D switch to tell the location ob the
rpmdatabase to use.
- CVE-2017-9271: Fixed information leak in the log file (bsc#1050625 bsc#1177583)
- RepoManager: Force refresh if repo url has changed (bsc#1174016)
- RepoManager: Carefully tidy up the caches. Remove non-directory entries. (bsc#1178966)
- RepoInfo: ignore legacy type= in a .repo file and let RepoManager probe (bsc#1177427).
- RpmDb: If no database exists use the _dbpath configured in rpm. Still makes sure a compat
symlink at /var/lib/rpm exists in case the configures _dbpath is elsewhere. (bsc#1178910)
- Fixed update of gpg keys with elongated expire date (bsc#1179222)
- needreboot: remove udev from the list (bsc#1179083)
- Fix lsof monitoring (bsc#1179909)
- Rephrase solver problem descriptions (jsc#SLE-8482)
- Adapt to changed gpg2/libgpgme behavior (bsc#1180721)
- Multicurl backend breaks with with unknown filesize (fixes #277)
| Advisory ID | SUSE-RU-2021:1004-1
|
| Released | Thu Apr 1 15:07:09 2021 |
| Summary | Recommended update for libcap |
| Type | recommended |
| Severity | moderate |
| References | 1180073 |
Description:
This update for libcap fixes the following issues:
- Added support for the ambient capabilities (jsc#SLE-17092, jsc#ECO-3460)
- Changed the license tag from 'BSD-3-Clause and GPL-2.0' to 'BSD-3-Clause OR GPL-2.0-only' (bsc#1180073)
| Advisory ID | SUSE-RU-2021:1141-1
|
| Released | Mon Apr 12 13:13:36 2021 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | low |
| References | 1182791 |
Description:
This update for openldap2 fixes the following issues:
- Improved the proxy connection timeout options to prune connections properly (bsc#1182791)
| Advisory ID | SUSE-RU-2021:1169-1
|
| Released | Tue Apr 13 15:01:42 2021 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 1181976 |
Description:
This update for procps fixes the following issues:
- Corrected a statement in the man page about processor pinning via taskset (bsc#1181976)
| Advisory ID | SUSE-OU-2021:1296-1
|
| Released | Wed Apr 21 14:09:28 2021 |
| Summary | Optional update for e2fsprogs |
| Type | optional |
| Severity | low |
| References | 1183791 |
Description:
This update for e2fsprogs fixes the following issues:
- Fixed an issue when building e2fsprogs (bsc#1183791)
This patch does not fix any user visible issues and is therefore optional to install.
| Advisory ID | SUSE-RU-2021:1297-1
|
| Released | Wed Apr 21 14:10:10 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1178219 |
Description:
This update for systemd fixes the following issues:
- Improved the logs emitted by systemd-shutdown during the shutdown process, when applications cannot
be stopped properly and would leave mount points mounted.
| Advisory ID | SUSE-RU-2021:1407-1
|
| Released | Wed Apr 28 15:49:02 2021 |
| Summary | Recommended update for libcap |
| Type | recommended |
| Severity | important |
| References | 1184690 |
Description:
This update for libcap fixes the following issues:
- Add explicit dependency on 'libcap2' with version to 'libcap-progs' and 'pam_cap'. (bsc#1184690)
| Advisory ID | SUSE-SU-2021:1412-1
|
| Released | Wed Apr 28 17:09:28 2021 |
| Summary | Security update for libnettle |
| Type | security |
| Severity | important |
| References | 1184401,CVE-2021-20305 |
Description:
This update for libnettle fixes the following issues:
- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401).
| Advisory ID | SUSE-SU-2021:1523-1
|
| Released | Wed May 5 18:24:20 2021 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1185408,1185409,1185410,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
| Advisory ID | SUSE-RU-2021:1527-1
|
| Released | Thu May 6 08:58:53 2021 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | important |
| References | 1183064 |
Description:
This update for bash fixes the following issues:
- Fixed a segmentation fault that used to occur when bash read a history file
that was malformed in a very specific way. (bsc#1183064)
| Advisory ID | SUSE-RU-2021:1543-1
|
| Released | Fri May 7 15:16:33 2021 |
| Summary | Recommended update for patterns-microos |
| Type | recommended |
| Severity | moderate |
| References | 1184435 |
Description:
This update for patterns-microos provides the following fix:
- Require the libvirt-daemon-qemu package and include the needed dependencies in the
product. (bsc#1184435)
| Advisory ID | SUSE-RU-2021:1549-1
|
| Released | Mon May 10 13:48:00 2021 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | moderate |
| References | 1185417 |
Description:
This update for procps fixes the following issues:
- Support up to 2048 CPU as well. (bsc#1185417)
| Advisory ID | SUSE-RU-2021:1565-1
|
| Released | Tue May 11 14:20:04 2021 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1185163 |
Description:
This update for krb5 fixes the following issues:
- Use '/run' instead of '/var/run' for daemon PID files. (bsc#1185163);
| Advisory ID | SUSE-OU-2021:1592-1
|
| Released | Wed May 12 13:47:41 2021 |
| Summary | Optional update for sed |
| Type | optional |
| Severity | low |
| References | 1183797 |
Description:
This update for sed fixes the following issues:
- Fixed a building issue with glibc-2.31 (bsc#1183797).
This patch is optional to install.
| Advisory ID | SUSE-RU-2021:1602-1
|
| Released | Thu May 13 16:35:19 2021 |
| Summary | Recommended update for libsolv, libzypp |
| Type | recommended |
| Severity | moderate |
| References | 1180851,1181874,1182936,1183628,1184997,1185239 |
Description:
This update for libsolv and libzypp fixes the following issues:
libsolv:
Upgrade from version 0.7.17 to version 0.7.19
- Fix rare segfault in `resolve_jobrules()` that could happen if new rules are learned.
- Fix memory leaks in error cases
- Fix error handling in `solv_xfopen_fd()`
- Fix regex code on win32
- fixed memory leak in choice rule generation
- `repo_add_conda`: add a flag to skip version 2 packages.
libzypp:
Upgrade from version 17.25.8 to version 17.25.10
- Properly handle permission denied when providing optional files. (bsc#1185239)
- Fix service detection with `cgroupv2`. (bsc#1184997)
- Add missing includes for GCC 11. (bsc#1181874)
- Fix unsafe usage of static in media verifier.
- `Solver`: Avoid segfault if no system is loaded. (bsc#1183628)
- `MediaVerifier`: Relax media set verification in case of a single not-volatile medium. (bsc#1180851)
- Do no cleanup in custom cache dirs. (bsc#1182936)
- `ZConfig`: let `pubkeyCachePath` follow `repoCachePath`.
| Advisory ID | SUSE-RU-2021:1612-1
|
| Released | Fri May 14 17:09:39 2021 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1184614 |
Description:
This update for openldap2 fixes the following issue:
- Provide `openldap2-contrib` to the modules SUSE Linux Enterprise Legacy 15-SP2 and 15-SP3. (bsc#1184614)
| Advisory ID | SUSE-RU-2021:1643-1
|
| Released | Wed May 19 13:51:48 2021 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | important |
| References | 1181443,1184358,1185562 |
Description:
This update for pam fixes the following issues:
- Fixed a bug, where the 'unlimited'/'-1' value was not interpreted correctly (bsc#1181443)
- Fixed a bug, where pam_access interpreted the keyword 'LOCAL' incorrectly, leading to
an attempt to resolve it as a hostname (bsc#1184358)
- In the 32-bit compatibility package for 64-bit architectures, require 'systemd-32bit' to be also installed as it contains pam_systemd.so for 32 bit applications. (bsc#1185562)
| Advisory ID | SUSE-SU-2021:1647-1
|
| Released | Wed May 19 13:59:12 2021 |
| Summary | Security update for lz4 |
| Type | security |
| Severity | important |
| References | 1185438,CVE-2021-3520 |
Description:
This update for lz4 fixes the following issues:
- CVE-2021-3520: Fixed memory corruption due to an integer overflow bug caused by memmove argument (bsc#1185438).
| Advisory ID | SUSE-SU-2021:1654-1
|
| Released | Wed May 19 16:43:36 2021 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | important |
| References | 1185408,1185409,1185410,1185698,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518,CVE-2021-3537 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
| Advisory ID | SUSE-SU-2021:1809-1
|
| Released | Mon May 31 16:24:59 2021 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1177976,1183933,1186114,CVE-2021-22876,CVE-2021-22898 |
Description:
This update for curl fixes the following issues:
- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
- Fix for SFTP uploads when it results in empty uploaded files (bsc#1177976).
- Allow partial chain verification (jsc#SLE-17956).
| Advisory ID | SUSE-RU-2021:1861-1
|
| Released | Fri Jun 4 09:59:40 2021 |
| Summary | Recommended update for gcc10 |
| Type | recommended |
| Severity | moderate |
| References | 1029961,1106014,1178577,1178624,1178675,1182016 |
Description:
This update for gcc10 fixes the following issues:
- Disable nvptx offloading for aarch64 again since it doesn't work
- Fixed a build failure issue. (bsc#1182016)
- Fix for memory miscompilation on 'aarch64'. (bsc#1178624, bsc#1178577)
- Fix 32bit 'libgnat.so' link. (bsc#1178675)
- prepare usrmerge: Install libgcc_s into %_libdir. ABI wise it stays /%lib. (bsc#1029961)
- Build complete set of multilibs for arm-none target. (bsc#1106014)
| Advisory ID | SUSE-SU-2021:1917-1
|
| Released | Wed Jun 9 14:48:05 2021 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1186015,CVE-2021-3541 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)
| Advisory ID | SUSE-RU-2021:1953-1
|
| Released | Thu Jun 10 16:18:50 2021 |
| Summary | Recommended update for gpg2 |
| Type | recommended |
| Severity | moderate |
| References | 1161268,1172308 |
Description:
This update for gpg2 fixes the following issues:
- Fixed an issue where the gpg-agent's ssh-agent does not handle flags
in signing requests properly (bsc#1161268 and bsc#1172308).
| Advisory ID | SUSE-SU-2021:2143-1
|
| Released | Wed Jun 23 16:27:04 2021 |
| Summary | Security update for libnettle |
| Type | security |
| Severity | important |
| References | 1187060,CVE-2021-3580 |
Description:
This update for libnettle fixes the following issues:
- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
| Advisory ID | SUSE-SU-2021:2157-1
|
| Released | Thu Jun 24 15:40:14 2021 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | important |
| References | 1187212,CVE-2021-33560 |
Description:
This update for libgcrypt fixes the following issues:
- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
| Advisory ID | SUSE-RU-2021:2173-1
|
| Released | Mon Jun 28 14:59:45 2021 |
| Summary | Recommended update for automake |
| Type | recommended |
| Severity | moderate |
| References | 1040589,1047218,1182604,1185540,1186049 |
Description:
This update for automake fixes the following issues:
- Implement generated autoconf makefiles reproducible (bsc#1182604)
- Add fix to avoid date variations in docs. (bsc#1047218, jsc#SLE-17848)
- Avoid bashisms in test-driver script. (bsc#1185540)
This update for pcre fixes the following issues:
- Do not run profiling 'check' in parallel to make package build reproducible. (bsc#1040589)
This update for brp-check-suse fixes the following issues:
- Add fixes to support reproducible builds. (bsc#1186049)
| Advisory ID | SUSE-SU-2021:2196-1
|
| Released | Tue Jun 29 09:41:39 2021 |
| Summary | Security update for lua53 |
| Type | security |
| Severity | moderate |
| References | 1175448,1175449,CVE-2020-24370,CVE-2020-24371 |
Description:
This update for lua53 fixes the following issues:
Update to version 5.3.6:
- CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
- CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
- Long brackets with a huge number of '=' overflow some internal buffer arithmetic.
| Advisory ID | SUSE-RU-2021:2205-1
|
| Released | Wed Jun 30 09:17:41 2021 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | important |
| References | 1187210 |
Description:
This update for openldap2 fixes the following issues:
- Resolve issues in the idle / connection 'TTL' timeout implementation in OpenLDAP. (bsc#1187210)
| Advisory ID | SUSE-RU-2021:2246-1
|
| Released | Mon Jul 5 15:17:49 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1154935,1167471,1178561,1184761,1184967,1185046,1185331,1185807,1185958,1187292,1187400 |
Description:
This update for systemd fixes the following issues:
cgroup: Parse infinity properly for memory protections. (bsc#1167471)
cgroup: Make empty assignments reset to default. (bsc#1167471)
cgroup: Support 0-value for memory protection directives. (bsc#1167471)
core/cgroup: Fixed an issue with ignored parameter of 'MemorySwapMax=0'. (bsc#1154935)
bus-unit-util: Add proper 'MemorySwapMax' serialization.
core: Accept MemorySwapMax= properties that are scaled.
execute: Make sure to call into PAM after initializing resource limits. (bsc#1184967)
core: Rename 'ShutdownWatchdogSec' to 'RebootWatchdogSec'. (bsc#1185331)
Return -EAGAIN instead of -EALREADY from unit_reload. (bsc#1185046)
rules: Don't ignore Xen virtual interfaces anymore. (bsc#1178561)
write_net_rules: Set execute bits. (bsc#1178561)
udev: Rework network device renaming.
Revert 'Revert 'udev: Network device renaming - immediately give up if the target name isn't available''
mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
core: fix output (logging) for mount units (#7603) (bsc#1187400)
udev requires systemd in its %post (bsc#1185958)
cgroup: Parse infinity properly for memory protections (bsc#1167471)
cgroup: Make empty assignments reset to default (bsc#1167471)
cgroup: Support 0-value for memory protection directives (bsc#1167471)
Create /run/lock/subsys again (bsc#1187292)
The creation of this directory was mistakenly dropped when
'filesystem' package took the initialization of the generic paths
over.
Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
| Advisory ID | SUSE-SU-2021:2320-1
|
| Released | Wed Jul 14 17:01:06 2021 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | important |
| References | 1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701,CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327 |
Description:
This update for sqlite3 fixes the following issues:
- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
(bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
| Advisory ID | SUSE-SU-2021:2404-1
|
| Released | Tue Jul 20 14:21:30 2021 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1184994,1188063,CVE-2021-33910 |
Description:
This update for systemd fixes the following issues:
- CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape() (bsc#1188063)
- Skip udev rules if 'elevator=' is used (bsc#1184994)
| Advisory ID | SUSE-SU-2021:2440-1
|
| Released | Wed Jul 21 13:48:24 2021 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1188217,1188218,1188219,1188220,CVE-2021-22922,CVE-2021-22923,CVE-2021-22924,CVE-2021-22925 |
Description:
This update for curl fixes the following issues:
- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
| Advisory ID | SUSE-SU-2021:2689-1
|
| Released | Mon Aug 16 10:54:52 2021 |
| Summary | Security update for cpio |
| Type | security |
| Severity | important |
| References | 1189206,CVE-2021-38185 |
Description:
This update for cpio fixes the following issues:
It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)
| Advisory ID | SUSE-RU-2021:2763-1
|
| Released | Tue Aug 17 17:16:22 2021 |
| Summary | Recommended update for cpio |
| Type | recommended |
| Severity | critical |
| References | 1189465 |
Description:
This update for cpio fixes the following issues:
- A regression in last update would cause builds to hang on various architectures(bsc#1189465)
| Advisory ID | SUSE-RU-2021:2780-1
|
| Released | Thu Aug 19 16:09:15 2021 |
| Summary | Recommended update for cpio |
| Type | recommended |
| Severity | critical |
| References | 1189465,CVE-2021-38185 |
Description:
This update for cpio fixes the following issues:
- A regression in the previous update could lead to crashes (bsc#1189465)
| Advisory ID | SUSE-SU-2021:2800-1
|
| Released | Fri Aug 20 10:43:04 2021 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | important |
| References | 1188571,CVE-2021-36222 |
Description:
This update for krb5 fixes the following issues:
- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)
| Advisory ID | SUSE-SU-2021:2831-1
|
| Released | Tue Aug 24 16:20:45 2021 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1189521,CVE-2021-3712 |
Description:
This update for openssl-1_1 fixes the following security issue:
- CVE-2021-3712: a bug in the code for printing certificate details could
lead to a buffer overrun that a malicious actor could exploit to crash
the application, causing a denial-of-service attack. [bsc#1189521]
| Advisory ID | SUSE-RU-2021:2938-1
|
| Released | Fri Sep 3 09:19:36 2021 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1184614 |
Description:
This update for openldap2 fixes the following issue:
- openldap2-contrib is shipped to the Legacy Module. (bsc#1184614)
| Advisory ID | SUSE-SU-2021:2968-1
|
| Released | Tue Sep 7 09:53:00 2021 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | low |
| References | 1189521,CVE-2021-3712 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.
Read buffer overruns processing ASN.1 strings (bsc#1189521).
| Advisory ID | SUSE-RU-2021:3001-1
|
| Released | Thu Sep 9 15:08:13 2021 |
| Summary | Recommended update for netcfg |
| Type | recommended |
| Severity | moderate |
| References | 1189683 |
Description:
This update for netcfg fixes the following issues:
- add submissions port/protocol to services file for message submission over TLS protocol [bsc#1189683]
| Advisory ID | SUSE-RU-2021:3182-1
|
| Released | Tue Sep 21 17:04:26 2021 |
| Summary | Recommended update for file |
| Type | recommended |
| Severity | moderate |
| References | 1189996 |
Description:
This update for file fixes the following issues:
- Fixes exception thrown by memory allocation problem (bsc#1189996)
| Advisory ID | SUSE-SU-2021:3297-1
|
| Released | Wed Oct 6 16:53:29 2021 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1190373,1190374,CVE-2021-22946,CVE-2021-22947 |
Description:
This update for curl fixes the following issues:
- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
| Advisory ID | SUSE-SU-2021:3348-1
|
| Released | Tue Oct 12 13:08:06 2021 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1134353,1171962,1184994,1188018,1188063,1188291,1188713,1189480,1190234,CVE-2021-33910 |
Description:
This update for systemd fixes the following issues:
- CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).
- logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).
- Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).
- Rules weren't applied to dm devices (multipath) (bsc#1188713).
- Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).
- Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).
- Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).
- Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).
| Advisory ID | SUSE-SU-2021:3385-1
|
| Released | Tue Oct 12 15:54:31 2021 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1186489,1187911,CVE-2021-33574,CVE-2021-35942 |
Description:
This update for glibc fixes the following issues:
- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
| Advisory ID | SUSE-SU-2021:3454-1
|
| Released | Mon Oct 18 09:29:26 2021 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | moderate |
| References | 1189929,CVE-2021-37750 |
Description:
This update for krb5 fixes the following issues:
- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).
| Advisory ID | SUSE-RU-2021:3480-1
|
| Released | Wed Oct 20 11:24:10 2021 |
| Summary | Recommended update for yast2-network |
| Type | recommended |
| Severity | moderate |
| References | 1185016,1185524,1186910,1187270,1187512,1188344,1190645,1190739,1190915,1190933 |
Description:
This update for yast2-network fixes the following issues:
- Don't crash when the interfaces table contains a not configured one (bnc#1190645, bsc#1190915).
- Fix the shown description using the interface friendly name when it is empty (bsc#1190933).
- Consider aliases sections as case insensitive (bsc#1190739).
- Display user defined device name in the devices overview (bnc#1190645).
- Don't crash when defined aliases in AutoYaST profile are not defined as a map (bsc#1188344).
- Support 'boot' and 'on' as aliases for the 'auto' startmode (bsc#1186910).
- Fix desktop file so the control center tooltip is translated (bsc#1187270).
- Use the linuxrc proxy settings for the HTTPS and FTP proxies (bsc#1185016).
- Don't crash at the end of installation when storing wifi configuration for NetworkManager (bsc#1185524, bsc#1187512).
| Advisory ID | SUSE-SU-2021:3490-1
|
| Released | Wed Oct 20 16:31:55 2021 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1190793,CVE-2021-39537 |
Description:
This update for ncurses fixes the following issues:
- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
| Advisory ID | SUSE-RU-2021:3494-1
|
| Released | Wed Oct 20 16:48:46 2021 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1190052 |
Description:
This update for pam fixes the following issues:
- Added pam_faillock to the set of available PAM modules. (jsc#SLE-20638)
- Added new file macros.pam on request of systemd. (bsc#1190052)
| Advisory ID | SUSE-RU-2021:3510-1
|
| Released | Tue Oct 26 11:22:15 2021 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | important |
| References | 1191987 |
Description:
This update for pam fixes the following issues:
- Fixed a bad directive file which resulted in
the 'securetty' file to be installed as 'macros.pam'.
(bsc#1191987)
| Advisory ID | SUSE-SU-2021:3523-1
|
| Released | Tue Oct 26 15:40:13 2021 |
| Summary | Security update for util-linux |
| Type | security |
| Severity | moderate |
| References | 1122417,1125886,1178236,1188921,CVE-2021-37600 |
Description:
This update for util-linux fixes the following issues:
Update to version 2.33.2 to provide seamless update from SLE12 SP5 to SLE15 SP2:
- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c (bsc#1188921).
- agetty: Fix 8-bit processing in get_logname() (bsc#1125886).
- mount: Fix 'mount' output for net file systems (bsc#1122417).
- ipcs: Avoid overflows (bsc#1178236)
| Advisory ID | SUSE-SU-2021:3529-1
|
| Released | Wed Oct 27 09:23:32 2021 |
| Summary | Security update for pcre |
| Type | security |
| Severity | moderate |
| References | 1172973,1172974,CVE-2019-20838,CVE-2020-14155 |
Description:
This update for pcre fixes the following issues:
Update pcre to version 8.45:
- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)
| Advisory ID | SUSE-RU-2021:3781-1
|
| Released | Tue Nov 23 23:48:43 2021 |
| Summary | This update for libzypp, zypper and libsolv fixes the following issues: |
| Type | recommended |
| Severity | moderate |
| References | 1153687,1182372,1183268,1183589,1184326,1184399,1184997,1185325,1186447,1186503,1186602,1187224,1187425,1187466,1187738,1187760,1188156,1188435,1189031,1190059,1190199,1190356,1190465,1190712,1190815,1191286,1191324,1191370,1191609,1192337,1192436 |
Description:
This update for zypper fixes the following issues:
- Manpage: Recommend the needs-rebooting command to test whether a system reboot is suggested.
- Let a patch's reboot-needed flag overrule included packages. (bsc#1183268)
- Quickfix setting 'openSUSE_Tumbleweed' as default platform for 'MicroOS'. (bsc#1153687)
- Protect against strict/relaxed user umask via sudo. (bsc#1183589)
- xml summary: Add solvables repository alias. (bsc#1182372)
- Allow trusted repos to add additional signing keys. (bsc#1184326)
- MediaCurl: Fix logging of redirects.
- Let negative values wait forever for the zypp lock. (bsc#1184399)
- Fix 'purge-kernels' is broken in Leap 15.3. (bsc#1185325)
- Fix service detection with cgroupv2. (bsc#1184997)
- Add hints to 'trust GPG key' prompt.
- Enhance XML output of repo GPG options
- Add optional attributes showing the raw values actually present in the '.repo' file.
- Link all executables with -pie (bsc#1186447)
- Ship an empty '/etc/zypp/needreboot' per default. (jsc#PM-2645)
- Fix solver jobs for PTFs. (bsc#1186503)
- choice rules: treat orphaned packages as newest. (bc#1190465)
- Add need reboot/restart hint to XML install summary. (bsc#1188435)
- Fix kernel-*-livepatch removal in purge-kernels. (bsc#1190815)
- Fix obs:// platform guessing for Leap. (bsc#1187425)
- Fix purge-kernels fails. (bsc#1187738)
- Do not download full files even if the checkExistsOnly flag is set. (bsc#1190712)
- Prompt: choose exact match if prompt options are not prefix free. (bsc#1188156)
- Do not check of signatures and keys two times(redundant). (bsc#1190059)
- Rephrase vendor conflict message in case 2 packages are involved. (bsc#1187760)
- Show key fpr from signature when signature check fails. (bsc#1187224)
- Make sure to keep states alives while transitioning. (bsc#1190199)
- Fix crashes in logging code when shutting down. (bsc#1189031)
- Manpage: Improve description about patch updates. (bsc#1187466)
- Avoid calling 'su' to detect a too restrictive sudo user umask. (bsc#1186602)
- Consolidate reboot-recommendations across tools and stop using /etc/zypp/needreboot (jsc#-SLE-18858)
- Disable logger in the child after fork (bsc#1192436)
- Check log writer before accessing it (bsc#1192337)
- Allow uname-r format in purge kernels keepspec
- zypper should keep cached files if transaction is aborted (bsc#1190356)
- Require a minimum number of mirrors for multicurl (bsc#1191609)
- Use procfs to detect nr of open fd's if rlimit is too high (bsc#1191324)
- Fix translations (bsc#1191370)
- RepoManager: Don't probe for plaindir repo if URL schema is plugin (bsc#1191286)
| Advisory ID | SUSE-RU-2021:3799-1
|
| Released | Wed Nov 24 18:07:54 2021 |
| Summary | Recommended update for gcc11 |
| Type | recommended |
| Severity | moderate |
| References | 1187153,1187273,1188623 |
Description:
This update for gcc11 fixes the following issues:
The additional GNU compiler collection GCC 11 is provided:
To select these compilers install the packages:
- gcc11
- gcc-c++11
- and others with 11 prefix.
to select them for building:
The compiler baselibraries (libgcc_s1, libstdc++6 and others) are being replaced by the GCC 11 variants.
| Advisory ID | SUSE-RU-2021:3809-1
|
| Released | Fri Nov 26 00:31:59 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1189803,1190325,1190440,1190984,1191252,1192161 |
Description:
This update for systemd fixes the following issues:
- Add timestamp to D-Bus events to improve traceability (jsc#SLE-21862, jsc#SLE-18102, jsc#SLE-18103)
- Fix IO scheduler udev rules to address performance issues (jsc#SLE-21032, bsc#1192161)
- shutdown: Reduce log level of unmounts (bsc#1191252)
- pid1: make use of new 'prohibit_ipc' logging flag in PID 1 (bsc#1189803)
- core: rework how we connect to the bus (bsc#1190325)
- mount-util: fix fd_is_mount_point() when both the parent and directory are network fs (bsc#1190984)
- virt: detect Amazon EC2 Nitro instance (bsc#1190440)
- Several fixes for umount
- busctl: use usec granularity for the timestamp printed by the busctl monitor command
- fix unitialized fields in MountPoint in dm_list_get()
- shutdown: explicitly set a log target
- mount-util: add mount_option_mangle()
- dissect: automatically mark partitions read-only that have a read-only file system
- build-sys: require proper libmount version
- systemd-shutdown: use log_set_prohibit_ipc(true)
- rationalize interface for opening/closing logging
- pid1: when we can't log to journal, remember our fallback log target
- log: remove LOG_TARGET_SAFE pseudo log target
- log: add brief comment for log_set_open_when_needed() and log_set_always_reopen_console()
- log: add new 'prohibit_ipc' flag to logging system
- log: make log_set_upgrade_syslog_to_journal() take effect immediately
- dbus: split up bus_done() into seperate functions
- machine-id-setup: generate machine-id from DMI product ID on Amazon EC2
- virt: if we detect Xen by DMI, trust that over CPUID
| Advisory ID | SUSE-SU-2021:3830-1
|
| Released | Wed Dec 1 13:45:46 2021 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1027496,1183085,CVE-2016-10228 |
Description:
This update for glibc fixes the following issues:
- libio: do not attempt to free wide buffers of legacy streams (bsc#1183085)
- CVE-2016-10228: Rewrite iconv option parsing to fix security issue (bsc#1027496)
| Advisory ID | SUSE-RU-2021:3891-1
|
| Released | Fri Dec 3 10:21:49 2021 |
| Summary | Recommended update for keyutils |
| Type | recommended |
| Severity | moderate |
| References | 1029961,1113013,1187654 |
Description:
This update for keyutils fixes the following issues:
- Add /etc/keys/ and /usr/etc/keys/ directory (bsc#1187654)
keyutils was updated to 1.6.3 (jsc#SLE-20016):
- Revert the change notifications that were using /dev/watch_queue.
- Apply the change notifications that use pipe2(O_NOTIFICATION_PIPE).
- Allow 'keyctl supports' to retrieve raw capability data.
- Allow 'keyctl id' to turn a symbolic key ID into a numeric ID.
- Allow 'keyctl new_session' to name the keyring.
- Allow 'keyctl add/padd/etc.' to take hex-encoded data.
- Add 'keyctl watch*' to expose kernel change notifications on keys.
- Add caps for namespacing and notifications.
- Set a default TTL on keys that upcall for name resolution.
- Explicitly clear memory after it's held sensitive information.
- Various manual page fixes.
- Fix C++-related errors.
- Add support for keyctl_move().
- Add support for keyctl_capabilities().
- Make key=val list optional for various public-key ops.
- Fix system call signature for KEYCTL_PKEY_QUERY.
- Fix 'keyctl pkey_query' argument passing.
- Use keyctl_read_alloc() in dump_key_tree_aux().
- Various manual page fixes.
Updated to 1.6:
- Apply various specfile cleanups from Fedora.
- request-key: Provide a command line option to suppress helper execution.
- request-key: Find least-wildcard match rather than first match.
- Remove the dependency on MIT Kerberos.
- Fix some error messages
- keyctl_dh_compute.3: Suggest /proc/crypto for list of available hashes.
- Fix doc and comment typos.
- Add public key ops for encrypt, decrypt, sign and verify (needs linux-4.20).
- Add pkg-config support for finding libkeyutils.
- upstream isn't offering PGP signatures for the source tarballs anymore
Updated to 1.5.11 (bsc#1113013)
- Add keyring restriction support.
- Add KDF support to the Diffie-Helman function.
- DNS: Add support for AFS config files and SRV records
| Advisory ID | SUSE-SU-2021:3899-1
|
| Released | Fri Dec 3 11:27:41 2021 |
| Summary | Security update for aaa_base |
| Type | security |
| Severity | moderate |
| References | 1162581,1174504,1191563,1192248 |
Description:
This update for aaa_base fixes the following issues:
- Allowed ping and ICMP commands without CAP_NET_RAW (bsc#1174504).
- Add $HOME/.local/bin to PATH, if it exists (bsc#1192248).
- Fixed get_kernel_version.c to work also for recent kernels on the s390/X platform (bsc#1191563).
- Support xz compressed kernel (bsc#1162581)
| Advisory ID | SUSE-RU-2021:3930-1
|
| Released | Mon Dec 6 11:16:10 2021 |
| Summary | Recommended update for curl |
| Type | recommended |
| Severity | moderate |
| References | 1192790 |
Description:
This update for curl fixes the following issues:
- Fix sftp via proxy failure in curl, by preventing libssh from creating socket (bsc#1192790)
| Advisory ID | SUSE-SU-2021:3946-1
|
| Released | Mon Dec 6 14:57:42 2021 |
| Summary | Security update for gmp |
| Type | security |
| Severity | moderate |
| References | 1192717,CVE-2021-43618 |
Description:
This update for gmp fixes the following issues:
- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
| Advisory ID | SUSE-RU-2021:4017-1
|
| Released | Tue Dec 14 07:26:55 2021 |
| Summary | Recommended update for openssl-1_1 |
| Type | recommended |
| Severity | moderate |
| References | 1180995 |
Description:
This update for openssl-1_1 fixes the following issues:
- Add RFC3526 and RFC7919 groups to 'openssl genpkey' so that it can output FIPS-appropriate parameters
consistently with our other codestreams (bsc#1180995)
| Advisory ID | SUSE-RU-2021:4139-1
|
| Released | Tue Dec 21 17:02:44 2021 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | critical |
| References | 1193481,1193521 |
Description:
This update for systemd fixes the following issues:
- Revert 'core: rework how we connect to the bus' (bsc#1193521 bsc#1193481)
sleep-config: partitions can't be deleted, only files can
shared/sleep-config: exclude zram devices from hibernation candidates
| Advisory ID | SUSE-SU-2021:4154-1
|
| Released | Wed Dec 22 11:02:38 2021 |
| Summary | Security update for p11-kit |
| Type | security |
| Severity | important |
| References | 1180064,1187993,CVE-2020-29361 |
Description:
This update for p11-kit fixes the following issues:
- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
| Advisory ID | SUSE-RU-2021:4182-1
|
| Released | Thu Dec 23 11:51:51 2021 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1192688 |
Description:
This update for zlib fixes the following issues:
- Fix hardware compression incorrect result on z15 hardware (bsc#1192688)
| Advisory ID | SUSE-RU-2022:4-1
|
| Released | Mon Jan 3 08:28:54 2022 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1193480 |
Description:
This update for libgcrypt fixes the following issues:
- Fix function gcry_mpi_sub_ui subtracting from negative value (bsc#1193480)
| Advisory ID | SUSE-RU-2022:57-1
|
| Released | Wed Jan 12 07:10:42 2022 |
| Summary | Recommended update for libzypp |
| Type | recommended |
| Severity | moderate |
| References | 1193488,954813 |
Description:
This update for libzypp fixes the following issues:
- Use the default zypp.conf settings if no zypp.conf exists (bsc#1193488)
- Fix wrong encoding of URI compontents of ISO images (bsc#954813)
- When invoking 32bit mode in userland of an aarch64 kernel, handle armv8l as armv7hl compatible
- Introduce zypp-curl as a sublibrary for CURL related code
- zypp-rpm: Increase rpm loglevel if ZYPP_RPM_DEBUG is set
- Save all signatures associated with a public key in its PublicKeyData
SUSE-CU-2020:788-1
| Container Advisory ID | SUSE-CU-2020:788-1 |
| Container Tags | caasp/v4/helm-tiller:2.16.12 , caasp/v4/helm-tiller:2.16.12-rev3 , caasp/v4/helm-tiller:2.16.12-rev3-build3.11.1 |
| Container Release | 3.11.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-SU-2018:2780-1
|
| Released | Mon Nov 26 17:46:10 2018 |
| Summary | Security update for glib2 |
| Type | security |
| Severity | moderate |
| References | 1107116,1107121,1111499,CVE-2018-16428,CVE-2018-16429 |
Description:
This update for glib2 fixes the following issues:
Security issues fixed:
- CVE-2018-16428: Do not do a NULL pointer dereference (crash).
Avoid that, at the cost of introducing a new translatable error
message (bsc#1107121).
- CVE-2018-16429: Fixed out-of-bounds read vulnerability ing_markup_parse_context_parse() (bsc#1107116).
Non-security issue fixed:
- various GVariant parsing issues have been resolved (bsc#1111499)
| Advisory ID | SUSE-RU-2019:251-1
|
| Released | Wed Feb 6 11:22:43 2019 |
| Summary | Recommended update for glib2 |
| Type | recommended |
| Severity | moderate |
| References | 1090047 |
Description:
This update for glib2 provides the following fix:
- Enable systemtap. (fate#326393, bsc#1090047)
| Advisory ID | SUSE-SU-2019:1594-1
|
| Released | Fri Jun 21 10:17:15 2019 |
| Summary | Security update for glib2 |
| Type | security |
| Severity | important |
| References | 1103678,1137001,CVE-2019-12450 |
Description:
This update for glib2 fixes the following issues:
Security issue fixed:
- CVE-2019-12450: Fixed an improper file permission when copy operation
takes place (bsc#1137001).
Other issue addressed:
- glib2 was handling an UNKNOWN connectivity state from NetworkManager as if there
was a connection thus giving false positives to PackageKit (bsc#1103678)
| Advisory ID | SUSE-SU-2019:1833-1
|
| Released | Fri Jul 12 17:53:51 2019 |
| Summary | Security update for glib2 |
| Type | security |
| Severity | moderate |
| References | 1139959,CVE-2019-13012 |
Description:
This update for glib2 fixes the following issues:
Security issue fixed:
- CVE-2019-13012: Fixed improper restriction of file permissions when creating directories (bsc#1139959).
| Advisory ID | SUSE-SU-2020:129-1
|
| Released | Mon Jan 20 09:21:13 2020 |
| Summary | Security update for libssh |
| Type | security |
| Severity | important |
| References | 1158095,CVE-2019-14889 |
Description:
This update for libssh fixes the following issues:
- CVE-2019-14889: Fixed an unwanted command execution in scp caused by unsanitized location (bsc#1158095).
| Advisory ID | SUSE-RU-2020:225-1
|
| Released | Fri Jan 24 06:49:07 2020 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | moderate |
| References | 1158830 |
Description:
This update for procps fixes the following issues:
- Fix for 'ps -C' allowing to accept any arguments longer than 15 characters anymore. (bsc#1158830)
| Advisory ID | SUSE-RU-2020:256-1
|
| Released | Wed Jan 29 09:39:17 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1157794,1160970 |
Description:
This update for aaa_base fixes the following issues:
- Improves the way how the Java path is created to fix an issue with sapjvm. (bsc#1157794)
- Drop 'dev.cdrom.autoclose' = 0 from sysctl config. (bsc#1160970)
| Advisory ID | SUSE-SU-2020:262-1
|
| Released | Thu Jan 30 11:02:42 2020 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1149332,1151582,1157292,1157893,1158996,CVE-2019-19126 |
Description:
This update for glibc fixes the following issues:
Security issue fixed:
- CVE-2019-19126: Fixed to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition (bsc#1157292).
Bug fixes:
- Fixed z15 (s390x) strstr implementation that can return incorrect results if search string cross page boundary (bsc#1157893).
- Fixed Hardware support in toolchain (bsc#1151582).
- Fixed syscalls during early process initialization (SLE-8348).
- Fixed an array overflow in backtrace for PowerPC (bsc#1158996).
- Moved to posix_spawn on popen (bsc#1149332).
| Advisory ID | SUSE-SU-2020:265-1
|
| Released | Thu Jan 30 14:05:34 2020 |
| Summary | Security update for e2fsprogs |
| Type | security |
| Severity | moderate |
| References | 1160571,CVE-2019-5188 |
Description:
This update for e2fsprogs fixes the following issues:
- CVE-2019-5188: Fixed a code execution vulnerability in the directory rehashing functionality (bsc#1160571).
| Advisory ID | SUSE-RU-2020:279-1
|
| Released | Fri Jan 31 12:01:39 2020 |
| Summary | Recommended update for p11-kit |
| Type | recommended |
| Severity | moderate |
| References | 1013125 |
Description:
This update for p11-kit fixes the following issues:
- Also build documentation (bsc#1013125)
| Advisory ID | SUSE-SU-2020:335-1
|
| Released | Thu Feb 6 11:37:24 2020 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1084671,1092920,1106383,1133495,1151377,1154256,1155207,1155574,1156213,1156482,1158485,1159814,1161436,1162108,CVE-2019-20386,CVE-2020-1712 |
Description:
This update for systemd fixes the following issues:
- CVE-2020-1712 (bsc#bsc#1162108)
Fix a heap use-after-free vulnerability, when asynchronous
Polkit queries were performed while handling Dbus messages. A local
unprivileged attacker could have abused this flaw to crash systemd services or
potentially execute code and elevate their privileges, by sending specially
crafted Dbus messages.
- Use suse.pool.ntp.org server pool on SLE distros (jsc#SLE-7683)
- libblkid: open device in nonblock mode. (bsc#1084671)
- udev/cdrom_id: Do not open CD-rom in exclusive mode. (bsc#1154256)
- bus_open leak sd_event_source when udevadm trigger。 (bsc#1161436 CVE-2019-20386)
- fileio: introduce read_full_virtual_file() for reading virtual files in sysfs, procfs (bsc#1133495 bsc#1159814)
- fileio: initialize errno to zero before we do fread()
- fileio: try to read one byte too much in read_full_stream()
- logind: consider 'greeter' sessions suitable as 'display' sessions of a user (bsc#1158485)
- logind: never elect a session that is stopping as display
- journal: include kmsg lines from the systemd process which exec()d us (#8078)
- udevd: don't use monitor after manager_exit()
- udevd: capitalize log messages in on_sigchld()
- udevd: merge conditions to decrease indentation
- Revert 'udevd: fix crash when workers time out after exit is signal caught'
- core: fragments of masked units ought not be considered for NeedDaemonReload (#7060) (bsc#1156482)
- udevd: fix crash when workers time out after exit is signal caught
- udevd: wait for workers to finish when exiting (bsc#1106383)
- Improve bash completion support (bsc#1155207)
* shell-completion: systemctl: do not list template units in {re,}start
* shell-completion: systemctl: pass current word to all list_unit*
* bash-completion: systemctl: pass current partial unit to list-unit* (bsc#1155207)
* bash-completion: systemctl: use systemctl --no-pager
* bash-completion: also suggest template unit files
* bash-completion: systemctl: add missing options and verbs
* bash-completion: use the first argument instead of the global variable (#6457)
- networkd: VXLan Make group and remote variable separate (bsc#1156213)
- networkd: vxlan require Remote= to be a non multicast address (#8117) (bsc#1156213)
- fs-util: let's avoid unnecessary strerror()
- fs-util: introduce inotify_add_watch_and_warn() helper
- ask-password: improve log message when inotify limit is reached (bsc#1155574)
- shared/install: failing with -ELOOP can be due to the use of an alias in install_error() (bsc#1151377)
- man: alias names can't be used with enable command (bsc#1151377)
- Add boot option to not use swap at system start (jsc#SLE-7689)
- Allow YaST to select Iranian (Persian, Farsi) keyboard layout
(bsc#1092920)
| Advisory ID | SUSE-RU-2020:339-1
|
| Released | Thu Feb 6 13:03:22 2020 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | low |
| References | 1158921 |
Description:
This update for openldap2 provides the following fix:
- Add libldap-data to the product (as it contains ldap.conf). (bsc#1158921)
| Advisory ID | SUSE-SU-2020:432-1
|
| Released | Fri Feb 21 14:34:16 2020 |
| Summary | Security update for libsolv, libzypp, zypper |
| Type | security |
| Severity | moderate |
| References | 1135114,1154804,1154805,1155198,1155205,1155298,1155678,1155819,1156158,1157377,1158763,CVE-2019-18900 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
Security issue fixed:
- CVE-2019-18900: Fixed assert cookie file that was world readable (bsc#1158763).
Bug fixes
- Fixed removing orphaned packages dropped by to-be-installed products (bsc#1155819).
- Adds libzypp API to mark all obsolete kernels according to the existing purge-kernel script rules (bsc#1155198).
- Do not enforce 'en' being in RequestedLocales If the user decides to have a system without explicit language support he may do so (bsc#1155678).
- Load only target resolvables for zypper rm (bsc#1157377).
- Fix broken search by filelist (bsc#1135114).
- Replace python by a bash script in zypper-log (fixes#304, fixes#306, bsc#1156158).
- Do not sort out requested locales which are not available (bsc#1155678).
- Prevent listing duplicate matches in tables. XML result is provided within the new list-patches-byissue element (bsc#1154805).
- XML add patch issue-date and issue-list (bsc#1154805).
- Fix zypper lp --cve/bugzilla/issue options (bsc#1155298).
- Always execute commit when adding/removing locales (fixes bsc#1155205).
- Fix description of --table-style,-s in man page (bsc#1154804).
| Advisory ID | SUSE-RU-2020:451-1
|
| Released | Tue Feb 25 10:50:35 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1155337,1161215,1161216,1161218,1161219,1161220 |
Description:
This update for libgcrypt fixes the following issues:
- ECDSA: Check range of coordinates (bsc#1161216)
- FIPS: libgcrypt DSA PQG parameter generation: Missing value [bsc#1161219]
- FIPS: libgcrypt DSA PQG verification incorrect results [bsc#1161215]
- FIPS: libgcrypt RSA siggen/keygen: 4k not supported [bsc#1161220]
- FIPS: keywrap gives incorrect results [bsc#1161218]
- FIPS: RSA/DSA/ECDSA are missing hashing operation [bsc#1155337]
| Advisory ID | SUSE-RU-2020:476-1
|
| Released | Tue Feb 25 14:23:14 2020 |
| Summary | Recommended update for perl |
| Type | recommended |
| Severity | moderate |
| References | 1102840,1160039 |
Description:
This update for perl fixes the following issues:
- Some packages make assumptions about the date and time they are built.
This update will solve the issues caused by calling the perl function timelocal
expressing the year with two digit only instead of four digits. (bsc#1102840) (bsc#1160039)
| Advisory ID | SUSE-RU-2020:480-1
|
| Released | Tue Feb 25 17:38:22 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1160735 |
Description:
This update for aaa_base fixes the following issues:
- Change 'rp_filter' to increase the default priority to ethernet over the wifi. (bsc#1160735)
| Advisory ID | SUSE-RU-2020:525-1
|
| Released | Fri Feb 28 11:49:36 2020 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1164562 |
Description:
This update for pam fixes the following issues:
- Add libdb as build-time dependency to enable pam_userdb module.
Enable pam_userdb.so (jsc#sle-7258, bsc#1164562)
| Advisory ID | SUSE-SU-2020:547-1
|
| Released | Fri Feb 28 16:26:21 2020 |
| Summary | Security update for permissions |
| Type | security |
| Severity | moderate |
| References | 1148788,1160594,1160764,1161779,1163922,CVE-2019-3687,CVE-2020-8013 |
Description:
This update for permissions fixes the following issues:
Security issues fixed:
- CVE-2019-3687: Fixed a privilege escalation which could allow a local user to read network traffic if wireshark is installed (bsc#1148788)
- CVE-2020-8013: Fixed an issue where chkstat set unintended setuid/capabilities for mrsh and wodim (bsc#1163922).
Non-security issues fixed:
- Fixed a regression where chkstat breaks without /proc available (bsc#1160764, bsc#1160594).
- Fixed capability handling when doing multiple permission changes at once (bsc#1161779).
| Advisory ID | SUSE-RU-2020:572-1
|
| Released | Tue Mar 3 13:25:41 2020 |
| Summary | Recommended update for cyrus-sasl |
| Type | recommended |
| Severity | moderate |
| References | 1162518 |
Description:
This update for cyrus-sasl fixes the following issues:
- Added support for retrieving negotiated SSF in gssapi plugin (bsc#1162518)
- Fixed GSS-SPNEGO to use flags negotiated by GSSAPI for SSF (bsc#1162518)
| Advisory ID | SUSE-RU-2020:573-1
|
| Released | Tue Mar 3 13:37:28 2020 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1160160 |
Description:
This update for ca-certificates-mozilla to 2.40 fixes the following issues:
Updated to 2.40 state of the Mozilla NSS Certificate store (bsc#1160160):
Removed certificates:
- Certplus Class 2 Primary CA
- Deutsche Telekom Root CA 2
- CN=Swisscom Root CA 2
- UTN-USERFirst-Client Authentication and Email
added certificates:
- Entrust Root Certification Authority - G4
| Advisory ID | SUSE-RU-2020:597-1
|
| Released | Thu Mar 5 15:24:09 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1164950 |
Description:
This update for libgcrypt fixes the following issues:
- FIPS: Run the self-tests from the constructor [bsc#1164950]
| Advisory ID | SUSE-RU-2020:633-1
|
| Released | Tue Mar 10 16:23:08 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1139939,1151023 |
Description:
This update for aaa_base fixes the following issues:
- get_kernel_version: fix for current kernel on s390x (bsc#1151023, bsc#1139939)
- added '-h'/'--help' to the command old
- change feedback url from http://www.suse.de/feedback to https://github.com/openSUSE/aaa_base/issues
| Advisory ID | SUSE-SU-2020:668-1
|
| Released | Fri Mar 13 10:48:58 2020 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1163184,1164505,1165784,CVE-2020-10029 |
Description:
This update for glibc fixes the following issues:
- CVE-2020-10029: Fixed a potential overflow in on-stack buffer
during range reduction (bsc#1165784).
- Fixed an issue where pthread were not always locked correctly (bsc#1164505).
- Document mprotect and introduce section on memory protection (bsc#1163184).
| Advisory ID | SUSE-RU-2020:689-1
|
| Released | Fri Mar 13 17:09:01 2020 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1166510 |
Description:
This update for PAM fixes the following issue:
- The license of libdb linked against pam_userdb is not always wanted,
so we temporary disabled pam_userdb again. It will be published
in a different package at a later time. (bsc#1166510)
| Advisory ID | SUSE-RU-2020:475-1
|
| Released | Thu Mar 19 11:00:46 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1160595 |
Description:
This update for systemd fixes the following issues:
- Remove TasksMax limit for both user and system slices (jsc#SLE-10123)
- Backport IP filtering feature (jsc#SLE-7743 bsc#1160595)
| Advisory ID | SUSE-SU-2020:726-1
|
| Released | Thu Mar 19 13:23:03 2020 |
| Summary | Security update for nghttp2 |
| Type | security |
| Severity | moderate |
| References | 1125689,1146182,1146184,1159003,1166481,CVE-2019-18802,CVE-2019-9511,CVE-2019-9513 |
Description:
This update for nghttp2 fixes the following issues:
Security issues fixed:
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service (bsc#1146184).
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#11461).
- CVE-2019-18802: Fixed malformed request header may cause bypass of route matchers resulting in escalation of privileges or information disclosure (bsc#1159003)
Bug fixes and enhancements:
- Fixed mistake in spec file (bsc#1125689)
Update to version 1.40.0 to fix CVE-2019-18802 in envoy-proxy and
cilium-proxy (bsc#1166481)
* lib: Add nghttp2_check_authority as public API
* lib: Fix the bug that stream is closed with wrong error code
* lib: Faster huffman encoding and decoding
* build: Avoid filename collision of static and dynamic lib
* build: Add new flag ENABLE_STATIC_CRT for Windows
* build: cmake: Support building nghttpx with systemd
* third-party: Update neverbleed to fix memory leak
* nghttpx: Fix bug that mruby is incorrectly shared between
backends
* nghttpx: Reconnect h1 backend if it lost connection before
sending headers
* nghttpx: Returns 408 if backend timed out before sending
headers
* nghttpx: Fix request stal
- Conditionally remove dependecy on jemalloc for SLE-12
- Require correct library from devel package - boo#1125689
Update to version 1.39.2 (bsc#1146184, bsc#1146182):
- This release fixes CVE-2019-9511 “Data Dribble” and CVE-2019-9513
“Resource Loop” vulnerability in nghttpx and nghttpd. Specially crafted HTTP/2
frames cause Denial of Service by consuming CPU time. Check out
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
for details. For nghttpx, additionally limiting inbound traffic by
--read-rate and --read-burst options is quite effective against
this kind of attack.
- Add nghttp2_option_set_max_outbound_ack API function
- nghttpx: Fix request stall
Update to version 1.39.1:
- This release fixes the bug that log-level is not set with
cmd-line or configuration file. It also fixes FPE with default
backend.
Changes for version 1.39.0:
- libnghttp2 now ignores content-length in 200 response to
CONNECT request as per RFC 7230.
- mruby has been upgraded to 2.0.1.
- libnghttp2-asio now supports boost-1.70.
- http-parser has been replaced with llhttp.
- nghttpx now ignores Content-Length and Transfer-Encoding in 1xx
or 200 to CONNECT.
| Advisory ID | SUSE-RU-2020:729-1
|
| Released | Thu Mar 19 14:44:22 2020 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1166106 |
Description:
This update for glibc fixes the following issues:
- Allow dlopen of filter object to work (bsc#1166106, BZ #16272)
| Advisory ID | SUSE-RU-2020:793-1
|
| Released | Wed Mar 25 15:16:00 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1139459,1161262,1162108,1164717,1165579,CVE-2020-1712 |
Description:
This update for systemd fixes the following issues:
- manager: fix job mode when signalled to shutdown etc (bsc#1161262)
- remove fallback for user/exit.target
- dbus method Manager.Exit() does not start exit.target
- do not install rescue.target for alt-↑
- %j/%J unit specifiers
Added support for I/O scheduler selection with blk-mq (bsc#1165579, bsc#1164717).
Added the udev 60-ssd-scheduler.rules:
- This rules file which select the default IO scheduler for SSDs is
being moved out from the git repo since this is not related to
systemd or udev at all and is maintained by the kernel team.
- core: coldplug possible nop_job (bsc#1139459)
- Revert 'udev: use 'deadline' IO scheduler for SSD disks'
- Fix typo in function name
- polkit: when authorizing via PK let's re-resolve callback/userdata instead of caching it (bsc#1162108 CVE-2020-1712)
- sd-bus: introduce API for re-enqueuing incoming messages
- polkit: on async pk requests, re-validate action/details
| Advisory ID | SUSE-RU-2020:814-1
|
| Released | Mon Mar 30 16:23:40 2020 |
| Summary | Recommended update for QR-Code-generator, boost, libreoffice, myspell-dictionaries, xmlsec1 |
| Type | recommended |
| Severity | moderate |
| References | 1161816,1162152,1167223 |
Description:
This update for QR-Code-generator, boost, libreoffice, myspell-dictionaries, xmlsec1 fixes the following issues:
libreoffice was updated to 6.4.2.2 (jsc#SLE-11174 jsc#SLE-11175 jsc#SLE-11176 bsc#1167223):
Full Release Notes can be found on:
https://wiki.documentfoundation.org/ReleaseNotes/6.4
- Fixed broken handling of non-ASCII characters in the KDE filedialog
(bsc#1161816)
- Move the animation library to core package bsc#1162152
xmlsec1 was updated to 1.2.28:
- Added BoringSSL support (chenbd).
- Added gnutls-3.6.x support (alonbl).
- Added DSA and ECDSA key size getter for MSCNG (vmiklos).
- Added --enable-mans configuration option (alonbl).
- Added coninuous build integration for MacOSX (vmiklos).
- Several other small fixes (more details).
- Make sure to recommend at least one backend when you install
just xmlsec1
- Drop the gnutls backend as based on the tests it is quite borked:
* We still have nss and openssl backend for people to use
Version update to 1.2.27:
- Added AES-GCM support for OpenSSL and MSCNG (snargit).
- Added DSA-SHA256 and ECDSA-SHA384 support for NSS (vmiklos).
- Added RSA-OAEP support for MSCNG (vmiklos).
- Continuous build integration in Travis and Appveyor.
- Several other small fixes (more details).
myspell-dictionaries was updated to 20191219:
- Updated the English dictionaries: GB+US+CA+AU
- Bring shipped Spanish dictionary up to version 2.5
boost was updated to fix:
- add a backport of Boost.Optional::has_value() for LibreOffice
The QR-Code-generator is shipped:
- Initial commit, needed by libreoffice 6.4
| Advisory ID | SUSE-SU-2020:820-1
|
| Released | Tue Mar 31 13:02:22 2020 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1167631,CVE-2020-1752 |
Description:
This update for glibc fixes the following issues:
- CVE-2020-1752: Fixed a use after free in glob which could have allowed
a local attacker to create a specially crafted path that, when processed
by the glob function, could potentially have led to arbitrary code execution
(bsc#1167631).
| Advisory ID | SUSE-RU-2020:834-1
|
| Released | Tue Mar 31 17:21:34 2020 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1167163 |
Description:
This update for permissions fixes the following issue:
- whitelist s390-tools set group ID (setgid) bit on log directory. (bsc#1167163)
| Advisory ID | SUSE-RU-2020:846-1
|
| Released | Thu Apr 2 07:24:07 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1164950,1166748,1167674 |
Description:
This update for libgcrypt fixes the following issues:
- FIPS: Remove an unneeded check in _gcry_global_constructor (bsc#1164950)
- FIPS: Fix drbg to be threadsafe (bsc#1167674)
- FIPS: Run self-tests from constructor during power-on [bsc#1166748]
* Set up global_init as the constructor function:
* Relax the entropy requirements on selftest. This is especially
important for virtual machines to boot properly before the RNG
is available:
| Advisory ID | SUSE-RU-2020:917-1
|
| Released | Fri Apr 3 15:02:25 2020 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1166510 |
Description:
This update for pam fixes the following issues:
- Moved pam_userdb into a separate package pam-extra. (bsc#1166510)
| Advisory ID | SUSE-SU-2020:948-1
|
| Released | Wed Apr 8 07:44:21 2020 |
| Summary | Security update for gmp, gnutls, libnettle |
| Type | security |
| Severity | moderate |
| References | 1152692,1155327,1166881,1168345,CVE-2020-11501 |
Description:
This update for gmp, gnutls, libnettle fixes the following issues:
Security issue fixed:
- CVE-2020-11501: Fixed zero random value in DTLS client hello (bsc#1168345)
FIPS related bugfixes:
- FIPS: Install checksums for binary integrity verification which are
required when running in FIPS mode (bsc#1152692, jsc#SLE-9518)
- FIPS: Fixed a cfb8 decryption issue, no longer truncate output IV if
input is shorter than block size. (bsc#1166881)
- FIPS: Added Diffie Hellman public key verification test. (bsc#1155327)
| Advisory ID | SUSE-RU-2020:961-1
|
| Released | Wed Apr 8 13:34:06 2020 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 1160979 |
Description:
This update for e2fsprogs fixes the following issues:
- e2fsck: clarify overflow link count error message (bsc#1160979)
- ext2fs: update allocation info earlier in ext2fs_mkdir() (bsc#1160979)
- ext2fs: implement dir entry creation in htree directories (bsc#1160979)
- tests: add test to excercise indexed directories with metadata_csum (bsc#1160979)
- tune2fs: update dir checksums when clearing dir_index feature (bsc#1160979)
| Advisory ID | SUSE-SU-2020:967-1
|
| Released | Thu Apr 9 11:41:53 2020 |
| Summary | Security update for libssh |
| Type | security |
| Severity | moderate |
| References | 1168699,CVE-2020-1730 |
Description:
This update for libssh fixes the following issues:
- CVE-2020-1730: Fixed a possible denial of service when using AES-CTR (bsc#1168699).
| Advisory ID | SUSE-SU-2020:969-1
|
| Released | Thu Apr 9 11:43:17 2020 |
| Summary | Security update for permissions |
| Type | security |
| Severity | moderate |
| References | 1168364 |
Description:
This update for permissions fixes the following issues:
- Fixed spelling of icinga group (bsc#1168364)
| Advisory ID | SUSE-RU-2020:981-1
|
| Released | Mon Apr 13 15:43:44 2020 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | 1156300 |
Description:
This update for rpm fixes the following issues:
- Fix for language package macros to avoid wrong requirement on shared library. (bsc#1156300)
| Advisory ID | SUSE-RU-2020:1026-1
|
| Released | Fri Apr 17 16:14:43 2020 |
| Summary | Recommended update for libsolv |
| Type | recommended |
| Severity | moderate |
| References | 1159314 |
Description:
This update for libsolv fixes the following issues:
libsolv was updated to version 0.7.11:
- fix solv_zchunk decoding error if large chunks are used (bsc#1159314)
- treat retracted pathes as irrelevant
- made add_update_target work with multiversion installs
| Advisory ID | SUSE-RU-2020:1047-1
|
| Released | Tue Apr 21 10:33:06 2020 |
| Summary | Recommended update for gnutls |
| Type | recommended |
| Severity | moderate |
| References | 1168835 |
Description:
This update for gnutls fixes the following issues:
- Backport AES XTS support (bsc#1168835)
| Advisory ID | SUSE-RU-2020:1063-1
|
| Released | Wed Apr 22 10:46:50 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1165539,1169569 |
Description:
This update for libgcrypt fixes the following issues:
This update for libgcrypt fixes the following issues:
- FIPS: Switch the PCT to use the new signature operation (bsc#1165539)
- FIPS: Verify that the generated signature and the original input differ in test_keys function for RSA, DSA and ECC (bsc#1165539)
- Add zero-padding when qx and qy have different lengths when assembling the Q point from affine coordinates.
- Ship the FIPS checksum file in the shared library package and create a separate trigger file for the FIPS selftests (bsc#1169569)
| Advisory ID | SUSE-RU-2020:1108-1
|
| Released | Fri Apr 24 16:31:01 2020 |
| Summary | Recommended update for gnutls |
| Type | recommended |
| Severity | moderate |
| References | 1169992 |
Description:
This update for gnutls fixes the following issues:
- FIPS: Do not check for /etc/system-fips which we don't have (bsc#1169992)
| Advisory ID | SUSE-RU-2020:1175-1
|
| Released | Tue May 5 08:33:43 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1165011,1168076 |
Description:
This update for systemd fixes the following issues:
- Fix check for address to keep interface names stable. (bsc#1168076)
- Fix for checking non-normalized WHAT for network FS. (bsc#1165011)
- Allow to specify an arbitrary string for when vfs is used. (bsc#1165011)
| Advisory ID | SUSE-RU-2020:1214-1
|
| Released | Thu May 7 11:20:34 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1169944 |
Description:
This update for libgcrypt fixes the following issues:
- FIPS: libgcrypt: Fixed a double free in test_keys() on failed signature verification (bsc#1169944)
| Advisory ID | SUSE-SU-2020:1219-1
|
| Released | Thu May 7 17:10:42 2020 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | important |
| References | 1170771,CVE-2020-12243 |
Description:
This update for openldap2 fixes the following issues:
- CVE-2020-12243: Fixed a denial of service related to recursive filters (bsc#1170771).
| Advisory ID | SUSE-RU-2020:1226-1
|
| Released | Fri May 8 10:51:05 2020 |
| Summary | Recommended update for gcc9 |
| Type | recommended |
| Severity | moderate |
| References | 1149995,1152590,1167898 |
Description:
This update for gcc9 fixes the following issues:
This update ships the GCC 9.3 release.
- Includes a fix for Internal compiler error when building HepMC (bsc#1167898)
- Includes fix for binutils version parsing
- Add libstdc++6-pp provides and conflicts to avoid file conflicts
with same minor version of libstdc++6-pp from gcc10.
- Add gcc9 autodetect -g at lto link (bsc#1149995)
- Install go tool buildid for bootstrapping go
| Advisory ID | SUSE-RU-2020:1271-1
|
| Released | Wed May 13 13:17:59 2020 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | important |
| References | 1171173 |
Description:
This update for permissions fixes the following issues:
- Remove setuid bit for newgidmap and newuidmap in paranoid profile. (bsc#1171173)
| Advisory ID | SUSE-RU-2020:1290-1
|
| Released | Fri May 15 16:39:59 2020 |
| Summary | Recommended update for gnutls |
| Type | recommended |
| Severity | moderate |
| References | 1171422 |
Description:
This update for gnutls fixes the following issues:
- Add RSA 4096 key generation support in FIPS mode (bsc#1171422)
| Advisory ID | SUSE-SU-2020:1294-1
|
| Released | Mon May 18 07:38:36 2020 |
| Summary | Security update for file |
| Type | security |
| Severity | moderate |
| References | 1154661,1169512,CVE-2019-18218 |
Description:
This update for file fixes the following issues:
Security issues fixed:
- CVE-2019-18218: Fixed a heap-based buffer overflow in cdf_read_property_info() (bsc#1154661).
Non-security issue fixed:
- Fixed broken '--help' output (bsc#1169512).
| Advisory ID | SUSE-SU-2020:1299-1
|
| Released | Mon May 18 07:43:21 2020 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1159928,1161517,1161521,CVE-2019-19956,CVE-2019-20388,CVE-2020-7595 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2019-20388: Fixed a memory leak in xmlSchemaPreRun (bsc#1161521).
- CVE-2019-19956: Fixed a memory leak (bsc#1159928).
- CVE-2020-7595: Fixed an infinite loop in an EOF situation (bsc#1161517).
| Advisory ID | SUSE-RU-2020:1328-1
|
| Released | Mon May 18 17:16:04 2020 |
| Summary | Recommended update for grep |
| Type | recommended |
| Severity | moderate |
| References | 1155271 |
Description:
This update for grep fixes the following issues:
- Update testsuite expectations, no functional changes (bsc#1155271)
| Advisory ID | SUSE-RU-2020:1361-1
|
| Released | Thu May 21 09:31:18 2020 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1171872 |
Description:
This update for libgcrypt fixes the following issues:
- FIPS: RSA/DSA/ECC test_keys() print out debug messages only in debug mode (bsc#1171872)
| Advisory ID | SUSE-RU-2020:1400-1
|
| Released | Mon May 25 14:09:02 2020 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1162930 |
Description:
This update for glibc fixes the following issues:
- nptl: wait for pending setxid request also in detached thread. (bsc#1162930)
| Advisory ID | SUSE-RU-2020:1404-1
|
| Released | Mon May 25 15:32:34 2020 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1138793,1166260 |
Description:
This update for zlib fixes the following issues:
- Including the latest fixes from IBM (bsc#1166260)
IBM Z mainframes starting from version z15 provide DFLTCC instruction, which implements
deflate algorithm in hardware with estimated compression and decompression performance
orders of magnitude faster than the current zlib and ratio comparable with that of level 1.
- Add SUSE specific fix to solve bsc#1138793.
The fix will avoid to test if the app was linked with exactly same version of zlib
like the one that is present on the runtime.
| Advisory ID | SUSE-RU-2020:1506-1
|
| Released | Fri May 29 17:22:11 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1087982,1170527 |
Description:
This update for aaa_base fixes the following issues:
- Not all XTerm based emulators do have a terminfo entry. (bsc#1087982)
- Better support of Midnight Commander. (bsc#1170527)
| Advisory ID | SUSE-SU-2020:1532-1
|
| Released | Thu Jun 4 10:16:12 2020 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1172021,CVE-2019-19956 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2019-19956: Reverted the upstream fix for this memory leak because it introduced other, more severe vulnerabilities (bsc#1172021).
| Advisory ID | SUSE-RU-2020:1579-1
|
| Released | Tue Jun 9 17:05:23 2020 |
| Summary | Recommended update for audit |
| Type | recommended |
| Severity | important |
| References | 1156159,1172295 |
Description:
This update for audit fixes the following issues:
- Fix hang on startup. (bsc#1156159)
- Fix specfile to require libauparse0 and libaudit1 after splitting audit-libs. (bsc#1172295)
| Advisory ID | SUSE-SU-2020:1584-1
|
| Released | Tue Jun 9 18:39:15 2020 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | important |
| References | 1172461,1172506,CVE-2020-13777 |
Description:
This update for gnutls fixes the following issues:
- CVE-2020-13777: Fixed an insecure session ticket key construction which could
have made the TLS server to not bind the session ticket encryption key with a
value supplied by the application until the initial key rotation, allowing
an attacker to bypass authentication in TLS 1.3 and recover previous
conversations in TLS 1.2 (bsc#1172506).
- Fixed an improper handling of certificate chain with cross-signed intermediate
CA certificates (bsc#1172461).
| Advisory ID | SUSE-RU-2020:1611-1
|
| Released | Fri Jun 12 09:38:05 2020 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1130873,1154803,1164543,1165476,1165573,1166610,1167122,1168990 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
libsolv was updated to 0.7.13 to fix:
- Fix solvable swapping messing up idarrays
- fix ruleinfo of complex dependencies returning the wrong origin
libzypp was updated to 17.23.4 to fix:
- Get retracted patch status from updateinfo data (jsc#SLE-8770)
libsolv injects the indicator provides into packages only.
- remove 'using namespace std;' (bsc#1166610, fixes #218)
- Online doc: add 'Hardware (modalias) dependencies' page
(fixes #216)
- Add HistoryLogReader actionFilter to parse only specific
HistoryActionIDs.
- RepoVariables: Add safe guard in case the caller does not own a
zypp instance.
- Enable c++17. Define libyzpp CXX_STANDARD in ZyppCommon.cmake.
- Fix package status computation regarding unneeded, orphaned, recommended
and suggested packages (broken in 17.23.0) (bsc#1165476)
- Log patch status changes to history (jsc#SLE-5116)
- Allow to disable all WebServer dependent tests when building. OBS
wants to be able to get rid of the nginx/FastCGI-devel build
requirement. Use 'rpmbuild --without mediabackend_tests' or
'cmake -DDISABLE_MEDIABACKEND_TESTS=1'.
- update translations
- boost: Fix deprecated auto_unit_test.hpp includes.
- Disable zchunk on Leap-15.0 and SLE15-* while there is no libzck.
- Fix decision whether to download ZCHUNK files.
libzypp and libsolv must both be able to read the format.
- yum::Downloader: Prefer zchunk compressed metadata if libvsolv
supports it.
- Selectable: Fix highestAvailableVersionObj if only retracted
packages are available. Avoid using retracted items as candidate
(jsc#SLE-8770)
- RpmDb: Become rpmdb backend independent (jsc#SLE-7272)
- RpmDb: Close API offering a custom rpmdb path
It's actually not needed and for this to work also libsolv needs
to support it. You can sill use a librpmDb::db_const_iterator to
access a database at a custom location (ro).
- Remove legacy rpmV3database conversion code.
- Reformat manpages to workaround asciidoctor shortcomings
(bsc#1154803, bsc#1167122, bsc#1168990)
- Remove undocumented rug legacy stuff.
- Remove 'using namespace std;' (bsc#1166610)
- patch table: Add 'Since' column if history data are available
(jsc#SLE-5116)
zypper was updated to version 1.14.36:
- Tag 'retracted' patch status in info and list-patches (jsc#SLE-8770)
- Tag 'R'etracted items in search tabes status columns (jsc#SLE-8770)
- Relax 'Do not allow the abbreviation of cli arguments' in
legacy distibutions (bsc#1164543)
- Correctly detect ambigous switch abbreviations (bsc#1165573)
- zypper-aptitude: don't supplement zypper.
supplementing zypper means zypper-aptitude gets installed by
default and pulls in perl. Neither is desired on small systems.
- Do not allow the abbreviation of cli arguments (bsc#1164543)
- accoring to according in all translation files.
- Always show exception history if available.
- Use default package cache location for temporary repos (bsc#1130873)
| Advisory ID | SUSE-RU-2020:1637-1
|
| Released | Wed Jun 17 15:07:58 2020 |
| Summary | Recommended update for zypper |
| Type | recommended |
| Severity | important |
| References | 1169947,1172925 |
Description:
This update for zypper fixes the following issues:
- Print switch abbrev warning to stderr (bsc#1172925)
- Fix typo in man page (bsc#1169947)
| Advisory ID | SUSE-SU-2020:1682-1
|
| Released | Fri Jun 19 09:44:54 2020 |
| Summary | Security update for perl |
| Type | security |
| Severity | important |
| References | 1171863,1171864,1171866,1172348,CVE-2020-10543,CVE-2020-10878,CVE-2020-12723 |
Description:
This update for perl fixes the following issues:
- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have
allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of
instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a
compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
| Advisory ID | SUSE-RU-2020:1759-1
|
| Released | Thu Jun 25 18:44:37 2020 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1169357 |
Description:
This update for krb5 fixes the following issue:
- Call systemd to reload the services instead of init-scripts. (bsc#1169357)
| Advisory ID | SUSE-RU-2020:1760-1
|
| Released | Thu Jun 25 18:46:13 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1157315,1162698,1164538,1169488,1171145,1172072 |
Description:
This update for systemd fixes the following issues:
- Merge branch 'SUSE/v234' into SLE15
units: starting suspend.target should not fail when suspend is successful (bsc#1172072)
core/mount: do not add Before=local-fs.target or remote-fs.target if nofail mount option is set
mount: let mount_add_extras() take care of remote-fs.target deps (bsc#1169488)
mount: set up local-fs.target/remote-fs.target deps in mount_add_default_dependencies() too
udev: rename the persistent link for ATA devices (bsc#1164538)
shared/install: try harder to find enablement symlinks when disabling a unit (bsc#1157315)
tmpfiles: remove unnecessary assert (bsc#1171145)
test-engine: manager_free() was called too early
pid1: by default make user units inherit their umask from the user manager (bsc#1162698)
| Advisory ID | SUSE-SU-2020:1773-1
|
| Released | Fri Jun 26 08:05:59 2020 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1173027,CVE-2020-8177 |
Description:
This update for curl fixes the following issues:
- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious
server to overwrite a local file when using the -J option (bsc#1173027).
| Advisory ID | SUSE-SU-2020:1396-1
|
| Released | Fri Jul 3 12:33:05 2020 |
| Summary | Security update for zstd |
| Type | security |
| Severity | moderate |
| References | 1082318,1133297 |
Description:
This update for zstd fixes the following issues:
- Fix for build error caused by wrong static libraries. (bsc#1133297)
- Correction in spec file marking the license as documentation. (bsc#1082318)
- Add new package for SLE-15. (jsc#ECO-1886)
| Advisory ID | SUSE-SU-2020:1856-1
|
| Released | Mon Jul 6 17:05:51 2020 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | important |
| References | 1172698,1172704,CVE-2020-8023 |
Description:
This update for openldap2 fixes the following issues:
- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).
| Advisory ID | SUSE-SU-2020:1860-1
|
| Released | Mon Jul 6 17:09:44 2020 |
| Summary | Security update for permissions |
| Type | security |
| Severity | moderate |
| References | 1171883 |
Description:
This update for permissions fixes the following issues:
- Removed conflicting entries which might expose pcp to security issues (bsc#1171883)
| Advisory ID | SUSE-RU-2020:1869-1
|
| Released | Tue Jul 7 15:08:12 2020 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1130873,1154803,1164543,1165476,1165573,1166610,1167122,1168990,1169947,1170801,1171224,1172135,1172925 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
libsolv was updated to 0.7.14:
- Enable zstd compression support
- Support blacklisted packages in solver_findproblemrule()
(bnc#1172135)
- Support rules with multiple negative literals in choice rule
generation
- Fix solvable swapping messing up idarrays
- fix ruleinfo of complex dependencies returning the wrong origin
libzypp was updated to 17.23.7:
- Enable zchunk metadata download if libsolv supports it.
- Older kernel-devel packages are not properly purged (bsc#1171224)
- doc: enhance service plugin example.
- Get retracted patch status from updateinfo data (jsc#SLE-8770)
libsolv injects the indicator provides into packages only.
- remove 'using namespace std;' (bsc#1166610, fixes #218)
- Online doc: add 'Hardware (modalias) dependencies' page
(fixes #216)
- Add HistoryLogReader actionFilter to parse only specific
HistoryActionIDs.
- RepoVariables: Add safe guard in case the caller does not own a
zypp instance.
- Enable c++17. Define libyzpp CXX_STANDARD in ZyppCommon.cmake.
- Fix package status computation regarding unneeded, orphaned, recommended
and suggested packages (broken in 17.23.0) (bsc#1165476)
- Log patch status changes to history (jsc#SLE-5116)
- Allow to disable all WebServer dependent tests when building. OBS
wants to be able to get rid of the nginx/FastCGI-devel build
requirement. Use 'rpmbuild --without mediabackend_tests' or
'cmake -DDISABLE_MEDIABACKEND_TESTS=1'.
- boost: Fix deprecated auto_unit_test.hpp includes.
- Disable zchunk on Leap-15.0 and SLE15-* while there is no libzck.
- Fix decision whether to download ZCHUNK files.
libzypp and libsolv must both be able to read the format.
- yum::Downloader: Prefer zchunk compressed metadata if libvsolv
supports it.
- Selectable: Fix highestAvailableVersionObj if only retracted
packages are available. Avoid using retracted items as candidate
(jsc#SLE-8770)
- RpmDb: Become rpmdb backend independent (jsc#SLE-7272)
- RpmDb: Close API offering a custom rpmdb path
It's actually not needed and for this to work also libsolv needs
to support it. You can sill use a librpmDb::db_const_iterator to
access a database at a custom location (ro).
- Remove legacy rpmV3database conversion code.
- Fix core dump with corrupted history file (bsc#1170801)
zypper was updated to 1.14.37:
- Reformat manpages to workaround asciidoctor shortcomings
(bsc#1154803, bsc#1167122, bsc#1168990)
- Remove undocumented rug legacy stuff.
- Remove 'using namespace std;' (bsc#1166610)
- patch table: Add 'Since' column if history data are available
(jsc#SLE-5116)
- Tag 'retracted' patch status in info and list-patches (jsc#SLE-8770)
- Tag 'R'etracted items in search tabes status columns (jsc#SLE-8770)
- Relax 'Do not allow the abbreviation of cli arguments' in
legacy distibutions (bsc#1164543)
- Correctly detect ambigous switch abbreviations (bsc#1165573)
- zypper-aptitude: don't supplement zypper.
supplementing zypper means zypper-aptitude gets installed by
default and pulls in perl. Neither is desired on small systems.
- Do not allow the abbreviation of cli arguments (bsc#1164543)
- accoring to according in all translation files.
- Always show exception history if available.
- Use default package cache location for temporary repos (bsc#1130873)
- Print switch abbrev warning to stderr (bsc#1172925)
- Fix typo in man page (bsc#1169947)
| Advisory ID | SUSE-RU-2020:2040-1
|
| Released | Fri Jul 24 13:58:53 2020 |
| Summary | Recommended update for libsolv, libzypp |
| Type | recommended |
| Severity | moderate |
| References | 1170801,1171224,1172135,1173106,1174011 |
Description:
This update for libsolv, libzypp fixes the following issues:
libsolv was updated to version 0.7.14:
- Enable zstd compression support for sle15
- Support blacklisted packages in solver_findproblemrule() (bsc#1172135)
- Support rules with multiple negative literals in choice rule
generation
libzypp was updated to version 17.24.0:
- Enable zchunk metadata download if libsolv supports it.
- Older kernel-devel packages are not properly purged (bsc#1171224)
- doc: enhance service plugin example.
- Fix core dump with corrupted history file (bsc#1170801)
- Better handling of the purge-kernels algorithm. (bsc#1173106)
- Proactively send credentials if the URL specifes '?auth=basic' and a username.
(bsc#1174011)
- ZYPP_MEDIA_CURL_DEBUG: Strip credentials in header log. (bsc#1174011)
| Advisory ID | SUSE-RU-2020:2083-1
|
| Released | Thu Jul 30 10:27:59 2020 |
| Summary | Recommended update for diffutils |
| Type | recommended |
| Severity | moderate |
| References | 1156913 |
Description:
This update for diffutils fixes the following issue:
- Disable a sporadically failing test for ppc64 and ppc64le builds. (bsc#1156913)
| Advisory ID | SUSE-RU-2020:2099-1
|
| Released | Fri Jul 31 08:06:40 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1173227,1173229,1173422 |
Description:
This update for systemd fixes the following issues:
- migrate-sysconfig-i18n.sh: fixed marker handling (bsc#1173229)
The marker is used to make sure the script is run only once. Instead
of storing it in /usr, use /var which is more appropriate for such
file.
Also make it owned by systemd package.
- Fix inconsistent file modes for some ghost files (bsc#1173227)
Ghost files are assumed by rpm to have mode 000 by default which is
not consistent with file permissions set at runtime.
Also /var/lib/systemd/random-seed was tracked wrongly as a
directory.
Also don't track (ghost) /etc/systemd/system/runlevel*.target
aliases since we're not supposed to track units or aliases user
might define/override.
- Fix build of systemd on openSUSE Leap 15.2 (bsc#1173422)
| Advisory ID | SUSE-RU-2020:2224-1
|
| Released | Thu Aug 13 09:15:47 2020 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1171878,1172085 |
Description:
This update for glibc fixes the following issues:
- Fix concurrent changes on nscd aware files appeared by 'getent' when the NSCD cache was enabled. (bsc#1171878, BZ #23178)
- Implement correct locking and cancellation cleanup in syslog functions. (bsc#1172085, BZ #26100)
| Advisory ID | SUSE-RU-2020:2278-1
|
| Released | Wed Aug 19 21:26:08 2020 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | moderate |
| References | 1149911,1151708,1168235,1168389 |
Description:
This update for util-linux fixes the following issues:
- blockdev: Do not fail --report on kpartx-style partitions on multipath. (bsc#1168235)
- nologin: Add support for -c to prevent error from su -c. (bsc#1151708)
- Avoid triggering autofs in lookup_umount_fs_by_statfs. (bsc#1168389)
- mount: Fall back to device node name if /dev/mapper link not found. (bsc#1149911)
| Advisory ID | SUSE-RU-2020:2284-1
|
| Released | Thu Aug 20 16:04:17 2020 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | important |
| References | 1010996,1071152,1071390,1154871,1174673,973042 |
Description:
This update for ca-certificates-mozilla fixes the following issues:
update to 2.42 state of the Mozilla NSS Certificate store (bsc#1174673)
Removed CAs:
* AddTrust External CA Root
* AddTrust Class 1 CA Root
* LuxTrust Global Root 2
* Staat der Nederlanden Root CA - G2
* Symantec Class 1 Public Primary Certification Authority - G4
* Symantec Class 2 Public Primary Certification Authority - G4
* VeriSign Class 3 Public Primary Certification Authority - G3
Added CAs:
* certSIGN Root CA G2
* e-Szigno Root CA 2017
* Microsoft ECC Root Certificate Authority 2017
* Microsoft RSA Root Certificate Authority 2017
- reverted p11-kit nss trust integration as it breaks in fresh installations (bsc#1154871)
| Advisory ID | SUSE-RU-2020:2384-1
|
| Released | Sat Aug 29 00:57:13 2020 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | low |
| References | 1170964 |
Description:
This update for e2fsprogs fixes the following issues:
- Fix for an issue when system message with placeholders are not properly replaced. (bsc#1170964)
| Advisory ID | SUSE-RU-2020:2411-1
|
| Released | Tue Sep 1 13:28:47 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1142733,1146991,1158336,1172195,1172824,1173539 |
Description:
This update for systemd fixes the following issues:
- Improve logging when PID1 fails at setting a namespace up when spawning a command specified by
'Exec*='. (bsc#1172824, bsc#1142733)
pid1: improve message when setting up namespace fails.
execute: let's close glibc syslog channels too.
execute: normalize logging in *execute.c*.
execute: fix typo in error message.
execute: drop explicit *log_open()*/*log_close()* now that it is unnecessary.
execute: make use of the new logging mode in *execute.c*
log: add a mode where we open the log fds for every single log message.
log: let's make use of the fact that our functions return the negative error code for *log_oom()* too.
execute: downgrade a log message ERR → WARNING, since we proceed ignoring its result.
execute: rework logging in *setup_keyring()* to include unit info.
execute: improve and augment execution log messages.
- vconsole-setup: downgrade log message when setting font fails on dummy console. (bsc#1172195 bsc#1173539)
- fix infinite timeout. (bsc#1158336)
- bpf: mount bpffs by default on boot. (bsc#1146991)
- man: explain precedence for options which take a list.
- man: unify titling, fix description of precedence in sysusers.d(5)
- udev-event: fix timeout log messages.
| Advisory ID | SUSE-RU-2020:2420-1
|
| Released | Tue Sep 1 13:48:35 2020 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1174551,1174736 |
Description:
This update for zlib provides the following fixes:
- Permit a deflateParams() parameter change as soon as possible. (bsc#1174736)
- Fix DFLTCC not flushing EOBS when creating raw streams. (bsc#1174551)
| Advisory ID | SUSE-SU-2020:2446-1
|
| Released | Wed Sep 2 09:33:22 2020 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1175109,CVE-2020-8231 |
Description:
This update for curl fixes the following issues:
- An application that performs multiple requests with libcurl's
multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
rare circumstances experience that when subsequently using the
setup connect-only transfer, libcurl will pick and use the wrong
connection and instead pick another one the application has
created since then. [bsc#1175109, CVE-2020-8231]
| Advisory ID | SUSE-SU-2020:2581-1
|
| Released | Wed Sep 9 13:07:07 2020 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1174154,CVE-2020-15719 |
Description:
This update for openldap2 fixes the following issues:
- bsc#1174154 - CVE-2020-15719 - This resolves an issue with x509
SAN's falling back to CN validation in violation of rfc6125.
| Advisory ID | SUSE-SU-2020:2612-1
|
| Released | Fri Sep 11 11:18:01 2020 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1176179,CVE-2020-24977 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).
| Advisory ID | SUSE-RU-2020:2651-1
|
| Released | Wed Sep 16 14:42:55 2020 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1175811,1175830,1175831 |
Description:
This update for zlib fixes the following issues:
- Fix compression level switching (bsc#1175811, bsc#1175830, bsc#1175831)
- Enable hardware compression on s390/s390x (jsc#SLE-13776)
| Advisory ID | SUSE-RU-2020:2704-1
|
| Released | Tue Sep 22 15:06:36 2020 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1174079 |
Description:
This update for krb5 fixes the following issue:
- Fix prefix reported by krb5-config, libraries and headers are not installed under /usr/lib/mit prefix. (bsc#1174079)
| Advisory ID | SUSE-SU-2020:2712-1
|
| Released | Tue Sep 22 17:08:03 2020 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1175568,CVE-2020-8027 |
Description:
This update for openldap2 fixes the following issues:
- CVE-2020-8027: openldap_update_modules_path.sh starts daemons unconditionally and uses fixed paths in /tmp (bsc#1175568).
| Advisory ID | SUSE-RU-2020:2818-1
|
| Released | Thu Oct 1 10:38:55 2020 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1165424,1173273,1173529,1174240,1174561,1174918,1175342,1175592 |
Description:
This update for libzypp, zypper provides the following fixes:
Changes in libzypp:
- VendorAttr: Const-correct API and let Target provide its settings. (bsc#1174918)
- Support buildnr with commit hash in purge-kernels. This adds special behaviour for when
a kernel version has the rebuild counter before the kernel commit hash. (bsc#1175342)
- Improve Italian translation of the 'breaking dependencies' message. (bsc#1173529)
- Make sure reading from lsof does not block forever. (bsc#1174240)
- Just collect details for the signatures found.
Changes in zypper:
- man: Enhance description of the global package cache. (bsc#1175592)
- man: Point out that plain rpm packages are not downloaded to the global package cache.
(bsc#1173273)
- Directly list subcommands in 'zypper help'. (bsc#1165424)
- Remove extern C block wrapping augeas.h as it breaks the build on Arch Linux.
- Point out that plaindir repos do not follow symlinks. (bsc#1174561)
- Fix help command for list-patches.
| Advisory ID | SUSE-SU-2020:2830-1
|
| Released | Fri Oct 2 10:34:26 2020 |
| Summary | Security update for permissions |
| Type | security |
| Severity | moderate |
| References | 1161335,1176625 |
Description:
This update for permissions fixes the following issues:
- whitelist WMP (bsc#1161335, bsc#1176625)
| Advisory ID | SUSE-RU-2020:2869-1
|
| Released | Tue Oct 6 16:13:20 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1011548,1153943,1153946,1161239,1171762 |
Description:
This update for aaa_base fixes the following issues:
- DIR_COLORS (bug#1006973):
- add screen.xterm-256color
- add TERM rxvt-unicode-256color
- sort and merge TERM entries in etc/DIR_COLORS
- check for Packages.db and use this instead of Packages. (bsc#1171762)
- Rename path() to _path() to avoid using a general name.
- refresh_initrd call modprobe as /sbin/modprobe (bsc#1011548)
- etc/profile add some missing ;; in case esac statements
- profile and csh.login: on s390x set TERM to dumb on dumb terminal (bsc#1153946)
- backup-rpmdb: exit if zypper is running (bsc#1161239)
- Add color alias for ip command (jsc#sle-9880, jsc#SLE-7679, bsc#1153943)
| Advisory ID | SUSE-SU-2020:2901-1
|
| Released | Tue Oct 13 14:22:43 2020 |
| Summary | Security update for libproxy |
| Type | security |
| Severity | important |
| References | 1176410,1177143,CVE-2020-25219,CVE-2020-26154 |
Description:
This update for libproxy fixes the following issues:
- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).
| Advisory ID | SUSE-SU-2020:2914-1
|
| Released | Tue Oct 13 17:25:20 2020 |
| Summary | Security update for bind |
| Type | security |
| Severity | moderate |
| References | 1100369,1109160,1118367,1118368,1128220,1156205,1157051,1161168,1170667,1170713,1171313,1171740,1172958,1173307,1173311,1173983,1175443,1176092,1176674,906079,CVE-2017-3136,CVE-2018-5741,CVE-2019-6477,CVE-2020-8616,CVE-2020-8617,CVE-2020-8618,CVE-2020-8619,CVE-2020-8620,CVE-2020-8621,CVE-2020-8622,CVE-2020-8623,CVE-2020-8624 |
Description:
This update for bind fixes the following issues:
BIND was upgraded to version 9.16.6:
Note:
- bind is now more strict in regards to DNSSEC. If queries are not working,
check for DNSSEC issues. For instance, if bind is used in a namserver
forwarder chain, the forwarding DNS servers must support DNSSEC.
Fixing security issues:
- CVE-2020-8616: Further limit the number of queries that can be triggered from
a request. Root and TLD servers are no longer exempt
from max-recursion-queries. Fetches for missing name server. (bsc#1171740)
Address records are limited to 4 for any domain.
- CVE-2020-8617: Replaying a TSIG BADTIME response as a request could trigger an
assertion failure. (bsc#1171740)
- CVE-2019-6477: Fixed an issue where TCP-pipelined queries could bypass
the tcp-clients limit (bsc#1157051).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- CVE-2020-8618: It was possible to trigger an INSIST when determining
whether a record would fit into a TCP message buffer (bsc#1172958).
- CVE-2020-8619: It was possible to trigger an INSIST in
lib/dns/rbtdb.c:new_reference() with a particular zone content
and query patterns (bsc#1172958).
- CVE-2020-8624: 'update-policy' rules of type 'subdomain' were
incorrectly treated as 'zonesub' rules, which allowed
keys used in 'subdomain' rules to update names outside
of the specified subdomains. The problem was fixed by
making sure 'subdomain' rules are again processed as
described in the ARM (bsc#1175443).
- CVE-2020-8623: When BIND 9 was compiled with native PKCS#11 support, it
was possible to trigger an assertion failure in code
determining the number of bits in the PKCS#11 RSA public
key with a specially crafted packet (bsc#1175443).
- CVE-2020-8621: named could crash in certain query resolution scenarios
where QNAME minimization and forwarding were both
enabled (bsc#1175443).
- CVE-2020-8620: It was possible to trigger an assertion failure by
sending a specially crafted large TCP DNS message (bsc#1175443).
- CVE-2020-8622: It was possible to trigger an assertion failure when
verifying the response to a TSIG-signed request (bsc#1175443).
Other issues fixed:
- Add engine support to OpenSSL EdDSA implementation.
- Add engine support to OpenSSL ECDSA implementation.
- Update PKCS#11 EdDSA implementation to PKCS#11 v3.0.
- Warn about AXFR streams with inconsistent message IDs.
- Make ISC rwlock implementation the default again.
- Fixed issues when using cookie-secrets for AES and SHA2 (bsc#1161168)
- Installed the default files in /var/lib/named and created
chroot environment on systems using transactional-updates (bsc#1100369, fate#325524)
- Fixed an issue where bind was not working in FIPS mode (bsc#906079).
- Fixed dependency issues (bsc#1118367 and bsc#1118368).
- GeoIP support is now discontinued, now GeoIP2 is used(bsc#1156205).
- Fixed an issue with FIPS (bsc#1128220).
- The liblwres library is discontinued upstream and is no longer included.
- Added service dependency on NTP to make sure the clock is accurate when bind is starts (bsc#1170667, bsc#1170713).
- Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE.
- The default value of 'max-stale-ttl' has been changed from 1 week to 12 hours.
- Zone timers are now exported via statistics channel.
- The 'primary' and 'secondary' keywords, when used as parameters for 'check-names', were not processed correctly and were being ignored.
- 'rndc dnstap -roll ' did not limit the number of saved files to .
- Add 'rndc dnssec -status' command.
- Addressed a couple of situations where named could crash.
- Changed /var/lib/named to owner root:named and perms rwxrwxr-t
so that named, being a/the only member of the 'named' group
has full r/w access yet cannot change directories owned by root
in the case of a compromized named.
[bsc#1173307, bind-chrootenv.conf]
- Added '/etc/bind.keys' to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file (bsc#1173983).
- Removed '-r /dev/urandom' from all invocations of rndc-confgen
(init/named system/lwresd.init system/named.init in vendor-files)
as this option is deprecated and causes rndc-confgen to fail.
(bsc#1173311, bsc#1176674, bsc#1170713)
- /usr/bin/genDDNSkey: Removing the use of the -r option in the call
of /usr/sbin/dnssec-keygen as BIND now uses the random number
functions provided by the crypto library (i.e., OpenSSL or a
PKCS#11 provider) as a source of randomness rather than /dev/random.
Therefore the -r command line option no longer has any effect on
dnssec-keygen. Leaving the option in genDDNSkey as to not break
compatibility. Patch provided by Stefan Eisenwiener.
[bsc#1171313]
- Put libns into a separate subpackage to avoid file conflicts
in the libisc subpackage due to different sonums (bsc#1176092).
- Require /sbin/start_daemon: both init scripts, the one used in
systemd context as well as legacy sysv, make use of start_daemon.
| Advisory ID | SUSE-SU-2020:2947-1
|
| Released | Fri Oct 16 15:23:07 2020 |
| Summary | Security update for gcc10, nvptx-tools |
| Type | security |
| Severity | moderate |
| References | 1172798,1172846,1173972,1174753,1174817,1175168,CVE-2020-13844 |
Description:
This update for gcc10, nvptx-tools fixes the following issues:
This update provides the GCC10 compiler suite and runtime libraries.
The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.
The new compiler variants are available with '-10' suffix, you can specify them
via:
CC=gcc-10
CXX=g++-10
or similar commands.
For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html
Changes in nvptx-tools:
| Advisory ID | SUSE-RU-2020:2958-1
|
| Released | Tue Oct 20 12:24:55 2020 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | moderate |
| References | 1158830 |
Description:
This update for procps fixes the following issues:
- Fixes an issue when command 'ps -C' does not allow anymore an argument longer than 15 characters. (bsc#1158830)
| Advisory ID | SUSE-RU-2020:2983-1
|
| Released | Wed Oct 21 15:03:03 2020 |
| Summary | Recommended update for file |
| Type | recommended |
| Severity | moderate |
| References | 1176123 |
Description:
This update for file fixes the following issues:
- Fixes an issue when file displays broken 'ELF' interpreter. (bsc#1176123)
| Advisory ID | SUSE-SU-2020:2988-1
|
| Released | Wed Oct 21 17:35:34 2020 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | moderate |
| References | 1176086,1176181,1176671,CVE-2020-24659 |
Description:
This update for gnutls fixes the following issues:
- Fix heap buffer overflow in handshake with no_renegotiation alert sent (CVE-2020-24659 bsc#1176181)
- FIPS: Implement (EC)DH requirements from SP800-56Arev3 (bsc#1176086)
- FIPS: Use 2048 bit prime in DH selftest (bsc#1176086)
- FIPS: Add TLS KDF selftest (bsc#1176671)
| Advisory ID | SUSE-RU-2020:3048-1
|
| Released | Tue Oct 27 16:05:17 2020 |
| Summary | Recommended update for libsolv, libzypp, yaml-cpp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1174918,1176192,1176435,1176712,1176740,1176902,1177238,935885 |
Description:
This update for libsolv, libzypp, yaml-cpp, zypper fixes the following issues:
libzypp was updated to 17.25.1:
- When kernel-rt has been installed, the purge-kernels service fails during boot. (bsc#1176902)
- Use package name provides as group key in purge-kernel (bsc#1176740 bsc#1176192)
kernel-default-base has new packaging, where the kernel uname -r
does not reflect the full package version anymore. This patch
adds additional logic to use the most generic/shortest edition
each package provides with %{packagename}= to group the
kernel packages instead of the rpm versions.
This also changes how the keep-spec for specific versions is
applied, instead of matching the package versions, each of the
package name provides will be matched.
- RepoInfo: Return the type of the local metadata cache as
fallback (bsc#1176435)
- VendorAttr: Fix broken 'suse,opensuse' equivalence handling.
Enhance API and testcases. (bsc#1174918)
- Update docs regarding 'opensuse' namepace matching.
- Link against libzstd to close libsolvs open references
(as we link statically)
yaml-cpp:
- The libyaml-cpp0_6 library package is added the to the Basesystem module, LTSS and ESPOS
channels, and the INSTALLER channels, as a new libzypp dependency.
No source changes were done to yaml-cpp.
zypper was updated to 1.14.40:
libsolv was updated to 0.7.15 to fix:
- make testcase_mangle_repo_names deal correctly with freed repos
[bsc#1177238]
- fix deduceq2addedmap clearing bits outside of the map
- conda: feature depriorization first
- conda: fix startswith implementation
- move find_update_seeds() call in cleandeps calculation
- set SOLVABLE_BUILDHOST in rpm and rpmmd parsers
- new testcase_mangle_repo_names() function
- new solv_fmemopen() function
| Advisory ID | SUSE-RU-2020:3138-1
|
| Released | Tue Nov 3 12:14:03 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1104902,1154935,1165502,1167471,1173422,1176513,1176800 |
Description:
This update for systemd fixes the following issues:
- seccomp: shm{get,at,dt} now have their own numbers everywhere (bsc#1173422)
- test-seccomp: log function names
- test-seccomp: add log messages when skipping tests
- basic/virt: Detect PowerVM hypervisor (bsc#1176800)
- fs-util: suppress world-writable warnings if we read /dev/null
- udevadm: rename option '--log-priority' into '--log-level'
- udev: rename kernel option 'log_priority' into 'log_level'
- fstab-generator: add 'nofail' when NFS 'bg' option is used (bsc#1176513)
- Fix memory protection default (bsc#1167471)
- cgroup: Support 0-value for memory protection directives and accepts MemorySwapMax=0 (bsc#1154935)
- Improve latency and reliability when users log in/out (bsc#1104902, bsc#1165502)
| Advisory ID | SUSE-RU-2020:3234-1
|
| Released | Fri Nov 6 16:01:36 2020 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1177864 |
Description:
This update for ca-certificates-mozilla fixes the following issues:
The SSL Root CA store was updated to the 2.44 state of the Mozilla NSS Certificate store (bsc#1177864)
- EE Certification Centre Root CA
- Taiwan GRCA
- Trustwave Global Certification Authority
- Trustwave Global ECC P256 Certification Authority
- Trustwave Global ECC P384 Certification Authority
| Advisory ID | SUSE-RU-2020:3285-1
|
| Released | Wed Nov 11 11:22:14 2020 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1174918,1176192,1176435,1176712,1176740,1176902,1177238,935885 |
Description:
This update for libsolv, libzypp, zypper fixes the following issues:
libzypp was updated to version 17.25.1:
- Fix bsc#1176902: When kernel-rt has been installed, the
purge-kernels service fails during boot.
- Use package name provides as group key in purge-kernel
(bsc#1176740 bsc#1176192)
kernel-default-base has new packaging, where the kernel uname -r
does not reflect the full package version anymore. This patch
adds additional logic to use the most generic/shortest edition
each package provides with %{packagename}= to group the
kernel packages instead of the rpm versions.
This also changes how the keep-spec for specific versions is
applied, instead of matching the package versions, each of the
package name provides will be matched.
- RepoInfo: Return the type of the local metadata cache as
fallback (bsc#1176435)
- VendorAttr: Fix broken 'suse,opensuse' equivalence handling.
Enhance API and testcases. (bsc#1174918)
- Update docs regarding 'opensuse' namepace matching.
- New solver testcase format.
- Link against libzsd to close libsolvs open references
(as we link statically)
zypper was updated to version 1.14.40.
libsolv was updated to version 0.7.16:
- do not ask the namespace callback for splitprovides when writing
a testcase
- fix add_complex_recommends() selecting conflicted packages in
rare cases leading to crashes
- improve choicerule generation so that package updates are
prefered in more cases
- make testcase_mangle_repo_names deal correctly with freed repos
[bsc#1177238]
- fix deduceq2addedmap clearing bits outside of the map
- conda: feature depriorization first
- conda: fix startswith implementation
- move find_update_seeds() call in cleandeps calculation
- set SOLVABLE_BUILDHOST in rpm and rpmmd parsers
- new testcase_mangle_repo_names() function
- new solv_fmemopen() function
| Advisory ID | SUSE-RU-2020:3290-1
|
| Released | Wed Nov 11 12:25:32 2020 |
| Summary | Recommended update for findutils |
| Type | recommended |
| Severity | moderate |
| References | 1174232 |
Description:
This update for findutils fixes the following issues:
- Do not unconditionally use leaf optimization for NFS. (bsc#1174232)
NFS st_nlink are not accurate on all implementations, leading to aborts() if that assumption is made.
| Advisory ID | SUSE-SU-2020:3313-1
|
| Released | Thu Nov 12 16:07:37 2020 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | important |
| References | 1178387,CVE-2020-25692 |
Description:
This update for openldap2 fixes the following issues:
- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
| Advisory ID | SUSE-SU-2020:3377-1
|
| Released | Thu Nov 19 09:29:32 2020 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | moderate |
| References | 1178512,CVE-2020-28196 |
Description:
This update for krb5 fixes the following security issue:
- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
| Advisory ID | SUSE-RU-2020:3381-1
|
| Released | Thu Nov 19 10:53:38 2020 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1177458,1177490,1177510 |
Description:
This update for systemd fixes the following issues:
- build-sys: optionally disable support of journal over the network (bsc#1177458)
- ask-password: prevent buffer overflow when reading from keyring (bsc#1177510)
- mount: don't propagate errors from mount_setup_unit() further up
- Rely on the new build option --disable-remote for journal_remote
This allows to drop the workaround that consisted in cleaning journal-upload files and
{sysusers.d,tmpfiles.d}/systemd-remote.conf manually when 'journal_remote' support was disabled.
- Move journal-{remote,upload}.conf.5.gz man pages into systemd-journal_remote sub package
- Make sure {sysusers.d,tmpfiles.d}/systemd-remote.conf are not shipped with --without=journal_remote (bsc#1177458)
These files were incorrectly packaged in the main package when systemd-journal_remote was disabled.
- Make use of %{_unitdir} and %{_sysusersdir}
- Remove mq-deadline selection from 60-io-scheduler.rules (bsc#1177490)
| Advisory ID | SUSE-RU-2020:3462-1
|
| Released | Fri Nov 20 13:14:35 2020 |
| Summary | Recommended update for pam and sudo |
| Type | recommended |
| Severity | moderate |
| References | 1174593,1177858,1178727 |
Description:
This update for pam and sudo fixes the following issue:
pam:
- pam_xauth: do not *free* a string which has been successfully passed to *putenv*. (bsc#1177858)
- Initialize the local variable *daysleft* to avoid a misleading warning for password expire days. (bsc#1178727)
- Run /usr/bin/xauth using the old user's and group's identifiers. (bsc#1174593)
sudo:
- Fix a problem with pam_xauth which checks effective and real uids to get the real identity of the user. (bsc#1174593)
| Advisory ID | SUSE-RU-2020:3546-1
|
| Released | Fri Nov 27 11:21:09 2020 |
| Summary | Recommended update for gnutls |
| Type | recommended |
| Severity | moderate |
| References | 1172695 |
Description:
This update for gnutls fixes the following issue:
- Avoid spurious audit messages about incompatible signature algorithms (bsc#1172695)
| Advisory ID | SUSE-RU-2020:3560-1
|
| Released | Mon Nov 30 12:21:34 2020 |
| Summary | Recommended update for openssl-1_1 |
| Type | recommended |
| Severity | moderate |
| References | 1158499,1160158,1161198,1161203,1163569,1165281,1165534,1166848,1175847,1177479 |
Description:
This update for openssl-1_1 fixes the following issues:
This update backports various bugfixes for FIPS:
- Restore private key check in EC_KEY_check_key [bsc#1177479]
- Add shared secret KAT to FIPS DH selftest [bsc#1175847]
- Include ECDH/DH Requirements from SP800-56Arev3 [bsc#1175847]
- Fix locking issue uncovered by python testsuite (bsc#1166848)
- Fix the sequence of locking operations in FIPS mode [bsc#1165534]
- Fix deadlock in FIPS rand code (bsc#1165281)
- Fix wrong return values of FIPS DSA and ECDH selftests (bsc#1163569)
- Fix FIPS DRBG without derivation function (bsc#1161198)
- Allow md5_sha1 in FIPS mode to enable TLS 1.0 (bsc#1161203)
- Obsolete libopenssl-1_0_0-hmac for a clean upgrade from SLE-12
(bsc#1158499)
- Restore the EVP_PBE_scrypt() behavior from before the KDF patch
by treating salt=NULL as salt='' (bsc#1160158)
| Advisory ID | SUSE-RU-2020:3579-1
|
| Released | Tue Dec 1 14:24:31 2020 |
| Summary | Recommended update for glib2 |
| Type | recommended |
| Severity | moderate |
| References | 1178346 |
Description:
This update for glib2 fixes the following issues:
- Add support for slim format of timezone. (bsc#1178346)
- Fix DST incorrect end day when using slim format. (bsc#1178346)
| Advisory ID | SUSE-RU-2020:3581-1
|
| Released | Tue Dec 1 14:40:22 2020 |
| Summary | Recommended update for libusb-1_0 |
| Type | recommended |
| Severity | moderate |
| References | 1178376 |
Description:
This update for libusb-1_0 fixes the following issues:
- Fixes a build failure for libusb for the inclusion of 'sys/time.h' on PowerPC. (bsc#1178376)
| Advisory ID | SUSE-RU-2020:3620-1
|
| Released | Thu Dec 3 17:03:55 2020 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for pam fixes the following issues:
- Check if the password is part of the username. (jsc#SLE-16719, jsc#SLE-16720)
- Check whether the password contains a substring of of the user's name of at least `` characters length in
some form. This is enabled by the new parameter `usersubstr=`
| Advisory ID | SUSE-RU-2020:3703-1
|
| Released | Mon Dec 7 20:17:32 2020 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1179431 |
Description:
This update for aaa_base fixes the following issue:
- Avoid semicolon within (t)csh login script on S/390. (bsc#1179431)
| Advisory ID | SUSE-SU-2020:3720-1
|
| Released | Wed Dec 9 13:36:26 2020 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | important |
| References | 1179491,CVE-2020-1971 |
Description:
This update for openssl-1_1 fixes the following issues:
- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
| Advisory ID | SUSE-SU-2020:3733-1
|
| Released | Wed Dec 9 18:18:35 2020 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1179398,1179399,1179593,CVE-2020-8284,CVE-2020-8285,CVE-2020-8286 |
Description:
This update for curl fixes the following issues:
- CVE-2020-8286: Fixed improper OSCP verification in the client side (bsc#1179593).
- CVE-2020-8285: Fixed a stack overflow due to FTP wildcard (bsc#1179399).
- CVE-2020-8284: Fixed an issue where a malicius FTP server could make curl connect to a different IP (bsc#1179398).
| Advisory ID | SUSE-SU-2020:3760-1
|
| Released | Wed Dec 23 09:18:55 2020 |
| Summary | Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package |
| Type | security |
| Severity | moderate |
| References | 1174219,1174951,1176752,1176753,1176754,1176755,1177661,1177662,CVE-2020-15106,CVE-2020-15112,CVE-2020-15184,CVE-2020-15185,CVE-2020-15186,CVE-2020-15187,CVE-2020-8565,CVE-2020-8566 |
Description:
= Required Actions
== Kubernetes & etcd (Security fixes)
This fix involves an upgrade of Kubernetes and some add-ons. See https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluster_updates.html#_updating_kubernetes_components for the upgrade procedure.
== Skuba & helm/helm3
In order to update skuba and helm or helm 3, you need to update the management workstation. See detailed instructions at https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_cluster_updates.html#_update_management_workstation
= Known Issues
Modifying the file `/etc/sysconfig/kubelet` directly is not supported: documentation at https://documentation.suse.com/suse-caasp/4.2/html/caasp-admin/_miscellaneous.html#_configuring_kubelet
Be sure to check the Release Notes at https://www.suse.com/releasenotes/x86_64/SUSE-CAASP/4/#_changes_in_4_2_4 for any additional known issues or behavioral changes.
SUSE-CU-2020:12-1
| Container Advisory ID | SUSE-CU-2020:12-1 |
| Container Tags | caasp/v4/helm-tiller:2.16.1 , caasp/v4/helm-tiller:2.16.1-rev3 , caasp/v4/helm-tiller:2.16.1-rev3-build3.9.1 |
| Container Release | 3.9.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2019:2241-1
|
| Released | Wed Aug 28 14:58:49 2019 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1144169 |
Description:
This update for ca-certificates-mozilla fixes the following issues:
ca-certificates-mozillawas updated to 2.34 state of the Mozilla NSS Certificate store (bsc#1144169)
Removed CAs:
- Certinomis - Root CA
Includes new root CAs from the 2.32 version:
- emSign ECC Root CA - C3 (email and server auth)
- emSign ECC Root CA - G3 (email and server auth)
- emSign Root CA - C1 (email and server auth)
- emSign Root CA - G1 (email and server auth)
- Hongkong Post Root CA 3 (server auth)
| Advisory ID | SUSE-SU-2019:2307-1
|
| Released | Thu Sep 5 14:45:08 2019 |
| Summary | Security update for util-linux and shadow |
| Type | security |
| Severity | moderate |
| References | 1081947,1082293,1085196,1106214,1121197,1122417,1125886,1127701,1135534,1135708,1141113,353876 |
Description:
This update for util-linux and shadow fixes the following issues:
util-linux:
- Fixed an issue where PATH settings in /etc/default/su being ignored (bsc#1121197)
- Prevent outdated pam files (bsc#1082293).
- De-duplicate fstrim -A properly (bsc#1127701).
- Do not trim read-only volumes (bsc#1106214).
- Integrate pam_keyinit pam module to login (bsc#1081947).
- Perform one-time reset of /etc/default/su (bsc#1121197).
- Fix problems in reading of login.defs values (bsc#1121197)
- libmount: To prevent incorrect behavior, recognize more pseudofs and netfs (bsc#1122417).
- raw.service: Add RemainAfterExit=yes (bsc#1135534).
- agetty: Return previous response of agetty for special characters (bsc#1085196, bsc#1125886)
- libmount: print a blacklist hint for 'unknown filesystem type' (jsc#SUSE-4085, fate#326832)
- Fix /etc/default/su comments and create /etc/default/runuser (bsc#1121197).
shadow:
- Fixed an issue where PATH settings in /etc/default/su being ignored (bsc#1121197)
- Fix segfault in useradd during setting password inactivity period. (bsc#1141113)
- Hardening for su wrappers (bsc#353876)
| Advisory ID | SUSE-RU-2019:2361-1
|
| Released | Thu Sep 12 07:54:54 2019 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1081947,1144047 |
Description:
This update for krb5 contains the following fixes:
- Integrate pam_keyinit PAM module, ksu-pam.d. (bsc#1081947)
| Advisory ID | SUSE-SU-2019:2373-1
|
| Released | Thu Sep 12 14:18:53 2019 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1149495,1149496,CVE-2019-5481,CVE-2019-5482 |
Description:
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2019-5481: Fixed FTP-KRB double-free during kerberos FTP data transfer (bsc#1149495).
- CVE-2019-5482: Fixed TFTP small blocksize heap buffer overflow (bsc#1149496).
| Advisory ID | SUSE-SU-2019:2395-1
|
| Released | Wed Sep 18 08:31:38 2019 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1073313,1111388,1114845,1143194,1143273,CVE-2017-17740,CVE-2019-13057,CVE-2019-13565 |
Description:
This update for openldap2 fixes the following issues:
Security issue fixed:
- CVE-2019-13565: Fixed an authentication bypass when using SASL authentication and session encryption (bsc#1143194).
- CVE-2019-13057: Fixed an issue with delegated database admin privileges (bsc#1143273).
- CVE-2017-17740: When both the nops module and the member of overlay
are enabled, attempts to free a buffer that was allocated on the stack,
which allows remote attackers to cause a denial of service (slapd crash)
via a member MODDN operation. (bsc#1073313)
Non-security issues fixed:
- Fixed broken shebang line in openldap_update_modules_path.sh (bsc#1114845).
- Create files in /var/lib/ldap/ during initial start to allow for transactional updates (bsc#1111388)
- Fixed incorrect post script call causing tmpfiles creation not to be run (bsc#1111388).
| Advisory ID | SUSE-SU-2019:2403-1
|
| Released | Wed Sep 18 16:14:29 2019 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1150003,1150250,CVE-2019-1547,CVE-2019-1563 |
Description:
This update for openssl-1_1 fixes the following issues:
OpenSSL Security Advisory [10 September 2019]
- CVE-2019-1547: Added EC_GROUP_set_generator side channel attack avoidance. (bsc#1150003)
- CVE-2019-1563: Fixed Bleichenbacher attack against cms/pkcs7 encryption transported key (bsc#1150250)
| Advisory ID | SUSE-RU-2019:2423-1
|
| Released | Fri Sep 20 16:41:45 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1146866,SLE-9132 |
Description:
This update for aaa_base fixes the following issues:
Added sysctl.d/51-network.conf to tighten network security (bsc#1146866) (jira#SLE-9132)
Following settings have been tightened (and set to 0):
- net.ipv4.conf.all.accept_redirects
- net.ipv4.conf.default.accept_redirects
- net.ipv4.conf.default.accept_source_route
- net.ipv6.conf.all.accept_redirects
- net.ipv6.conf.default.accept_redirects
| Advisory ID | SUSE-SU-2019:2533-1
|
| Released | Thu Oct 3 15:02:50 2019 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | moderate |
| References | 1150137,CVE-2019-16168 |
Description:
This update for sqlite3 fixes the following issues:
Security issue fixed:
- CVE-2019-16168: Fixed improper validation of sqlite_stat1 field that could lead to denial of service (bsc#1150137).
| Advisory ID | SUSE-RU-2019:2626-1
|
| Released | Thu Oct 10 17:22:35 2019 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1110797 |
Description:
This update for permissions fixes the following issues:
- Updated permissons for amanda. (bsc#1110797)
| Advisory ID | SUSE-RU-2019:2676-1
|
| Released | Tue Oct 15 21:06:54 2019 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 1145716,1152101,CVE-2019-5094 |
Description:
This update for e2fsprogs fixes the following issues:
Security issue fixed:
- CVE-2019-5094: Fixed an arbitrary code execution via specially crafted ext4 file systems. (bsc#1152101)
Non-security issue fixed:
- libext2fs: Call fsync(2) to clear stale errors for a new a unix I/O channel. (bsc#1145716)
| Advisory ID | SUSE-SU-2019:2730-1
|
| Released | Mon Oct 21 16:04:57 2019 |
| Summary | Security update for procps |
| Type | security |
| Severity | important |
| References | 1092100,1121753,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126 |
Description:
This update for procps fixes the following issues:
procps was updated to 3.3.15. (bsc#1092100)
Following security issues were fixed:
- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
with HOME unset in an attacker-controlled directory, the attacker could have
achieved privilege escalation by exploiting one of several vulnerabilities in
the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
Inbuilt protection in ps maped a guard page at the end of the overflowed
buffer, ensuring that the impact of this flaw is limited to a crash (temporary
denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
corruption in file2strvec function. This allowed a privilege escalation for a
local attacker who can create entries in procfs by starting processes, which
could result in crashes or arbitrary code execution in proc utilities run by
other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
truncation/integer overflow issues (bsc#1092100).
Also this non-security issue was fixed:
- Fix CPU summary showing old data. (bsc#1121753)
The update to 3.3.15 contains the following fixes:
- library: Increment to 8:0:1
No removals, no new functions
Changes: slab and pid structures
- library: Just check for SIGLOST and don't delete it
- library: Fix integer overflow and LPE in file2strvec CVE-2018-1124
- library: Use size_t for alloc functions CVE-2018-1126
- library: Increase comm size to 64
- pgrep: Fix stack-based buffer overflow CVE-2018-1125
- pgrep: Remove >15 warning as comm can be longer
- ps: Fix buffer overflow in output buffer, causing DOS CVE-2018-1123
- ps: Increase command name selection field to 64
- top: Don't use cwd for location of config CVE-2018-1122
- update translations
- library: build on non-glibc systems
- free: fix scaling on 32-bit systems
- Revert 'Support running with child namespaces'
- library: Increment to 7:0:1
No changes, no removals
New fuctions: numa_init, numa_max_node, numa_node_of_cpu, numa_uninit, xalloc_err_handler
- doc: Document I idle state in ps.1 and top.1
- free: fix some of the SI multiples
- kill: -l space between name parses correctly
- library: dont use vm_min_free on non Linux
- library: don't strip off wchan prefixes (ps & top)
- pgrep: warn about 15+ char name only if -f not used
- pgrep/pkill: only match in same namespace by default
- pidof: specify separator between pids
- pkill: Return 0 only if we can kill process
- pmap: fix duplicate output line under '-x' option
- ps: avoid eip/esp address truncations
- ps: recognizes SCHED_DEADLINE as valid CPU scheduler
- ps: display NUMA node under which a thread ran
- ps: Add seconds display for cputime and time
- ps: Add LUID field
- sysctl: Permit empty string for value
- sysctl: Don't segv when file not available
- sysctl: Read and write large buffers
- top: add config file support for XDG specification
- top: eliminated minor libnuma memory leak
- top: show fewer memory decimal places (configurable)
- top: provide command line switch for memory scaling
- top: provide command line switch for CPU States
- top: provides more accurate cpu usage at startup
- top: display NUMA node under which a thread ran
- top: fix argument parsing quirk resulting in SEGV
- top: delay interval accepts non-locale radix point
- top: address a wishlist man page NLS suggestion
- top: fix potential distortion in 'Mem' graph display
- top: provide proper multi-byte string handling
- top: startup defaults are fully customizable
- watch: define HOST_NAME_MAX where not defined
- vmstat: Fix alignment for disk partition format
- watch: Support ANSI 39,49 reset sequences
| Advisory ID | SUSE-RU-2019:2742-1
|
| Released | Tue Oct 22 15:40:16 2019 |
| Summary | Recommended update for libzypp, zypper, libsolv and PackageKit |
| Type | recommended |
| Severity | important |
| References | 1049825,1116995,1120629,1120630,1120631,1127155,1127608,1130306,1131113,1131823,1134226,1135749,1137977,1139795,1140039,1145521,1146027,1146415,1146947,1153557,859480,CVE-2018-20532,CVE-2018-20533,CVE-2018-20534 |
Description:
This update for libzypp, zypper, libsolv and PackageKit fixes the following issues:
Security issues fixed in libsolv:
- CVE-2018-20532: Fixed NULL pointer dereference at ext/testcase.c (function testcase_read) (bsc#1120629).
- CVE-2018-20533: Fixed NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a (bsc#1120630).
- CVE-2018-20534: Fixed illegal address access at src/pool.h (function pool_whatprovides) in libsolv.a (bsc#1120631).
Other issues addressed in libsolv:
- Fixed an issue where libsolv failed to build against swig 4.0 by updating the version to 0.7.5 (bsc#1135749).
- Fixed an issue with the package name (bsc#1131823).
- repo_add_rpmdb: do not copy bad solvables from the old solv file
- Fixed an issue with cleandeps updates in which all packages were not updated
- Experimental DISTTYPE_CONDA and REL_CONDA support
- Fixed cleandeps jobs when using patterns (bsc#1137977)
- Fixed favorq leaking between solver runs if the solver is reused
- Fixed SOLVER_FLAG_FOCUS_BEST updateing packages without reason
- Be more correct with multiversion packages that obsolete their own name (bnc#1127155)
- Fix repository priority handling for multiversion packages
- Make code compatible with swig 4.0, remove obj0 instances
- repo2solv: support zchunk compressed data
- Remove NO_BRP_STRIP_DEBUG=true as brp-15-strip-debug will
not strip debug info for archives
Issues fixed in libzypp:
- Fix empty metalink downloads if filesize is unknown (bsc#1153557)
- Recognize riscv64 as architecture
- Fix installation of new header file (fixes #185)
- zypp.conf: Introduce `solver.focus` to define the resolvers general
attitude when resolving jobs. (bsc#1146415)
- New container detection algorithm for zypper ps (bsc#1146947)
- Fix leaking filedescriptors in MediaCurl. (bsc#1116995)
- Run file conflict check on dry-run. (bsc#1140039)
- Do not remove orphan products if the .prod file is owned by
a package. (bsc#1139795)
- Rephrase file conflict check summary. (bsc#1140039)
- Fix bash completions option detection. (bsc#1049825)
- Fixes a bug where zypper exited on SIGPIPE when downloading packages (bsc#1145521)
- Fixes an issue where zypper exited with a segmentation fault when updating via YaST2 (bsc#1146027)
- PublicKey::algoName: supply key algorithm and length
Issues fixed in zypper:
- Update to version 1.14.30
- Ignore SIGPIPE while STDOUT/STDERR are OK (bsc#1145521)
- Dump stacktrace on SIGPIPE (bsc#1145521)
- info: The requested info must be shown in QUIET mode (fixes #287)
- Fix local/remote url classification.
- Rephrase file conflict check summary (bsc#1140039)
- Fix bash completions option detection (bsc#1049825)
- man: split '--with[out]' like options to ease searching.
- Unhided 'ps' command in help
- Added option to show more conflict information
- Rephrased `zypper ps` hint (bsc#859480)
- Fixed repo refresh not returning 106-ZYPPER_EXIT_INF_REPOS_SKIPPED
if --root is used (bsc#1134226)
- Fixed unknown package handling in zypper install (bsc#1127608)
- Re-show progress bar after pressing retry upon install error (bsc#1131113)
Issues fixed in PackageKit:
- Port the cron configuration variables to the systemd timer script, and add -sendwait
parameter to mail in the script(bsc#1130306).
| Advisory ID | SUSE-SU-2019:2757-1
|
| Released | Wed Oct 23 17:21:17 2019 |
| Summary | Security update for lz4 |
| Type | security |
| Severity | moderate |
| References | 1153936,CVE-2019-17543 |
Description:
This update for lz4 fixes the following issues:
- CVE-2019-17543: Fixed a heap-based buffer overflow in LZ4_write32 (bsc#1153936).
| Advisory ID | SUSE-RU-2019:2812-1
|
| Released | Tue Oct 29 14:57:55 2019 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1139459,1140631,1145023,1150595,SLE-7687 |
Description:
This update for systemd provides the following fixes:
- Fix a problem that would cause invoking try-restart to an inactive service to hang when
a daemon-reload is invoked before the try-restart returned. (bsc#1139459)
- man: Add a note about _netdev usage.
- units: Replace remote-cryptsetup-pre.target with remote-fs-pre.target.
- units: Add [Install] section to remote-cryptsetup.target.
- cryptsetup: Ignore _netdev, since it is used in generator.
- cryptsetup-generator: Use remote-cryptsetup.target when _netdev is present. (jsc#SLE-7687)
- cryptsetup-generator: Add a helper utility to create symlinks.
- units: Add remote-cryptsetup.target and remote-cryptsetup-pre.target.
- man: Add an explicit description of _netdev to systemd.mount(5).
- man: Order fields alphabetically in crypttab(5).
- man: Make crypttab(5) a bit easier to read.
- units: Order cryptsetup-pre.target before cryptsetup.target.
- Fix reporting of enabled-runtime units.
- sd-bus: Deal with cookie overruns. (bsc#1150595)
- rules: Add by-id symlinks for persistent memory. (bsc#1140631)
- Buildrequire polkit so /usr/share/polkit-1/rules.d subdir can be only owned by polkit.
(bsc#1145023)
| Advisory ID | SUSE-RU-2019:2870-1
|
| Released | Thu Oct 31 08:09:14 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1051143,1138869,1151023 |
Description:
This update for aaa_base provides the following fixes:
- Check if variables can be set before modifying them to avoid warnings on login with a
restricted shell. (bsc#1138869)
- Add s390x compressed kernel support. (bsc#1151023)
- service: Check if there is a second argument before using it. (bsc#1051143)
| Advisory ID | SUSE-RU-2019:2418-1
|
| Released | Thu Nov 14 11:53:03 2019 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | moderate |
| References | 1133773,1143055 |
Description:
This update for bash fixes the following issues:
- Rework patch readline-7.0-screen (bsc#1143055):
map all 'screen(-xxx)?.yyy(-zzz)?' to 'screen' as well as
map 'konsole(-xxx)?' and 'gnome(-xxx)?' to 'xterm'
- Add a backport from bash 5.0 to perform better with large numbers of sub processes. (bsc#1133773)
| Advisory ID | SUSE-OU-2019:2980-1
|
| Released | Thu Nov 14 22:45:33 2019 |
| Summary | Optional update for curl |
| Type | optional |
| Severity | low |
| References | 1154019 |
Description:
This update for curl doesn't address any user visible issues.
| Advisory ID | SUSE-SU-2019:2997-1
|
| Released | Mon Nov 18 15:16:38 2019 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1103320,1154036,1154037,CVE-2019-17594,CVE-2019-17595 |
Description:
This update for ncurses fixes the following issues:
Security issues fixed:
- CVE-2019-17594: Fixed a heap-based buffer over-read in the _nc_find_entry function (bsc#1154036).
- CVE-2019-17595: Fixed a heap-based buffer over-read in the fmt_entry function (bsc#1154037).
Non-security issue fixed:
- Removed screen.xterm from terminfo database (bsc#1103320).
| Advisory ID | SUSE-RU-2019:3010-1
|
| Released | Tue Nov 19 18:10:58 2019 |
| Summary | Recommended update for zypper and libsolv |
| Type | recommended |
| Severity | moderate |
| References | 1145554,1146415,1149511,1153351,SLE-9171 |
Description:
This update for zypper and libsolv fixes the following issues:
Package: zypper
- Improved the documentation of $releasever and --releasever usescases (bsc#1149511)
- zypper will now ask only once when multiple packages share the same license text (bsc#1145554)
- Added a new 'solver.focus' option for /etc/zypp/zypp.conf to define systemwide focus
mode when resolving jobs (bsc#1146415)
- Fixes an issue where 'zypper lu' didn't list all available package updates (bsc#1153351)
- Added a new --repo option to the 'download' command to allow to specify a repository (jsc#SLE-9171)
Package: libsolv
- Fixes issues when updating too many packages in focusbest mode
- Fixes the handling of disabled and installed packages in distupgrade
| Advisory ID | SUSE-SU-2019:3059-1
|
| Released | Mon Nov 25 17:33:07 2019 |
| Summary | Security update for cpio |
| Type | security |
| Severity | moderate |
| References | 1155199,CVE-2019-14866 |
Description:
This update for cpio fixes the following issues:
- CVE-2019-14866: Fixed an improper validation of the values written
in the header of a TAR file through the to_oct() function which could
have led to unexpected TAR generation (bsc#1155199).
| Advisory ID | SUSE-SU-2019:3061-1
|
| Released | Mon Nov 25 17:34:22 2019 |
| Summary | Security update for gcc9 |
| Type | security |
| Severity | moderate |
| References | 1114592,1135254,1141897,1142649,1142654,1148517,1149145,CVE-2019-14250,CVE-2019-15847,SLE-6533,SLE-6536 |
Description:
This update includes the GNU Compiler Collection 9.
A full changelog is provided by the GCC team on:
https://www.gnu.org/software/gcc/gcc-9/changes.html
The base system compiler libraries libgcc_s1, libstdc++6 and others are
now built by the gcc 9 packages.
To use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 /
CXX=g++-9 during configuration for using it.
Security issues fixed:
- CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)
- CVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)
Non-security issues fixed:
- Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime. (bsc#1135254)
- Fixed miscompilation for vector shift on s390. (bsc#1141897)
| Advisory ID | SUSE-RU-2019:3070-1
|
| Released | Tue Nov 26 12:39:29 2019 |
| Summary | Recommended update for gpg2 |
| Type | recommended |
| Severity | low |
| References | 1152755 |
Description:
This update for gpg2 provides the following fix:
- Remove a build requirement on self. This is causing Leap 15.2 bootstrap to fail. (bsc#1152755)
| Advisory ID | SUSE-SU-2019:3086-1
|
| Released | Thu Nov 28 10:02:24 2019 |
| Summary | Security update for libidn2 |
| Type | security |
| Severity | moderate |
| References | 1154884,1154887,CVE-2019-12290,CVE-2019-18224 |
Description:
This update for libidn2 to version 2.2.0 fixes the following issues:
- CVE-2019-12290: Fixed an improper round-trip check when converting A-labels to U-labels (bsc#1154884).
- CVE-2019-18224: Fixed a heap-based buffer overflow that was caused by long domain strings (bsc#1154887).
| Advisory ID | SUSE-SU-2019:3087-1
|
| Released | Thu Nov 28 10:03:00 2019 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | low |
| References | 1123919 |
Description:
This update for libxml2 doesn't fix any additional security issues, but correct its rpm changelog to reflect
all CVEs that have been fixed over the past.
| Advisory ID | SUSE-RU-2019:3118-1
|
| Released | Fri Nov 29 14:41:35 2019 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 1154295 |
Description:
This update for e2fsprogs fixes the following issues:
- Make minimum size estimates more reliable for mounted filesystem. (bsc#1154295)
| Advisory ID | SUSE-RU-2019:3166-1
|
| Released | Wed Dec 4 11:24:42 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1007715,1084934,1157278 |
Description:
This update for aaa_base fixes the following issues:
- Use official key binding functions in inputrc that is replace up-history with previous-history, down-history with next-history and backward-delete-word with backward-kill-word. (bsc#1084934)
- Add some missed key escape sequences for urxvt-unicode terminal as well. (bsc#1007715)
- Clear broken ghost entry in patch which breaks 'readline'. (bsc#1157278)
| Advisory ID | SUSE-SU-2019:3181-1
|
| Released | Thu Dec 5 11:43:07 2019 |
| Summary | Security update for permissions |
| Type | security |
| Severity | moderate |
| References | 1093414,1150734,1157198,CVE-2019-3688,CVE-2019-3690 |
Description:
This update for permissions fixes the following issues:
- CVE-2019-3688: Changed wrong ownership in /usr/sbin/pinger to root:squid
which could have allowed a squid user to gain persistence by changing the
binary (bsc#1093414).
- CVE-2019-3690: Fixed a privilege escalation through untrusted symbolic
links (bsc#1150734).
- Fixed a regression which caused sagmentation fault (bsc#1157198).
| Advisory ID | SUSE-RU-2019:3240-1
|
| Released | Tue Dec 10 10:40:19 2019 |
| Summary | Recommended update for ca-certificates-mozilla, p11-kit |
| Type | recommended |
| Severity | moderate |
| References | 1154871 |
Description:
This update for ca-certificates-mozilla, p11-kit fixes the following issues:
Changes in ca-certificates-mozilla:
- export correct p11kit trust attributes so Firefox detects built in
certificates (bsc#1154871).
Changes in p11-kit:
- support loading NSS attribute CKA_NSS_MOZILLA_CA_POLICY so Firefox
detects built in certificates (bsc#1154871)
| Advisory ID | SUSE-SU-2019:3267-1
|
| Released | Wed Dec 11 11:19:53 2019 |
| Summary | Security update for libssh |
| Type | security |
| Severity | important |
| References | 1158095,CVE-2019-14889 |
Description:
This update for libssh fixes the following issues:
- CVE-2019-14889: Fixed an arbitrary command execution (bsc#1158095).
| Advisory ID | SUSE-SU-2019:3392-1
|
| Released | Fri Dec 27 13:33:29 2019 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1148987,1155338,1155339,CVE-2019-13627 |
Description:
This update for libgcrypt fixes the following issues:
Security issues fixed:
- CVE-2019-13627: Mitigation against an ECDSA timing attack (bsc#1148987).
Bug fixes:
- Added CMAC AES self test (bsc#1155339).
- Added CMAC TDES self test missing (bsc#1155338).
- Fix test dsa-rfc6979 in FIPS mode.
| Advisory ID | SUSE-SU-2020:69-1
|
| Released | Fri Jan 10 12:33:59 2020 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1155346,1157775,1158101,1158809,CVE-2019-1551,SLE-8789 |
Description:
This update for openssl-1_1 fixes the following issues:
Security issue fixed:
- CVE-2019-1551: Fixed an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (bsc#1158809).
Various FIPS related improvements were done:
- FIPS: Backport SSH KDF to openssl (jsc#SLE-8789, bsc#1157775).
- Port FIPS patches from SLE-12 (bsc#1158101).
- Use SHA-2 in the RSA pairwise consistency check (bsc#1155346).
| Advisory ID | SUSE-feature-2020:89-1
|
| Released | Mon Jan 13 16:07:20 2020 |
| Summary | Update to kubernetes 1.16, supportconfig update, and helm security fix (CVE-2019-18658) |
| Type | feature |
| Severity | moderate |
| References | 1100838,1118897,1118898,1118899,1143813,1144065,1146991,1147142,1152861,1155810,1156646 |
Description:
= Required Actions
== Skuba and helm update Instructions
Update skuba and helm on your management workstation as you would do with any othe package.
Refer to: link:https://documentation.suse.com/sles/15-SP1/single-html/SLES-admin/#sec-zypper-softup
[WARNING]
====
When running helm-init you may hit a link:https://bugzilla.suse.com/show_bug.cgi?id=1159047[known bug on the certificate validation]:
----
https://kubernetes-charts.storage.googleapis.com is not a valid chart repository or cannot be reached: Get https://kubernetes-charts.storage.googleapis.com/index.yaml: x509: certificate signed by unknown authority
----
In order to fix this, run:
----
sudo update-ca-certificates
----
====
After updating helm to latest version on the management host, you have to also upgrade the helm-tiller image in the cluster, by running:
----
helm init \
--tiller-image registry.suse.com/caasp/v4/helm-tiller:2.16.1 \
--service-account tiller --upgrade
----
== Update Your Kubernetes Manifests for Kubernetes 1.16.2:
Some API resources are moved to stable, while others have been moved to different groups or deprecated.
The following will impact your deployment manifests:
- `DaemonSet`, `Deployment`, `StatefulSet`, and `ReplicaSet` in `extensions/` (both `v1beta1` and `v1beta2`) is deprecated. Migrate to `apps/v1` group instead for all those objects. Please note that `kubectl convert` can help you migrate all the necessary fields.
- `PodSecurityPolicy` in `extensions/v1beta1` is deprecated. Migrate to `policy/v1beta1` group for `PodSecurityPolicy`. Please note that `kubectl convert` can help you migrate all the necessary fields.
- `NetworkPolicy` in `extensions/v1beta1` is deprecated. Migrate to `networking.k8s.io/v1` group for `NetworkPolicy`. Please note that `kubectl convert` can help you migrate all the necessary fields.
- `Ingress` in `extensions/v1beta1` is being phased out. Migrate to `networking.k8s.io/v1beta1` as soon as possible. This new API does not need to update other API fields and therefore only a path change is necessary.
- Custom resource definitions have moved from `apiextensions.k8s.io/v1beta1` to `apiextensions.k8s.io/v1`.
Please also see https://kubernetes.io/blog/2019/07/18/api-deprecations-in-1-16/ for more details.
= Documentation Updates
- Switched examples to use SUSE supported helm, Prometheus, nginx-ingress and Grafana charts and images
- link:{docurl}caasp-admin/single-html/_security.html#_deployment_with_a_custom_ca_certificate[Added instructions on how to replace {kube} certificates with custom CA certificate]
- link:{docurl}caasp-admin/single-html/_security.html#_replace_server_certificate_signed_by_a_trusted_ca_certificate[Added instructions to configure custom certificates for gangway and dex]
- link:{docurl}caasp-admin/single-html/_software_management.html#_installing_tiller[Added instructions for secured Tiller deployment]
- link:{docurl}caasp-deployment/single-html/#machine-id[Added notes about unique `machine-id` requirement]
- link:{docurl}caasp-deployment/single-html/#_autoyast_preparation[Added timezone configuration example for {ay}]
- link:https://github.com/SUSE/doc-caasp/pulls?q=is%3Apr+is%3Aclosed+sort%3Aupdated-desc[Various minor bugfixes and improvements]
= Known issue: skuba upgrade could not parse 'Unknown' as version ====
Running 'skuba node upgrade plan' might fail with the error 'could not parse 'Unknown' as version' when a worker, after running 'skuba node upgrade apply', had not fully started yet.
If you are running into this issue, please add some delay after running 'skuba node upgrade apply' and prior to running 'skuba node upgrade plan'.
This is tracked in link:https://bugzilla.suse.com/show_bug.cgi?id=1159452[bsc#1159452]
SUSE-CU-2019:701-1
| Container Advisory ID | SUSE-CU-2019:701-1 |
| Container Tags | caasp/v4/helm-tiller:2.14.2 , caasp/v4/helm-tiller:2.14.2-rev3 , caasp/v4/helm-tiller:2.14.2-rev3-build1.1 |
| Container Release | 1.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2019:2134-1
|
| Released | Wed Aug 14 11:54:56 2019 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1136717,1137624,1141059,SLE-5807 |
Description:
This update for zlib fixes the following issues:
- Update the s390 patchset. (bsc#1137624)
- Tweak zlib-power8 to have type of crc32_vpmsum conform to usage. (bsc#1141059)
- Use FAT LTO objects in order to provide proper static library.
- Do not enable the previous patchset on s390 but just s390x. (bsc#1137624)
- Add patchset for s390 improvements. (jsc#SLE-5807, bsc#1136717)
| Advisory ID | SUSE-RU-2019:2188-1
|
| Released | Wed Aug 21 10:10:29 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1140647 |
Description:
This update for aaa_base fixes the following issues:
- Make systemd detection cgroup oblivious. (bsc#1140647)
| Advisory ID | SUSE-RU-2019:2218-1
|
| Released | Mon Aug 26 11:29:57 2019 |
| Summary | Recommended update for pinentry |
| Type | recommended |
| Severity | moderate |
| References | 1141883 |
Description:
This update for pinentry fixes the following issues:
- Fix a dangling pointer in qt/main.cpp that caused crashes. (bsc#1141883)
SUSE-CU-2019:700-1
| Container Advisory ID | SUSE-CU-2019:700-1 |
| Container Tags | caasp/v4/helm-tiller:2.14.2 , caasp/v4/helm-tiller:2.14.2-rev2 , caasp/v4/helm-tiller:2.14.2-rev2-build1.6 , caasp/v4/helm-tiller:beta |
| Container Release | 1.6 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2019:2097-1
|
| Released | Fri Aug 9 09:31:17 2019 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | important |
| References | 1097073 |
Description:
This update for libgcrypt fixes the following issues:
- Fixed a regression where system were unable to boot in fips mode, caused by an
incomplete implementation of previous change (bsc#1097073).
SUSE-CU-2019:699-1
| Container Advisory ID | SUSE-CU-2019:699-1 |
| Container Tags | caasp/v4/helm-tiller:2.8.2 , caasp/v4/helm-tiller:2.8.2-rev2 , caasp/v4/helm-tiller:2.8.2-rev2-build1.1 , caasp/v4/helm-tiller:beta |
| Container Release | 1.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2019:1631-1
|
| Released | Fri Jun 21 11:17:21 2019 |
| Summary | Recommended update for xz |
| Type | recommended |
| Severity | low |
| References | 1135709 |
Description:
This update for xz fixes the following issues:
Add SUSE-Public-Domain licence as some parts of xz utils (liblzma,
xz, xzdec, lzmadec, documentation, translated messages, tests,
debug, extra directory) are in public domain licence [bsc#1135709]
| Advisory ID | SUSE-RU-2019:1635-1
|
| Released | Fri Jun 21 12:45:53 2019 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1134217 |
Description:
This update for krb5 provides the following fix:
- Move LDAP schema files from /usr/share/doc/packages/krb5 to /usr/share/kerberos/ldap.
(bsc#1134217)
| Advisory ID | SUSE-RU-2019:1700-1
|
| Released | Tue Jun 25 13:19:21 2019 |
| Summary | Security update for libssh |
| Type | recommended |
| Severity | moderate |
| References | 1134193 |
Description:
This update for libssh fixes the following issue:
Issue addressed:
- Added support for new AES-GCM encryption types (bsc#1134193).
| Advisory ID | SUSE-RU-2019:1808-1
|
| Released | Wed Jul 10 13:16:29 2019 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1133808 |
Description:
This update for libgcrypt fixes the following issues:
- Fixed redundant fips tests in some situations causing sudo to stop
working when pam-kwallet is installed. bsc#1133808
| Advisory ID | SUSE-SU-2019:1846-1
|
| Released | Mon Jul 15 11:36:33 2019 |
| Summary | Security update for bzip2 |
| Type | security |
| Severity | important |
| References | 1139083,CVE-2019-12900 |
Description:
This update for bzip2 fixes the following issues:
Security issue fixed:
- CVE-2019-12900: Fixed an out-of-bounds write in decompress.c with many selectors (bsc#1139083).
| Advisory ID | SUSE-RU-2019:1853-1
|
| Released | Mon Jul 15 16:03:36 2019 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1107617,1137053 |
Description:
This update for systemd fixes the following issues:
- conf-parse: remove 4K line length limit (bsc#1137053)
- udevd: change the default value of udev.children-max (again) (bsc#1107617)
- meson: stop creating enablement symlinks in /etc during installation (sequel)
- Fixed build for openSUSE Leap 15+
- Make sure we don't ship any static enablement symlinks in /etc
Those symlinks must only be created by the presets. There are no
changes in practice since systemd/udev doesn't ship such symlinks in
/etc but let's make sure no future changes will introduce new ones
by mistake.
| Advisory ID | SUSE-SU-2019:1877-1
|
| Released | Thu Jul 18 11:31:46 2019 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1117993,1123710,1127223,1127308,1131330,CVE-2009-5155,CVE-2019-9169 |
Description:
This update for glibc fixes the following issues:
Security issues fixed:
- CVE-2019-9169: Fixed a heap-based buffer over-read via an attempted case-insensitive regular-expression match (bsc#1127308).
- CVE-2009-5155: Fixed a denial of service in parse_reg_exp() (bsc#1127223).
Non-security issues fixed:
- Does no longer compress debug sections in crt*.o files (bsc#1123710)
- Fixes a concurrency problem in ldconfig (bsc#1117993)
- Fixes a race condition in pthread_mutex_lock while promoting to PTHREAD_MUTEX_ELISION_NP (bsc#1131330)
| Advisory ID | SUSE-SU-2019:1971-1
|
| Released | Thu Jul 25 14:58:52 2019 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1138939,CVE-2019-12904 |
Description:
This update for libgcrypt fixes the following issues:
Security issue fixed:
- CVE-2019-12904: Fixed a flush-and-reload side-channel attack in the AES implementation (bsc#1138939).
| Advisory ID | SUSE-RU-2019:1994-1
|
| Released | Fri Jul 26 16:12:05 2019 |
| Summary | Recommended update for libxml2 |
| Type | recommended |
| Severity | moderate |
| References | 1135123 |
Description:
This update for libxml2 fixes the following issues:
- Added a new configurable variable XPATH_DEFAULT_MAX_NODESET_LENGTH to avoid nodeset limit when processing large XML files. (bsc#1135123)
| Advisory ID | SUSE-SU-2019:2004-1
|
| Released | Mon Jul 29 13:01:59 2019 |
| Summary | Security update for bzip2 |
| Type | security |
| Severity | important |
| References | 1139083,CVE-2019-12900 |
Description:
This update for bzip2 fixes the following issues:
- Fixed a regression with the fix for CVE-2019-12900, which caused incompatibilities
with files that used many selectors (bsc#1139083).
| Advisory ID | SUSE-SU-2019:2006-1
|
| Released | Mon Jul 29 13:02:49 2019 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | important |
| References | 1124847,1141093,CVE-2019-13050 |
Description:
This update for gpg2 fixes the following issues:
Security issue fixed:
- CVE-2019-13050: Fixed a denial of service attacks via big keys (bsc#1141093).
Non-security issue fixed:
- Allow coredumps in X11 desktop sessions (bsc#1124847)
SUSE-CU-2019:698-1
| Container Advisory ID | SUSE-CU-2019:698-1 |
| Container Tags | caasp/v4/helm-tiller:2.8.2 , caasp/v4/helm-tiller:2.8.2-rev1 , caasp/v4/helm-tiller:2.8.2-rev1-build2.1 , caasp/v4/helm-tiller:beta |
| Container Release | 2.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2019:1590-1
|
| Released | Thu Jun 20 19:49:57 2019 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1128598 |
Description:
This update for permissions fixes the following issues:
- Added whitelisting for /usr/lib/singularity/bin/starter-suid in the new singularity 3.1 version. (bsc#1128598)
SUSE-CU-2019:697-1
| Container Advisory ID | SUSE-CU-2019:697-1 |
| Container Tags | caasp/v4/helm-tiller:2.8.2 , caasp/v4/helm-tiller:2.8.2-rev1 , caasp/v4/helm-tiller:2.8.2-rev1-build1.1 , caasp/v4/helm-tiller:beta |
| Container Release | 1.1 |
The following patches have been included in this update:
| Advisory ID | SUSE-SU-2018:1223-1
|
| Released | Tue Jun 26 11:41:00 2018 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | important |
| References | 1096745,CVE-2018-12020 |
Description:
This update for gpg2 fixes the following security issue:
- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
verification actions, which allowed remote attackers to spoof the output that
GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
option (bsc#1096745).
| Advisory ID | SUSE-RU-2018:1264-1
|
| Released | Tue Jul 3 10:56:12 2018 |
| Summary | Recommended update for curl |
| Type | recommended |
| Severity | moderate |
| References | 1086367 |
Description:
This update for curl provides the following fix:
- Use OPENSSL_config() instead of CONF_modules_load_file() to avoid crashes due to conflicting
openssl engines. (bsc#1086367)
| Advisory ID | SUSE-SU-2018:1327-1
|
| Released | Tue Jul 17 08:07:24 2018 |
| Summary | Security update for perl |
| Type | security |
| Severity | moderate |
| References | 1096718,CVE-2018-12015 |
Description:
This update for perl fixes the following issues:
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
directory-traversal protection mechanism and overwrite arbitrary files
(bsc#1096718)
| Advisory ID | SUSE-SU-2018:1346-1
|
| Released | Thu Jul 19 09:25:08 2018 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1082318,1092877,1094150,1094154,1094161,CVE-2017-18269,CVE-2018-11236,CVE-2018-11237 |
Description:
This update for glibc fixes the following security issues:
- CVE-2017-18269: An SSE2-optimized memmove implementation for i386 did not
correctly perform the overlapping memory check if the source memory range
spaned the middle of the address space, resulting in corrupt data being
produced by the copy operation. This may have disclosed information to
context-dependent attackers, resulted in a denial of service or code execution
(bsc#1094150).
- CVE-2018-11236: Prevent integer overflow on 32-bit architectures when
processing very long pathname arguments to the realpath function, leading to a
stack-based buffer overflow (bsc#1094161).
- CVE-2018-11237: An AVX-512-optimized implementation of the mempcpy function
may have writen data beyond the target buffer, leading to a buffer overflow in
__mempcpy_avx512_no_vzeroupper (bsc#1092877, bsc#1094154).
| Advisory ID | SUSE-SU-2018:1353-1
|
| Released | Thu Jul 19 09:50:32 2018 |
| Summary | Security update for e2fsprogs |
| Type | security |
| Severity | moderate |
| References | 1009532,1038194,915402,918346,960273,CVE-2015-0247,CVE-2015-1572 |
Description:
This update for e2fsprogs fixes the following issues:
Security issues fixed:
- CVE-2015-0247: Fixed couple of heap overflows in e2fsprogs (fsck, dumpe2fs, e2image...) (bsc#915402).
- CVE-2015-1572: Fixed potential buffer overflow in closefs() (bsc#918346).
Bug fixes:
- bsc#1038194: generic/405 test fails with /dev/mapper/thin-vol is inconsistent on ext4 file system.
- bsc#1009532: resize2fs hangs when trying to resize a large ext4 file system.
- bsc#960273: xfsprogs does not call %{?regenerate_initrd_post}.
| Advisory ID | SUSE-RU-2018:1362-1
|
| Released | Thu Jul 19 12:47:33 2018 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1100415 |
Description:
ca-certificates-mozilla was updated to the 2.24 state of the Mozilla NSS Certificate store. (bsc#1100415)
Following CAs were removed:
- S-TRUST_Universal_Root_CA
- TC_TrustCenter_Class_3_CA_II
- TUeRKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_H5
| Advisory ID | SUSE-SU-2018:1396-1
|
| Released | Thu Jul 26 16:23:09 2018 |
| Summary | Security update for rpm |
| Type | security |
| Severity | moderate |
| References | 1094735,1095148,943457,CVE-2017-7500 |
Description:
This update for rpm fixes the following issues:
This security vulnerability was fixed:
- CVE-2017-7500: Fixed symlink attacks during RPM installation (bsc#943457)
| Advisory ID | SUSE-RU-2018:1409-1
|
| Released | Fri Jul 27 06:45:10 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1039099,1083158,1088052,1091265,1093851,1095096,1095973,1098569 |
Description:
This update for systemd provides the following fixes:
- systemctl: Mask always reports the same unit names when different unknown units are passed. (bsc#1095973)
- systemctl: Check the existence of all units, not just the first one.
- scsi_id: Fix the prefix for pre-SPC inquiry reply. (bsc#1039099)
- device: Make sure to always retroactively start device dependencies. (bsc#1088052)
- locale-util: On overlayfs FTW_MOUNT causes nftw(3) to not list *any* files.
- Fix pattern to detect distribution.
- install: The 'user' and 'global' scopes are equivalent for user presets. (bsc#1093851)
- install: Search for preset files in /run (#7715)
- install: Consider globally enabled units as 'enabled' for the user. (bsc#1093851)
- install: Consider non-Alias=/non-DefaultInstance= symlinks as 'indirect' enablement.
- install: Only consider names in Alias= as 'enabling'.
- udev: Whitelist mlx4_core locally-administered MAC addresses in the persistent rule
generator. (bsc#1083158)
- man: Updated systemd-analyze blame description for service-units with Type=simple.
(bsc#1091265)
- fileio: Support writing atomic files with timestamp.
- fileio.c: Fix incorrect mtime
- Drop runtime dependency on dracut, otherwise systemd pulls in tools to generate the
initrd even in container/chroot installations that don't have a kernel. For environments
where initrd matters, dracut should be pulled via a pattern. (bsc#1098569)
- An update broke booting with encrypted partitions on NVMe (bsc#1095096)
| Advisory ID | SUSE-SU-2018:1685-1
|
| Released | Fri Aug 17 18:20:58 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1099793,CVE-2018-0500 |
Description:
This update for curl fixes the following issues:
Security issue fixed:
- CVE-2018-0500: Fix a SMTP send heap buffer overflow (bsc#1099793).
| Advisory ID | SUSE-RU-2018:1754-1
|
| Released | Fri Aug 24 16:40:21 2018 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1104780 |
Description:
This update for ca-certificates-mozilla fixes the following issues:
Updated to the 2.26 state of the Mozilla NSS Certificate store. (bsc#1104780)
- removed server auth rights from following CAs:
- Certplus Root CA G1
- Certplus Root CA G2
- OpenTrust Root CA G1
- OpenTrust Root CA G2
- OpenTrust Root CA G3
- ComSign CA
- GlobalSign
| Advisory ID | SUSE-RU-2018:1760-1
|
| Released | Fri Aug 24 17:14:53 2018 |
| Summary | Recommended update for libtirpc |
| Type | recommended |
| Severity | moderate |
| References | 1072183 |
Description:
This update for libtirpc fixes the following issues:
- rpcinfo: send RPC getport call as specified via parameter (bsc#1072183)
| Advisory ID | SUSE-SU-2018:1904-1
|
| Released | Fri Sep 14 12:46:39 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1086367,1106019,CVE-2018-14618 |
Description:
This update for curl fixes the following issues:
This security issue was fixed:
- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code
(bsc#1106019)
This non-security issue was fixed:
- Use OPENSSL_config instead of CONF_modules_load_file() to avoid crashes due
to openssl engines conflicts (bsc#1086367)
| Advisory ID | SUSE-RU-2018:1999-1
|
| Released | Tue Sep 25 08:20:35 2018 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1071321 |
Description:
This update for zlib provides the following fixes:
- Speedup zlib on power8. (fate#325307)
- Add safeguard against negative values in uInt. (bsc#1071321)
| Advisory ID | SUSE-RU-2018:2055-1
|
| Released | Thu Sep 27 14:30:14 2018 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1089640 |
Description:
This update for openldap2 provides the following fix:
- Fix slapd segfaults in mdb_env_reader_dest. (bsc#1089640)
| Advisory ID | SUSE-SU-2018:2070-1
|
| Released | Fri Sep 28 08:02:02 2018 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | moderate |
| References | 1047002,1105437,1105459,1105460,CVE-2017-10790,CVE-2018-10844,CVE-2018-10845,CVE-2018-10846 |
Description:
This update for gnutls fixes the following security issues:
- Improved mitigations against Lucky 13 class of attacks
- CVE-2018-10846: 'Just in Time' PRIME + PROBE cache-based side channel attack
can lead to plaintext recovery (bsc#1105460)
- CVE-2018-10845: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use
of wrong constant (bsc#1105459)
- CVE-2018-10844: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not
enough dummy function calls (bsc#1105437)
- CVE-2017-10790: The _asn1_check_identifier function in Libtasn1 caused a NULL
pointer dereference and crash (bsc#1047002)
| Advisory ID | SUSE-SU-2018:2083-1
|
| Released | Sun Sep 30 14:06:33 2018 |
| Summary | Security update for openssl-1_1 |
| Type | security |
| Severity | moderate |
| References | 1097158,1101470,CVE-2018-0732 |
Description:
This update for openssl-1_1 to 1.1.0i fixes the following issues:
These security issues were fixed:
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
ciphersuite a malicious server could have sent a very large prime value to the
client. This caused the client to spend an unreasonably long period of time
generating a key for this prime resulting in a hang until the client has
finished. This could be exploited in a Denial Of Service attack (bsc#1097158)
- Make problematic ECDSA sign addition length-invariant
- Add blinding to ECDSA and DSA signatures to protect against side channel attacks
These non-security issues were fixed:
- When unlocking a pass phrase protected PEM file or PKCS#8 container, we now
allow empty (zero character) pass phrases.
- Certificate time validation (X509_cmp_time) enforces stricter compliance with
RFC 5280. Fractional seconds and timezone offsets are no longer allowed.
- Fixed a text canonicalisation bug in CMS
- Add openssl(cli) Provide so the packages that require the openssl binary can
require this instead of the new openssl meta package (bsc#1101470)
| Advisory ID | SUSE-RU-2018:2155-1
|
| Released | Fri Oct 5 14:41:17 2018 |
| Summary | Recommended update for ca-certificates |
| Type | recommended |
| Severity | moderate |
| References | 1101470 |
Description:
This update for ca-certificates fixes the following issues:
- Changed 'openssl' requirement to 'openssl(cli)' (bsc#1101470)
| Advisory ID | SUSE-RU-2018:2177-1
|
| Released | Tue Oct 9 09:00:13 2018 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | moderate |
| References | 1095661,1095670,1100488 |
Description:
This update for bash provides the following fixes:
- Bugfix: Parse settings in inputrc for all screen TERM variables
starting with 'screen.' (bsc#1095661)
- Make the generation of bash.html reproducible. (bsc#1100488)
- Use initgroups(3) instead of setgroups(2) to fix the usage of suid programs. (bsc#1095670)
- Fix a problem that could cause hash table bash uses to store exit statuses from
asynchronous processes to develop loops in circumstances involving long-running scripts
that create and reap many processes.
- Fix a problem that could cause the shell to loop if a SIGINT is received inside of a
SIGINT trap handler.
- Fix cases where a failing readline command (e.g., delete-char at the end of a line) can
cause a multi-character key sequence to 'back up' and attempt to re-read some of the
characters in the sequence.
- Fix a problem when sourcing a file from an interactive shell, that setting the SIGINT
handler to the default and typing ^C would cause the shell to exit.
| Advisory ID | SUSE-SU-2018:2182-1
|
| Released | Tue Oct 9 11:08:36 2018 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1088279,1102046,1105166,CVE-2018-14404,CVE-2018-14567,CVE-2018-9251 |
Description:
This update for libxml2 fixes the following security issues:
- CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a
denial of service (infinite loop) via a crafted XML file that triggers
LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279)
- CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML
file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint
(bsc#1105166)
- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
function when parsing an invalid XPath expression in the XPATH_OP_AND or
XPATH_OP_OR case leading to a denial of service attack (bsc#1102046)
| Advisory ID | SUSE-RU-2018:2370-1
|
| Released | Mon Oct 22 14:02:01 2018 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1102310,1104531 |
Description:
This update for aaa_base provides the following fixes:
- Let bash.bashrc work even for (m)ksh. (bsc#1104531)
- Fix an error at login if java system directory is empty. (bsc#1102310)
| Advisory ID | SUSE-RU-2018:2487-1
|
| Released | Fri Oct 26 12:39:07 2018 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1102526 |
Description:
This update for glibc fixes the following issues:
- Fix build on aarch64 with binutils newer than 2.30.
- Fix year 2039 bug for localtime with 64-bit time_t (bsc#1102526)
| Advisory ID | SUSE-RU-2018:2539-1
|
| Released | Tue Oct 30 16:17:23 2018 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | 1113100 |
Description:
This update for rpm fixes the following issues:
- On PowerPC64 fix the superfluous TOC. dependency (bsc#1113100)
| Advisory ID | SUSE-RU-2018:2569-1
|
| Released | Fri Nov 2 19:00:18 2018 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | moderate |
| References | 1110700 |
Description:
This update for pam fixes the following issues:
- Remove limits for nproc from /etc/security/limits.conf (bsc#1110700)
| Advisory ID | SUSE-SU-2018:2578-1
|
| Released | Mon Nov 5 17:55:35 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1112758,1113660,CVE-2018-16839,CVE-2018-16840,CVE-2018-16842 |
Description:
This update for curl fixes the following issues:
- CVE-2018-16839: A SASL password overflow via integer overflow was fixed which could lead to crashes (bsc#1112758)
- CVE-2018-16840: A use-after-free in SASL handle close was fixed which could lead to crashes (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)
| Advisory ID | SUSE-SU-2018:2595-1
|
| Released | Wed Nov 7 11:14:42 2018 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1089761,1090944,1091677,1093753,1101040,1102908,1105031,1107640,1107941,1109197,1109252,1110445,1112024,1113083,1113632,1113665,1114135,991901,CVE-2018-15686,CVE-2018-15688 |
Description:
This update for systemd fixes the following issues:
Security issues fixed:
- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)
Non security issues fixed:
- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- core: introduce systemd.early_core_pattern= kernel cmdline option
- core: add missing 'continue' statement
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- detect-virt: do not try to read all of /proc/cpuinfo (bsc#1109197)
- emergency: make sure console password agents don't interfere with the emergency shell
- man: document that 'nofail' also has an effect on ordering
- journald: take leading spaces into account in syslog_parse_identifier
- journal: do not remove multiple spaces after identifier in syslog message
- syslog: fix segfault in syslog_parse_priority()
- journal: fix syslog_parse_identifier()
- install: drop left-over debug message (#6913)
- Ship systemd-sysv-install helper via the main package
This script was part of systemd-sysvinit sub-package but it was
wrong since systemd-sysv-install is a script used to redirect
enable/disable operations to chkconfig when the unit targets are
sysv init scripts. Therefore it's never been a SySV init tool.
- Add udev.no-partlabel-links kernel command-line option. This option can be used to disable
the generation of the by-partlabel symlinks regardless of the name used. (bsc#1089761)
- man: SystemMaxUse= clarification in journald.conf(5). (bsc#1101040)
- systemctl: load unit if needed in 'systemctl is-active' (bsc#1102908)
- core: don't freeze OnCalendar= timer units when the clock goes back a lot (bsc#1090944)
- Enable or disable machines.target according to the presets (bsc#1107941)
- cryptsetup: add support for sector-size= option (fate#325697)
- nspawn: always use permission mode 555 for /sys (bsc#1107640)
- Bugfix for a race condition between daemon-reload and other commands (bsc#1105031)
- Fixes an issue where login with root credentials was not possible in init level 5 (bsc#1091677)
- Fix an issue where services of type 'notify' harmless DENIED log entries. (bsc#991901)
- Does no longer adjust qgroups on existing subvolumes (bsc#1093753)
- cryptsetup: add support for sector-size= option (#9936) (fate#325697 bsc#1114135)
| Advisory ID | SUSE-RU-2018:2607-1
|
| Released | Wed Nov 7 15:42:48 2018 |
| Summary | Optional update for gcc8 |
| Type | recommended |
| Severity | low |
| References | 1084812,1084842,1087550,1094222,1102564 |
Description:
The GNU Compiler GCC 8 is being added to the Development Tools Module by this
update.
The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other
gcc derived libraries for the Basesystem module of SUSE Linux Enterprise 15.
Various optimizers have been improved in GCC 8, several of bugs fixed,
quite some new warnings added and the error pin-pointing and
fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 8 contains a summary of all the changes that
have happened:
https://gcc.gnu.org/gcc-8/changes.html
Also changes needed or common pitfalls when porting software are described on:
https://gcc.gnu.org/gcc-8/porting_to.html
| Advisory ID | SUSE-SU-2018:2825-1
|
| Released | Mon Dec 3 15:35:02 2018 |
| Summary | Security update for pam |
| Type | security |
| Severity | important |
| References | 1115640,CVE-2018-17953 |
Description:
This update for pam fixes the following issue:
Security issue fixed:
- CVE-2018-17953: Fixed IP address and subnet handling of pam_access.so that was not honoured correctly when a single host was specified (bsc#1115640).
| Advisory ID | SUSE-SU-2018:2861-1
|
| Released | Thu Dec 6 14:32:01 2018 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | important |
| References | 1103320,1115929,CVE-2018-19211 |
Description:
This update for ncurses fixes the following issues:
Security issue fixed:
- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
Non-security issue fixed:
- Remove scree.xterm from terminfo data base as with this screen uses fallback TERM=screen (bsc#1103320).
| Advisory ID | SUSE-SU-2018:2984-1
|
| Released | Wed Dec 19 11:32:39 2018 |
| Summary | Security update for perl |
| Type | security |
| Severity | moderate |
| References | 1114674,1114675,1114681,1114686,CVE-2018-18311,CVE-2018-18312,CVE-2018-18313,CVE-2018-18314 |
Description:
This update for perl fixes the following issues:
Secuirty issues fixed:
- CVE-2018-18311: Fixed integer overflow with oversize environment (bsc#1114674).
- CVE-2018-18312: Fixed heap-buffer-overflow write / reg_node overrun (bsc#1114675).
- CVE-2018-18313: Fixed heap-buffer-overflow read if regex contains \0 chars (bsc#1114681).
- CVE-2018-18314: Fixed heap-buffer-overflow in regex (bsc#1114686).
| Advisory ID | SUSE-SU-2018:2986-1
|
| Released | Wed Dec 19 13:53:22 2018 |
| Summary | Security update for libnettle |
| Type | security |
| Severity | moderate |
| References | 1118086,CVE-2018-16869 |
Description:
This update for libnettle fixes the following issues:
Security issues fixed:
- CVE-2018-16869: Fixed a leaky data conversion exposing a manager oracle (bsc#1118086)
| Advisory ID | SUSE-SU-2019:23-1
|
| Released | Mon Jan 7 16:30:33 2019 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | moderate |
| References | 1120346,CVE-2018-1000858 |
Description:
This update for gpg2 fixes the following issue:
Security issue fixed:
- CVE-2018-1000858: Fixed a Cross Site Request Forgery(CSRF) vulnerability in dirmngr
that can result in Attacker controlled CSRF (bsc#1120346).
| Advisory ID | SUSE-RU-2019:44-1
|
| Released | Tue Jan 8 13:07:32 2019 |
| Summary | Recommended update for acl |
| Type | recommended |
| Severity | low |
| References | 953659 |
Description:
This update for acl fixes the following issues:
- test: Add helper library to fake passwd/group files.
- quote: Escape literal backslashes. (bsc#953659)
| Advisory ID | SUSE-SU-2019:137-1
|
| Released | Mon Jan 21 15:52:45 2019 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1005023,1045723,1076696,1080919,1093753,1101591,1111498,1114933,1117063,1119971,1120323,CVE-2018-16864,CVE-2018-16865,CVE-2018-16866,CVE-2018-6954 |
Description:
This update for systemd provides the following fixes:
Security issues fixed:
- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- CVE-2018-6954: Fix mishandling of symlinks present in non-terminal path components (bsc#1080919)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)
Non-security issues fixed:
- pam_systemd: Fix 'Cannot create session: Already running in a session' (bsc#1111498)
- systemd-vconsole-setup: vconsole setup fails, fonts will not be copied to tty (bsc#1114933)
- systemd-tmpfiles-setup: symlinked /tmp to /var/tmp breaking multiple units (bsc#1045723)
- Fixed installation issue with /etc/machine-id during update (bsc#1117063)
- btrfs: qgroups are assigned to parent qgroups after reboot (bsc#1093753)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3,
80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
detected _none_ state. The exit failure code causes that the hot-add memory block can
not be set to online. (bsc#1076696)
| Advisory ID | SUSE-RU-2019:147-1
|
| Released | Wed Jan 23 17:57:31 2019 |
| Summary | Recommended update for ca-certificates-mozilla |
| Type | recommended |
| Severity | moderate |
| References | 1121446 |
Description:
This update for ca-certificates-mozilla fixes the following issues:
The package was updated to the 2.30 version of the Mozilla NSS Certificate store. (bsc#1121446)
Removed Root CAs:
- AC Raiz Certicamara S.A.
- Certplus Root CA G1
- Certplus Root CA G2
- OpenTrust Root CA G1
- OpenTrust Root CA G2
- OpenTrust Root CA G3
- Visa eCommerce Root
Added Root CAs:
- Certigna Root CA (email and server auth)
- GTS Root R1 (server auth)
- GTS Root R2 (server auth)
- GTS Root R3 (server auth)
- GTS Root R4 (server auth)
- OISTE WISeKey Global Root GC CA (email and server auth)
- UCA Extended Validation Root (server auth)
- UCA Global G2 Root (email and server auth)
| Advisory ID | SUSE-RU-2019:189-1
|
| Released | Mon Jan 28 14:14:46 2019 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | |
Description:
This update for rpm fixes the following issues:
- Add kmod(module) provides to kernel and KMPs (fate#326579).
| Advisory ID | SUSE-SU-2019:247-1
|
| Released | Wed Feb 6 07:18:45 2019 |
| Summary | Security update for lua53 |
| Type | security |
| Severity | moderate |
| References | 1123043,CVE-2019-6706 |
Description:
This update for lua53 fixes the following issues:
Security issue fixed:
- CVE-2019-6706: Fixed a use-after-free bug in the lua_upvaluejoin function of lapi.c (bsc#1123043)
| Advisory ID | SUSE-SU-2019:248-1
|
| Released | Wed Feb 6 08:35:20 2019 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1123371,1123377,1123378,CVE-2018-16890,CVE-2019-3822,CVE-2019-3823 |
Description:
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2019-3823: Fixed a heap out-of-bounds read in the code handling the end-of-response for SMTP (bsc#1123378).
- CVE-2019-3822: Fixed a stack based buffer overflow in the function creating an outgoing NTLM type-3 message (bsc#1123377).
- CVE-2018-16890: Fixed a heap buffer out-of-bounds read in the function handling incoming NTLM type-2 messages (bsc#1123371).
| Advisory ID | SUSE-RU-2019:369-1
|
| Released | Wed Feb 13 14:01:42 2019 |
| Summary | Recommended update for itstool |
| Type | recommended |
| Severity | moderate |
| References | 1065270,1111019 |
Description:
This update for itstool and python-libxml2-python fixes the following issues:
Package: itstool
- Updated version to support Python3. (bnc#1111019)
Package: python-libxml2-python
- Fix segfault when parsing invalid data. (bsc#1065270)
| Advisory ID | SUSE-SU-2019:426-1
|
| Released | Mon Feb 18 17:46:55 2019 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1117025,1121563,1122000,1123333,1123727,1123892,1124153,1125352,CVE-2019-6454 |
Description:
This update for systemd fixes the following issues:
- CVE-2019-6454: Overlong DBUS messages could be used to crash systemd (bsc#1125352)
- units: make sure initrd-cleanup.service terminates before switching to rootfs (bsc#1123333)
- logind: fix bad error propagation
- login: log session state 'closing' (as well as New/Removed)
- logind: fix borked r check
- login: don't remove all devices from PID1 when only one was removed
- login: we only allow opening character devices
- login: correct comment in session_device_free()
- login: remember that fds received from PID1 need to be removed eventually
- login: fix FDNAME in call to sd_pid_notify_with_fds()
- logind: fd 0 is a valid fd
- logind: rework sd_eviocrevoke()
- logind: check file is device node before using .st_rdev
- logind: use the new FDSTOREREMOVE=1 sd_notify() message (bsc#1124153)
- core: add a new sd_notify() message for removing fds from the FD store again
- logind: make sure we don't trip up on half-initialized session devices (bsc#1123727)
- fd-util: accept that kcmp might fail with EPERM/EACCES
- core: Fix use after free case in load_from_path() (bsc#1121563)
- core: include Found state in device dumps
- device: fix serialization and deserialization of DeviceFound
- fix path in btrfs rule (#6844)
- assemble multidevice btrfs volumes without external tools (#6607) (bsc#1117025)
- Update systemd-system.conf.xml (bsc#1122000)
- units: inform user that the default target is started after exiting from rescue or emergency mode
- core: free lines after reading them (bsc#1123892)
- sd-bus: if we receive an invalid dbus message, ignore and proceeed
- automount: don't pass non-blocking pipe to kernel.
| Advisory ID | SUSE-SU-2019:571-1
|
| Released | Thu Mar 7 18:13:46 2019 |
| Summary | Security update for file |
| Type | security |
| Severity | moderate |
| References | 1096974,1096984,1126117,1126118,1126119,CVE-2018-10360,CVE-2019-8905,CVE-2019-8906,CVE-2019-8907 |
Description:
This update for file fixes the following issues:
The following security vulnerabilities were addressed:
- CVE-2018-10360: Fixed an out-of-bounds read in the function do_core_note in
readelf.c, which allowed remote attackers to cause a denial of service
(application crash) via a crafted ELF file (bsc#1096974)
- CVE-2019-8905: Fixed a stack-based buffer over-read in do_core_note in readelf.c
(bsc#1126118)
- CVE-2019-8906: Fixed an out-of-bounds read in do_core_note in readelf. c
(bsc#1126119)
- CVE-2019-8907: Fixed a stack corruption in do_core_note in readelf.c
(bsc#1126117)
| Advisory ID | SUSE-RU-2019:641-1
|
| Released | Tue Mar 19 13:17:28 2019 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1112570,1114984,1114993 |
Description:
This update for glibc provides the following fixes:
- Fix Haswell CPU string flags. (bsc#1114984)
- Fix waiters-after-spinning case. (bsc#1114993)
- Do not relocate absolute symbols. (bsc#1112570)
- Add glibc-locale-base subpackage containing only C, C.UTF-8 and en_US.UTF-8 locales.
(fate#326551)
- Add HWCAP_ATOMICS to HWCAP_IMPORTANT (fate#325962)
- Remove slow paths from math routines. (fate#325815, fate#325879, fate#325880,
fate#325881, fate#325882)
| Advisory ID | SUSE-RU-2019:664-1
|
| Released | Wed Mar 20 14:54:12 2019 |
| Summary | Recommended update for gpgme |
| Type | recommended |
| Severity | low |
| References | 1121051 |
Description:
This update for gpgme provides the following fix:
- Re-generate keys in Qt tests to not expire. (bsc#1121051)
| Advisory ID | SUSE-RU-2019:700-1
|
| Released | Thu Mar 21 19:54:00 2019 |
| Summary | Recommended update for cyrus-sasl |
| Type | recommended |
| Severity | moderate |
| References | 1044840 |
Description:
This update for cyrus-sasl provides the following fix:
- Fix a problem that was causing syslog to be polluted with messages 'GSSAPI client step 1'.
By server context the connection will be sent to the log function but the client content
does not have log level information, so there is no way to stop DEBUG level logs.
(bsc#1044840)
| Advisory ID | SUSE-RU-2019:713-1
|
| Released | Fri Mar 22 15:55:05 2019 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1063675,1126590 |
Description:
This update for glibc fixes the following issues:
- Add MAP_SYNC from Linux 4.15 (bsc#1126590)
- Add MAP_SHARED_VALIDATE from Linux 4.15 (bsc#1126590)
- nptl: Preserve error in setxid thread broadcast in coredumps (bsc#1063675, BZ #22153)
| Advisory ID | SUSE-RU-2019:732-1
|
| Released | Mon Mar 25 14:10:04 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1088524,1118364,1128246 |
Description:
This update for aaa_base fixes the following issues:
- Restore old position of ssh/sudo source of profile (bsc#1118364).
- Update logic for JRE_HOME env variable (bsc#1128246)
| Advisory ID | SUSE-SU-2019:788-1
|
| Released | Thu Mar 28 11:55:06 2019 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | moderate |
| References | 1119687,CVE-2018-20346 |
Description:
This update for sqlite3 to version 3.27.2 fixes the following issue:
Security issue fixed:
- CVE-2018-20346: Fixed a remote code execution vulnerability in FTS3 (Magellan) (bsc#1119687).
Release notes: https://www.sqlite.org/releaselog/3_27_2.html
| Advisory ID | SUSE-RU-2019:791-1
|
| Released | Thu Mar 28 12:06:50 2019 |
| Summary | Security update for libnettle |
| Type | recommended |
| Severity | moderate |
| References | 1129598 |
Description:
This update for libnettle to version 3.4.1 fixes the following issues:
Issues addressed and new features:
- Updated to 3.4.1 (fate#327114 and bsc#1129598)
- Fixed a missing break statements in the parsing of PEM input files in pkcs1-conv.
- Fixed a link error on the pss-mgf1-test which was affecting builds without public key support.
- All functions using RSA private keys are now side-channel silent. This applies both to the
bignum calculations, which now use GMP's mpn_sec_* family of functions, and the processing of
PKCS#1 padding needed for RSA decryption.
- Changes in behavior:
The functions rsa_decrypt and rsa_decrypt_tr may now clobber all of the provided message
buffer, independent of the actual message length. They are side-channel silent, in that
branches and memory accesses don't depend on the validity or length of the message.
Side-channel leakage from the caller's use of length and return value may still provide
an oracle useable for a Bleichenbacher-style chosen ciphertext attack.
Which is why the new function rsa_sec_decrypt is recommended.
| Advisory ID | SUSE-RU-2019:858-1
|
| Released | Wed Apr 3 15:50:37 2019 |
| Summary | Recommended update for libtirpc |
| Type | recommended |
| Severity | moderate |
| References | 1120689,1126096 |
Description:
This update for libtirpc fixes the following issues:
- Fix a yp_bind_client_create_v3: RPC: Unknown host error (bsc#1126096).
- add an option to enforce connection via protocol version 2 first (bsc#1120689).
| Advisory ID | SUSE-RU-2019:894-1
|
| Released | Fri Apr 5 17:16:23 2019 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | 1119414,1126327,1129753,SLE-3853,SLE-4117 |
Description:
This update for rpm fixes the following issues:
- This update shortens RPM changelog to after a certain cut off date (bsc#1129753)
- Translate dashes to underscores in kmod provides (FATE#326579, jsc#SLE-4117, jsc#SLE-3853, bsc#1119414).
- Re-add symset-table from SLE 12 (bsc#1126327).
| Advisory ID | SUSE-SU-2019:903-1
|
| Released | Mon Apr 8 15:41:44 2019 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1100396,1122729,1130045,CVE-2016-10739 |
Description:
This update for glibc fixes the following issues:
Security issue fixed:
- CVE-2016-10739: Fixed an improper implementation of getaddrinfo function which could allow
applications to incorrectly assume that had parsed a valid string, without the possibility of
embedded HTTP headers or other potentially dangerous substrings (bsc#1122729).
Other issue fixed:
- Fixed an issue where pthread_mutex_trylock did not use a correct order of instructions
while maintained the robust mutex list due to missing compiler barriers (bsc#1130045).
- Added new Japanese Era name support (bsc#1100396).
| Advisory ID | SUSE-RU-2019:1002-1
|
| Released | Wed Apr 24 10:13:34 2019 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1110304,1129576 |
Description:
This update for zlib fixes the following issues:
- Fixes a segmentation fault error (bsc#1110304, bsc#1129576)
| Advisory ID | SUSE-SU-2019:1040-1
|
| Released | Thu Apr 25 17:09:21 2019 |
| Summary | Security update for samba |
| Type | security |
| Severity | important |
| References | 1114407,1124223,1125410,1126377,1131060,1131686,CVE-2019-3880 |
Description:
This update for samba fixes the following issues:
Security issue fixed:
- CVE-2019-3880: Fixed a path/symlink traversal vulnerability, which allowed an unprivileged user to save registry files outside a share (bsc#1131060).
ldb was updated to version 1.2.4 (bsc#1125410 bsc#1131686):
- Out of bound read in ldb_wildcard_compare
- Hold at most 10 outstanding paged result cookies
- Put 'results_store' into a doubly linked list
- Refuse to build Samba against a newer minor version of ldb
Non-security issues fixed:
- Fixed update-apparmor-samba-profile script after apparmor switched to using named profiles (bsc#1126377).
- Abide to the load_printers parameter in smb.conf (bsc#1124223).
- Provide the 32bit samba winbind PAM module and its dependend 32bit libraries.
| Advisory ID | SUSE-SU-2019:1121-1
|
| Released | Tue Apr 30 18:02:43 2019 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | important |
| References | 1118087,1130681,1130682,CVE-2018-16868,CVE-2019-3829,CVE-2019-3836 |
Description:
This update for gnutls fixes to version 3.6.7 the following issues:
Security issued fixed:
- CVE-2019-3836: Fixed an invalid pointer access via malformed TLS1.3 async messages (bsc#1130682).
- CVE-2019-3829: Fixed a double free vulnerability in the certificate verification API (bsc#1130681).
- CVE-2018-16868: Fixed Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification (bsc#1118087)
Non-security issue fixed:
- Update gnutls to support TLS 1.3 (fate#327114)
| Advisory ID | SUSE-SU-2019:1127-1
|
| Released | Thu May 2 09:39:24 2019 |
| Summary | Security update for sqlite3 |
| Type | security |
| Severity | moderate |
| References | 1130325,1130326,CVE-2019-9936,CVE-2019-9937 |
Description:
This update for sqlite3 to version 3.28.0 fixes the following issues:
Security issues fixed:
- CVE-2019-9936: Fixed a heap-based buffer over-read, when running fts5 prefix
queries inside transaction (bsc#1130326).
- CVE-2019-9937: Fixed a denial of service related to interleaving reads and writes in
a single transaction with an fts5 virtual table (bsc#1130325).
| Advisory ID | SUSE-SU-2019:1206-1
|
| Released | Fri May 10 14:01:55 2019 |
| Summary | Security update for bzip2 |
| Type | security |
| Severity | low |
| References | 985657,CVE-2016-3189 |
Description:
This update for bzip2 fixes the following issues:
Security issue fixed:
- CVE-2016-3189: Fixed a use-after-free in bzip2recover (bsc#985657).
| Advisory ID | SUSE-RU-2019:1312-1
|
| Released | Wed May 22 12:19:12 2019 |
| Summary | Recommended update for aaa_base |
| Type | recommended |
| Severity | moderate |
| References | 1096191 |
Description:
This update for aaa_base fixes the following issue:
* Shell detection in /etc/profile and /etc/bash.bashrc was broken within AppArmor-confined containers
(bsc#1096191)
| Advisory ID | SUSE-SU-2019:1351-1
|
| Released | Fri May 24 14:41:10 2019 |
| Summary | Security update for gnutls |
| Type | security |
| Severity | important |
| References | 1118087,1134856,CVE-2018-16868 |
Description:
This update for gnutls fixes the following issues:
Security issue fixed:
- CVE-2018-16868: Fixed Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification (bsc#1118087).
Non-security issue fixed:
- Explicitly require libnettle 3.4.1 to prevent missing symbol errors (bsc#1134856).
| Advisory ID | SUSE-SU-2019:1357-1
|
| Released | Mon May 27 13:29:15 2019 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1135170,CVE-2019-5436 |
Description:
This update for curl fixes the following issues:
Security issue fixed:
- CVE-2019-5436: Fixed a heap buffer overflow exists in tftp_receive_packet that receives data from a TFTP server (bsc#1135170).
| Advisory ID | SUSE-SU-2019:1364-1
|
| Released | Tue May 28 10:51:38 2019 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1036463,1121563,1124122,1125352,1125604,1126056,1127557,1130230,1132348,1132400,1132721,1133506,1133509,CVE-2019-3842,CVE-2019-3843,CVE-2019-3844,CVE-2019-6454,SLE-5933 |
Description:
This update for systemd fixes the following issues:
Security issues fixed:
- CVE-2019-3842: Fixed a privilege escalation in pam_systemd which could be exploited by a local user (bsc#1132348).
- CVE-2019-6454: Fixed a denial of service via crafted D-Bus message (bsc#1125352).
- CVE-2019-3843, CVE-2019-3844: Fixed a privilege escalation where services with DynamicUser could gain new privileges or create SUID/SGID binaries (bsc#1133506, bsc#1133509).
Non-security issued fixed:
- logind: fix killing of scopes (bsc#1125604)
- namespace: make MountFlags=shared work again (bsc#1124122)
- rules: load drivers only on 'add' events (bsc#1126056)
- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)
- systemd-coredump: generate a stack trace of all core dumps and log into the journal (jsc#SLE-5933)
- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)
- sd-bus: bump message queue size again (bsc#1132721)
- Do not automatically online memory on s390x (bsc#1127557)
- Removed sg.conf (bsc#1036463)
| Advisory ID | SUSE-SU-2019:1368-1
|
| Released | Tue May 28 13:15:38 2019 |
| Summary | Recommended update for sles12sp3-docker-image, sles12sp4-image, system-user-root |
| Type | security |
| Severity | important |
| References | 1134524,CVE-2019-5021 |
Description:
This update for sles12sp3-docker-image, sles12sp4-image, system-user-root fixes the following issues:
- CVE-2019-5021: Include an invalidated root password by default, not an empty one (bsc#1134524)
| Advisory ID | SUSE-SU-2019:1372-1
|
| Released | Tue May 28 16:53:28 2019 |
| Summary | Security update for libtasn1 |
| Type | security |
| Severity | moderate |
| References | 1105435,CVE-2018-1000654 |
Description:
This update for libtasn1 fixes the following issues:
Security issue fixed:
- CVE-2018-1000654: Fixed a denial of service in the asn1 parser (bsc#1105435).
| Advisory ID | SUSE-RU-2019:1484-1
|
| Released | Thu Jun 13 07:46:46 2019 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 1128383 |
Description:
This update for e2fsprogs fixes the following issues:
- Check and fix tails of all bitmap blocks (bsc#1128383)
| Advisory ID | SUSE-SU-2019:1486-1
|
| Released | Thu Jun 13 09:40:24 2019 |
| Summary | Security update for elfutils |
| Type | security |
| Severity | moderate |
| References | 1033084,1033085,1033086,1033087,1033088,1033089,1033090,1106390,1107066,1107067,1111973,1112723,1112726,1123685,1125007,CVE-2017-7607,CVE-2017-7608,CVE-2017-7609,CVE-2017-7610,CVE-2017-7611,CVE-2017-7612,CVE-2017-7613,CVE-2018-16062,CVE-2018-16402,CVE-2018-16403,CVE-2018-18310,CVE-2018-18520,CVE-2018-18521,CVE-2019-7150,CVE-2019-7665 |
Description:
This update for elfutils fixes the following issues:
Security issues fixed:
- CVE-2017-7607: Fixed a heap-based buffer overflow in handle_gnu_hash (bsc#1033084)
- CVE-2017-7608: Fixed a heap-based buffer overflow in ebl_object_note_type_name() (bsc#1033085)
- CVE-2017-7609: Fixed a memory allocation failure in __libelf_decompress (bsc#1033086)
- CVE-2017-7610: Fixed a heap-based buffer overflow in check_group (bsc#1033087)
- CVE-2017-7611: Fixed a denial of service via a crafted ELF file (bsc#1033088)
- CVE-2017-7612: Fixed a denial of service in check_sysv_hash() via a crafted ELF file (bsc#1033089)
- CVE-2017-7613: Fixed denial of service caused by the missing validation of the number of sections and the number of segments in a crafted ELF file (bsc#1033090)
- CVE-2018-16062: Fixed a heap-buffer overflow in /elfutils/libdw/dwarf_getaranges.c:156 (bsc#1106390)
- CVE-2018-16402: Fixed a denial of service/double free on an attempt to decompress the same section twice (bsc#1107066)
- CVE-2018-16403: Fixed a heap buffer overflow in readelf (bsc#1107067)
- CVE-2018-18310: Fixed an invalid address read problem in dwfl_segment_report_module.c (bsc#1111973)
- CVE-2018-18520: Fixed bad handling of ar files inside are files (bsc#1112726)
- CVE-2018-18521: Fixed a denial of service vulnerabilities in the function arlib_add_symbols() used by eu-ranlib (bsc#1112723)
- CVE-2019-7150: dwfl_segment_report_module doesn't check whether the dyn data read from core file is truncated (bsc#1123685)
- CVE-2019-7665: NT_PLATFORM core file note should be a zero terminated string (bsc#1125007)
SUSE-CU-2019:696-1
| Container Advisory ID | SUSE-CU-2019:696-1 |
| Container Tags | caasp/v4/tiller:2.8.2 , caasp/v4/tiller:2.8.2-rev1 , caasp/v4/tiller:2.8.2-rev1-build2.1 , caasp/v4/tiller:beta1 |
| Container Release | 2.1 |
The following patches have been included in this update:
SUSE-CU-2019:695-1
| Container Advisory ID | SUSE-CU-2019:695-1 |
| Container Tags | caasp/v4/tiller:2.8.2 , caasp/v4/tiller:2.8.2-rev1 , caasp/v4/tiller:2.8.2-rev1-build1.2 |
| Container Release | 1.2 |
The following patches have been included in this update:
| Advisory ID | SUSE-RU-2014:85-1
|
| Released | Tue Nov 4 16:29:29 2014 |
| Summary | Recommended update for dirmngr |
| Type | recommended |
| Severity | moderate |
| References | 901845 |
Description:
This update for dirmngr fixes a segmentation fault at start up. (bnc#901845)
| Advisory ID | SUSE-RU-2014:66-1
|
| Released | Thu Nov 6 06:23:15 2014 |
| Summary | Recommended update for gcc48 |
| Type | recommended |
| Severity | moderate |
| References | 899871 |
Description:
This update for gcc48 fixes a performance degradation issue caused by generation of unneeded code whe using option -pg.
| Advisory ID | SUSE-SU-2014:97-1
|
| Released | Fri Nov 28 10:20:32 2014 |
| Summary | Security update for file |
| Type | security |
| Severity | moderate |
| References | 888308,902367,CVE-2014-3710 |
Description:
file was updated to fix one security issue.
This security issue was fixed:
- Out-of-bounds read in elf note headers (CVE-2014-3710).
This non-security issues was fixed:
- Correctly identify GDBM files created by libgdbm4 (bnc#888308).
| Advisory ID | SUSE-SU-2014:113-1
|
| Released | Tue Dec 2 18:17:57 2014 |
| Summary | Security update for cpio |
| Type | security |
| Severity | moderate |
| References | 658010,907456,CVE-2014-9112 |
Description:
This cpio security update fixes the following buffer overflow issue and
two non security issues:
- fix an OOB write with cpio -i (bnc#907456) (CVE-2014-9112)
- prevent cpio from extracting over a symlink (bnc#658010)
- fix a truncation check in mt
| Advisory ID | SUSE-SU-2015:16-1
|
| Released | Thu Dec 11 09:25:27 2014 |
| Summary | Security update for libksba |
| Type | security |
| Severity | moderate |
| References | 907074,CVE-2014-9087 |
Description:
This libksba update fixes the following security issue:
- bnc#907074: buffer overflow in OID processing (CVE-2014-9087)
| Advisory ID | SUSE-SU-2014:126-1
|
| Released | Fri Dec 19 20:16:00 2014 |
| Summary | Security update for file |
| Type | security |
| Severity | moderate |
| References | 910252,910253,CVE-2014-8116,CVE-2014-8117 |
Description:
This file update fixes the following security issues:
- bsc#910252: multiple denial of service issues (resource consumption)
(CVE-2014-8116)
- bsc#910253: denial of service issue (resource consumption)
(CVE-2014-8117)
| Advisory ID | SUSE-SU-2015:29-1
|
| Released | Mon Jan 12 11:37:43 2015 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 901924,911363,CVE-2014-3707,CVE-2014-8150 |
Description:
This update fixes the following security issues
- CVE-2014-8150: URL request injection vulnerability (bnc#911363)
- CVE-2014-3707: duphandle read out of bounds (bnc#901924)
| Advisory ID | SUSE-SU-2015:40-1
|
| Released | Thu Jan 15 18:35:11 2015 |
| Summary | Security update for rpm |
| Type | security |
| Severity | important |
| References | 892431,906803,908128,911228,CVE-2013-6435,CVE-2014-8118 |
Description:
This rpm update fixes the following security and non-security issues:
- bnc#908128: Check for bad invalid name sizes (CVE-2014-8118)
- bnc#906803: Create files with mode 0 (CVE-2013-6435)
- bnc#892431: Honor --noglob in install mode
- bnc#911228: Fix noglob patch, it broke files with space.
| Advisory ID | SUSE-RU-2015:64-1
|
| Released | Thu Jan 15 23:21:45 2015 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | moderate |
| References | 912229 |
Description:
This update for e2fsprogs fixes a 'use after free' issue in fsck(8).
| Advisory ID | SUSE-SU-2015:76-1
|
| Released | Fri Jan 30 15:01:03 2015 |
| Summary | Security update for elfutils |
| Type | security |
| Severity | moderate |
| References | 911662,CVE-2014-9447 |
Description:
elfutils was updated to fix one security issue.
This security issue was fixed:
- Directory traversal vulnerability in the read_long_names function (CVE-2014-9447).
| Advisory ID | SUSE-RU-2015:55-1
|
| Released | Tue Feb 3 14:51:17 2015 |
| Summary | Recommended update for curl |
| Type | recommended |
| Severity | moderate |
| References | 913209 |
Description:
curl was updated to fix problems when operating in FIPS mode.
This patch reenables following methods:
- NTLM authentication (e.g. for proxies) (allowing its usage of MD4 and MD5)
- HTTP Digest authentication (allowing its usage of MD5)
| Advisory ID | SUSE-RU-2015:121-1
|
| Released | Tue Feb 3 16:30:16 2015 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | low |
| References | 912922 |
Description:
This update for pam fixes updating of NIS passwords.
| Advisory ID | SUSE-SU-2015:157-1
|
| Released | Tue Mar 10 09:01:41 2015 |
| Summary | Security update for libssh2_org |
| Type | security |
| Severity | moderate |
| References | 921070,CVE-2015-1782 |
Description:
The ssh client library libssh2_org was updated to fix a security issue.
CVE-2015-1782: A malicious server could send a crafted SSH_MSG_KEXINIT
packet, that could lead to a buffer overread and to a crash of the
libssh2_org using application.
| Advisory ID | SUSE-RU-2015:275-1
|
| Released | Wed Mar 18 18:21:44 2015 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 901202,908516 |
Description:
This update for procps provides the following fixes:
- Add description of pgrep's --list-full parameter to usage instructions (--help). (bsc#901202)
- Fix handling of arguments to -s option in free(1). (bsc#908516)
- Correct package name in descriptions: procps, not props.
| Advisory ID | SUSE-SU-2015:235-1
|
| Released | Wed Apr 29 19:05:01 2015 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 927556,927607,927608,927746,928533,CVE-2015-3143,CVE-2015-3144,CVE-2015-3145,CVE-2015-3148,CVE-2015-3153 |
Description:
curl was updated to fix five security issues.
The following vulnerabilities were fixed:
- CVE-2015-3143: curl could re-use NTML authenticateds connections
- CVE-2015-3144: curl could access memory out of bounds with zero length host names
- CVE-2015-3145: curl cookie parser could access memory out of boundary
- CVE-2015-3148: curl could treat Negotiate as not connection-oriented
- CVE-2015-3153: curl could have sent sensitive HTTP headers also to proxies
| Advisory ID | SUSE-SU-2015:296-1
|
| Released | Thu Jun 11 15:46:59 2015 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 896202,896435,898003,899524,900275,900276,905483,920057,928740,929919,CVE-2014-3591 |
Description:
This update of libgcrypt fixes one security issue and brings various FIPS 140-2 related improvements.
libgcrypt now uses ciphertext blinding for Elgamal decryption (CVE-2014-3591)
FIPS 140-2 related changes:
- The library performs its self-tests when the module is complete (the -hmac file is also installed).
- Added a NIST 800-90a compliant DRBG.
- Change DSA key generation to be FIPS 186-4 compliant.
- Change RSA key generation to be FIPS 186-4 compliant.
- Enable HW support in fips mode (bnc#896435)
- Make DSA selftest use 2048 bit keys (bnc#898003)
- Added ECDSA selftests and add support for it to the CAVS testing
framework (bnc#896202)
- Various CAVS testing improvements.
| Advisory ID | SUSE-SU-2015:366-1
|
| Released | Mon Jun 29 10:13:43 2015 |
| Summary | Security update for e2fsprogs |
| Type | security |
| Severity | low |
| References | 915402,918346,CVE-2015-0247,CVE-2015-1572 |
Description:
Two security issues were fixed in e2fsprogs:
Security issues fixed:
- CVE-2015-0247: Various heap overflows were fixed in e2fsprogs (fsck, dumpe2fs, e2image...).
- CVE-2015-1572: Fixed a potential buffer overflow in closefs() (bsc#918346 )
| Advisory ID | SUSE-RU-2015:361-1
|
| Released | Wed Jul 15 08:26:27 2015 |
| Summary | Recommended update for gcc48, libffi48, libgcj48 |
| Type | recommended |
| Severity | moderate |
| References | 889990,917169,919274,922534,924525,924687,927993,930176,934689 |
Description:
The system compiler gcc48 was updated to the GCC 4.8.5 release, fixing
a lot of bugs and bringing some improvements.
It includes various bug fixes found by our customers:
- Fixes bogus integer overflow in constant expression. [bnc#934689]
- Fixes ICE with atomics on aarch64. [bnc#930176]
- Includes fix for -imacros bug. [bnc#917169]
- Includes fix for incorrect -Warray-bounds warnings. [bnc#919274]
- Includes updated -mhotpatch for s390x. [bnc#924525]
- Includes fix for ppc64le issue with doubleword vector extract. [bnc#924687]
- Includes patches to allow building against ISL 0.14.
- Backport rework of the memory allocator for C++ exceptions used in OOM situations. [bnc#889990]
- Fix a reload issue on S390 (GCC PR66306).
- Avoid accessing invalid memory when passing aggregates by value. [bnc#922534]
| Advisory ID | SUSE-OU-2015:422-1
|
| Released | Tue Jul 28 06:25:51 2015 |
| Summary | The Toolchain module containing GCC 5.2 |
| Type | optional |
| Severity | low |
| References | 926412,936050,937823 |
Description:
This update contains the release of the new SUSE Linux Enterprise Toolchain module.
Its major feature is the GNU Compiler Collection 5.2, please see
https://gcc.gnu.org/gcc-5/changes.html for important changes.
This update also includes a version update of binutils to 2.25 release branch
to provide features and bugfixes.
Following features have been added to binutils:
- IBM zSeries z13 hardware support (fate#318036, bnc#936050).
- various IBM Power8 improvements (fate#318238, bnc#926412).
- AVX512 support on the Intel EM64T platform (fate#318520).
The GNU Debugger gdb was updated to version 7.9.1 bringing
various features and lots of bugfixes. Also IBM zSeries z13 hardware
support has been added to gdb. (fate#318039)
| Advisory ID | SUSE-SU-2015:500-1
|
| Released | Mon Aug 17 11:36:33 2015 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 920057,938343,CVE-2015-0837 |
Description:
This update fixes the following issues:
Security:
- Fixed data-dependent timing variations in modular exponentiation
[related to CVE-2015-0837, Last-Level Cache Side-Channel Attacks
are Practical] (bsc#920057)
Bugfixes:
- don't drop privileges when locking secure memory (bsc#938343)
| Advisory ID | SUSE-RU-2015:530-1
|
| Released | Wed Aug 26 03:07:07 2015 |
| Summary | Recommended update for sed |
| Type | recommended |
| Severity | low |
| References | 933029 |
Description:
This update for sed fixes the behavior of --follow-symlinks when reading from the
standard input (stdin).
The behavior of 'sed --follow-symlinks -' is now identical to 'sed -'. In both
cases, sed will read from the standard input and no longer from a file named '-'.
| Advisory ID | SUSE-RU-2015:568-1
|
| Released | Wed Sep 16 13:30:12 2015 |
| Summary | Recommended update for grep |
| Type | recommended |
| Severity | low |
| References | 920386 |
Description:
This update for grep fixes undefined behaviour with -P and non-utf-8 data.
| Advisory ID | SUSE-SU-2015:922-1
|
| Released | Tue Dec 22 08:44:25 2015 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | moderate |
| References | 918089,918090,952347,955753,CVE-2015-1606,CVE-2015-1607 |
Description:
The gpg2 package was updated to fix the following security and non security issues:
- CVE-2015-1606: Fixed invalid memory read using a garbled keyring (bsc#918089).
- CVE-2015-1607: Fixed memcpy with overlapping ranges (bsc#918090).
- bsc#955753: Fixed a regression of 'gpg --recv' due to keyserver import filter (also boo#952347).
| Advisory ID | SUSE-SU-2015:869-1
|
| Released | Wed Dec 23 10:01:16 2015 |
| Summary | Recommended update for libksba |
| Type | security |
| Severity | moderate |
| References | 926826 |
Description:
The libksba package was updated to fix the following security issues:
- Fixed an integer overflow, an out of bounds read and a stack overflow issues (bsc#926826).
| Advisory ID | SUSE-RU-2015:862-1
|
| Released | Wed Dec 23 17:40:51 2015 |
| Summary | Recommended update for acl |
| Type | recommended |
| Severity | moderate |
| References | 945899 |
Description:
This update for acl provides the following fixes:
- Fix segmentation fault of getfacl -e on overly long group name.
- Make sure that acl_from_text() always sets errno when it fails.
- Fix memory and resource leaks in getfacl.
| Advisory ID | SUSE-RU-2016:46-1
|
| Released | Fri Jan 8 12:37:34 2016 |
| Summary | Recommended update for gcr, gnome-keyring, libgcrypt, libsecret |
| Type | recommended |
| Severity | moderate |
| References | 932232 |
Description:
This update for gcr, gnome-keyring, libgcrypt, libsecret fixes issues when the system
operates in FIPS mode.
The various GNOME libraries and tool have been changed to use the default libgcrypt
allocators.
GNOME keyring was changed not to use MD5 anymore.
libgcrypt was adjusted to free the DRBG on exit to avoid crashes.
| Advisory ID | SUSE-SU-2016:201-1
|
| Released | Thu Feb 4 15:51:22 2016 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 934333,936676,962983,962996,CVE-2016-0755 |
Description:
This update for curl fixes the following issues:
- CVE-2016-0755: libcurl would reuse NTLM-authenticated proxy connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer (bsc#962983)
The following non-security bugs were fixed:
- bsc#936676: secure_getenv or __secure_getenv may not be detected correctly at build time
The following tracked bugs only affect the test suite:
- bsc#962996: Expired cookie in test 46 caused test failures
- bsc#934333: Curl test suite was not run, is now enabled during build
| Advisory ID | SUSE-RU-2016:371-1
|
| Released | Thu Mar 3 15:58:18 2016 |
| Summary | Recommended update for insserv-compat |
| Type | recommended |
| Severity | low |
| References | 960820 |
Description:
This update for insserv-compat fixes the name of the ntpd service.
| Advisory ID | SUSE-SU-2016:413-1
|
| Released | Fri Mar 11 10:17:57 2016 |
| Summary | Security update for libssh2_org |
| Type | security |
| Severity | moderate |
| References | 933336,961964,967026,CVE-2016-0787 |
Description:
This update for libssh2_org fixes the following issues:
Security issue fixed:
- CVE-2016-0787 (bsc#967026):
Weakness in diffie-hellman secret key generation lead to much shorter DH groups
then needed, which could be used to retrieve server keys.
A feature was added:
- Support of SHA256 digests for DH group exchanges was added (fate#320343, bsc#961964)
Bug fixed:
- Properly detect EVP_aes_128_ctr at configure time (bsc#933336)
| Advisory ID | SUSE-RU-2016:462-1
|
| Released | Wed Mar 16 18:17:59 2016 |
| Summary | Recommended update for libcap |
| Type | recommended |
| Severity | low |
| References | 967838 |
Description:
This update for libcap adds two new capabilities (CAP_WAKE_ALARM and CAP_BLOCK_SUSPEND)
which are available in Linux Kernel 3.12.
| Advisory ID | SUSE-RU-2016:543-1
|
| Released | Fri Apr 1 18:44:16 2016 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 970882 |
Description:
This update for libgcrypt fixes a crash in GPG key generation when operating in FIPS mode. (bsc#970882)
| Advisory ID | SUSE-SU-2016:565-1
|
| Released | Wed Apr 6 16:26:42 2016 |
| Summary | Security update for gcc5 |
| Type | security |
| Severity | moderate |
| References | 939460,945842,952151,953831,954002,955382,962765,964468,966220,968771,CVE-2015-5276 |
Description:
The GNU Compiler Collection was updated to version 5.3.1, which brings several fixes
and enhancements.
The following security issue has been fixed:
- Fix C++11 std::random_device short read issue that could lead to predictable
randomness. (CVE-2015-5276, bsc#945842)
The following non-security issues have been fixed:
- Enable frame pointer for TARGET_64BIT_MS_ABI when stack is misaligned. Fixes internal
compiler error when building Wine. (bsc#966220)
- Fix a PowerPC specific issue in gcc-go that broke compilation of newer versions of
Docker. (bsc#964468)
- Fix HTM built-ins on PowerPC. (bsc#955382)
- Fix libgo certificate lookup. (bsc#953831)
- Suppress deprecated-declarations warnings for inline definitions of deprecated virtual
methods. (bsc#939460)
- Build s390[x] with '--with-tune=z9-109 --with-arch=z900' on SLE11 again. (bsc#954002)
- Revert accidental libffi ABI breakage on aarch64. (bsc#968771)
- On x86_64, set default 32bit code generation to -march=x86-64 rather than -march=i586.
- Add experimental File System TS library.
| Advisory ID | SUSE-SU-2016:636-1
|
| Released | Mon Apr 18 09:18:19 2016 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 965902,CVE-2015-7511 |
Description:
libgcrypt was updated to fix one security issue.
This security issue was fixed:
- CVE-2015-7511: Side-channel attack on ECDH with Weierstrass curves (bsc#965902).
| Advisory ID | SUSE-RU-2016:643-1
|
| Released | Tue Apr 19 09:23:39 2016 |
| Summary | Recommended update for bzip2 |
| Type | recommended |
| Severity | low |
| References | 970260 |
Description:
This update for bzip2 fixes the following issues:
- Fix bzgrep wrapper that always returns 0 as exit code when working on multiple
archives, even when the pattern is not found.
| Advisory ID | SUSE-RU-2016:697-1
|
| Released | Thu Apr 28 16:03:24 2016 |
| Summary | Recommended update for libssh2_org |
| Type | recommended |
| Severity | important |
| References | 974691 |
Description:
This update for libssh2_org fixes a regression introduced by a previous update
which could result in a segmentation fault in EVP_DigestInit_Ex().
| Advisory ID | SUSE-RU-2016:801-1
|
| Released | Thu May 19 22:38:01 2016 |
| Summary | Recommended update for curl |
| Type | recommended |
| Severity | moderate |
| References | 915846 |
Description:
This update for curl fixes the following issue:
- Fix 'Network is unreachable' error when ipv6 is not available but ipv4.
This fixes the same error in applications using libcurl4 (like zypper). (bsc#915846)
| Advisory ID | SUSE-RU-2016:835-1
|
| Released | Wed May 25 18:27:30 2016 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 979629 |
Description:
This update for libgcrypt fixes the following issue:
- Fix failing reboot after installing fips pattern (bsc#979629)
| Advisory ID | SUSE-SU-2016:898-1
|
| Released | Tue Jun 7 09:48:12 2016 |
| Summary | Security update for expat |
| Type | security |
| Severity | important |
| References | 979441,980391,CVE-2015-1283,CVE-2016-0718 |
Description:
This update for expat fixes the following issues:
Security issue fixed:
- CVE-2016-0718: Fix Expat XML parser that mishandles certain kinds of malformed input documents. (bsc#979441)
- CVE-2015-1283: Fix multiple integer overflows. (bnc#980391)
| Advisory ID | SUSE-SU-2016:900-1
|
| Released | Tue Jun 7 10:58:37 2016 |
| Summary | Security update for libksba |
| Type | security |
| Severity | moderate |
| References | 979261,979906,CVE-2016-4574,CVE-2016-4579 |
Description:
This update for libksba fixes the following issues:
- CVE-2016-4579: Out-of-bounds read in _ksba_ber_parse_tl()
- CVE-2016-4574: two OOB read access bugs (remote DoS) (bsc#979261)
Also adding reliability fixes from v1.3.4.
| Advisory ID | SUSE-RU-2016:987-1
|
| Released | Wed Jun 22 14:32:18 2016 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 981616 |
Description:
This update for procps fixes the following issues:
- Improve pmap(1) to be compatible with kernel 4.4. (bsc#981616)
| Advisory ID | SUSE-RU-2016:1028-1
|
| Released | Thu Jul 7 11:50:47 2016 |
| Summary | Recommended update for findutils |
| Type | recommended |
| Severity | moderate |
| References | 986935 |
Description:
This update for findutils fixes the following issues:
- find -exec + would not pass all arguments for certain specific filename lengths (bsc#986935)
| Advisory ID | SUSE-RU-2016:1126-1
|
| Released | Sat Jul 30 00:39:03 2016 |
| Summary | Recommended update for kmod |
| Type | recommended |
| Severity | low |
| References | 983754,989788 |
Description:
This update for kmod fixes libkmod to handle very long lines in /proc/modules.
| Advisory ID | SUSE-RU-2016:1205-1
|
| Released | Thu Aug 11 15:02:18 2016 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | low |
| References | 829717,894610,940315,953532,965322,967728 |
Description:
This update for rpm provides the following fixes:
- Add is_opensuse and leap_version macros to suse_macros. (bsc#940315)
- Add option to make postinstall scriptlet errors fatal. (bsc#967728)
- Normalize big blocksizes to 4096 bytes. (bsc#894610, bsc#829717, bsc#965322)
- Fix updating of sources/patches when recursing because of a BuildArch. (bsc#953532)
| Advisory ID | SUSE-SU-2016:1228-1
|
| Released | Tue Aug 16 09:29:01 2016 |
| Summary | Security update for libidn |
| Type | security |
| Severity | moderate |
| References | 923241,990189,990190,990191,CVE-2015-2059,CVE-2015-8948,CVE-2016-6261,CVE-2016-6262,CVE-2016-6263 |
Description:
This update for libidn fixes the following issues:
- CVE-2016-6262 and CVE-2015-8948: Out-of-bounds-read when reading one zero byte as input (bsc#990189)
- CVE-2016-6261: Out-of-bounds stack read in idna_to_ascii_4i (bsc#990190)
- CVE-2016-6263: stringprep_utf8_nfkc_normalize reject invalid UTF-8 (bsc#990191)
- CVE-2015-2059: out-of-bounds read with stringprep on invalid UTF-8 (bsc#923241)
| Advisory ID | SUSE-SU-2016:1247-1
|
| Released | Fri Aug 19 12:58:39 2016 |
| Summary | Security update for cracklib |
| Type | security |
| Severity | moderate |
| References | 992966,CVE-2016-6318 |
Description:
This update for cracklib fixes the following issues:
- Add patch to fix a buffer overflow in GECOS parser (bsc#992966 CVE-2016-6318)
| Advisory ID | SUSE-SU-2016:1326-1
|
| Released | Thu Sep 8 11:37:44 2016 |
| Summary | Security update for perl |
| Type | security |
| Severity | moderate |
| References | 928292,932894,967082,984906,987887,988311,CVE-2015-8853,CVE-2016-1238,CVE-2016-2381,CVE-2016-6185 |
Description:
This update for Perl fixes the following issues:
- CVE-2016-6185: Xsloader looking at a '(eval)' directory. (bsc#988311)
- CVE-2016-1238: Searching current directory for optional modules. (bsc#987887)
- CVE-2015-8853: Regular expression engine hanging on bad utf8. (bsc)
- CVE-2016-2381: Environment dup handling bug. (bsc#967082)
- 'Insecure dependency in require' error in taint mode. (bsc#984906)
- Memory leak in 'use utf8' handling. (bsc#928292)
- Missing lock prototype to the debugger. (bsc#932894)
| Advisory ID | SUSE-OU-2016:1358-1
|
| Released | Thu Sep 15 20:54:21 2016 |
| Summary | Optional update for gcc6 |
| Type | optional |
| Severity | low |
| References | 983206 |
Description:
This update ships the GNU Compiler Collection (GCC) in version 6.2.
This update is shipped in two parts:
- SUSE Linux Enterprise Server 12 and Desktop:
The runtime libraries libgcc_s1, libstdc++6, libatomic1, libgomp1, libitm1
and some others can now be used by GCC 6 built binaries.
- SUSE Linux Enterprise 12 Toolchain Module:
The Toolchain module received the GCC 6 compiler suite with this update.
Changes:
- The default mode for C++ is now -std=gnu++14 instead of -std=gnu++98.
Generic Optimization improvements:
- UndefinedBehaviorSanitizer gained a new sanitization option,
-fsanitize=bounds-strict, which enables strict checking of array
bounds. In particular, it enables -fsanitize=bounds as well as
instrumentation of flexible array member-like arrays.
- Type-based alias analysis now disambiguates accesses to different
pointers. This improves precision of the alias oracle by about 20-30%
on higher-level C++ programs. Programs doing invalid type punning of
pointer types may now need -fno-strict-aliasing to work correctly.
- Alias analysis now correctly supports weakref and alias attributes. This
makes it possible to access both a variable and its alias in one
translation unit which is common with link-time optimization.
- Value range propagation now assumes that the this pointer of C++
member functions is non-null. This eliminates common null pointer checks
but also breaks some non-conforming code-bases (such as Qt-5, Chromium,
KDevelop). As a temporary work-around -fno-delete-null-pointer-checks
can be used. Wrong code can be identified by using -fsanitize=undefined.
- Various Link-time optimization improvements.
- Inter-procedural optimization improvements:
- Basic jump threading is now performed before profile construction
and inline analysis, resulting in more realistic size and time
estimates that drive the heuristics of the of inliner and function
cloning passes.
- Function cloning now more aggressively eliminates unused function
parameters.
- Compared to GCC 5, the GCC 6 release series includes a much improved
implementation of the OpenACC 2.0a specification.
C language specific improvements:
- Version 4.5 of the OpenMP specification is now supported in the C and C++ compilers.
- Source locations for the C and C++ compilers are now tracked as ranges,
rather than just points, making it easier to identify the subexpression
of interest within a complicated expression. In addition, there is
now initial support for precise diagnostic locations within strings,
- Diagnostics can now contain 'fix-it hints', which are displayed in
context underneath the relevant source code.
- The C and C++ compilers now offer suggestions for misspelled field names.
- New command-line options have been added for the C and C++ compilers:
- -Wshift-negative-value warns about left shifting a negative value.
- -Wshift-overflow warns about left shift overflows. This warning is
enabled by default. -Wshift-overflow=2 also warns about left-shifting
1 into the sign bit.
- -Wtautological-compare warns if a self-comparison always evaluates
to true or false. This warning is enabled by -Wall.
- -Wnull-dereference warns if the compiler detects paths that
trigger erroneous or undefined behavior due to dereferencing a null
pointer. This option is only active when -fdelete-null-pointer-checks
is active, which is enabled by optimizations in most targets. The
precision of the warnings depends on the optimization options used.
- -Wduplicated-cond warns about duplicated conditions in an if-else-if chain.
- -Wmisleading-indentation warns about places where the indentation
of the code gives a misleading idea of the block structure of the
code to a human reader. This warning is enabled by -Wall.
- The C and C++ compilers now emit saner error messages if merge-conflict markers
are present in a source file.
C improvements:
- It is possible to disable warnings when an initialized field
of a structure or a union with side effects is being overridden
when using designated initializers via a new warning option
-Woverride-init-side-effects.
- A new type attribute scalar_storage_order applying to structures
and unions has been introduced. It specifies the storage order (aka
endianness) in memory of scalar fields in structures or unions.
C++ improvements:
- The default mode has been changed to -std=gnu++14.
- C++ Concepts are now supported when compiling with -fconcepts.
- -flifetime-dse is more aggressive in dead-store elimination in situations where
a memory store to a location precedes a constructor to that memory location.
- G++ now supports C++17 fold expressions, u8 character literals, extended static_assert,
and nested namespace definitions.
- G++ now allows constant evaluation for all non-type template arguments.
- G++ now supports C++ Transactional Memory when compiling with -fgnu-tm.
libstdc++ improvements:
- Extensions to the C++ Library to support mathematical special functions
(ISO/IEC 29124:2010), thanks to Edward Smith-Rowland.
- Experimental support for C++17.
- An experimental implementation of the File System TS.
- Experimental support for most features of the second version of the
Library Fundamentals TS. This includes polymorphic memory resources and
array support in shared_ptr, thanks to Fan You.
- Some assertions checked by Debug Mode can now also be enabled by
_GLIBCXX_ASSERTIONS. The subset of checks enabled by the new macro have
less run-time overhead than the full _GLIBCXX_DEBUG checks and don't
affect the library ABI, so can be enabled per-translation unit.
Fortran improvements:
- Fortran 2008 SUBMODULE support.
- Fortran 2015 EVENT_TYPE, EVENT_POST, EVENT_WAIT, and EVENT_QUERY support.
- Improved support for Fortran 2003 deferred-length character variables.
- Improved support for OpenMP and OpenACC.
- The MATMUL intrinsic is now inlined for straightforward cases if
front-end optimization is active. The maximum size for inlining can be
set to n with the -finline-matmul-limit=n option and turned off with
-finline-matmul-limit=0.
- The -Wconversion-extra option will warn about REAL constants which
have excess precision for their kind.
- The -Winteger-division option has been added, which warns about
divisions of integer constants which are truncated. This option is
included in -Wall by default.
Architecture improvements:
- AArch64 received a lot of improvements.
IA-32/x86-64 improvements:
- GCC now supports the Intel CPU named Skylake with AVX-512 extensions
through -march=skylake-avx512. The switch enables the following ISA
extensions: AVX-512F, AVX512VL, AVX-512CD, AVX-512BW, AVX-512DQ.
- Support for new AMD instructions monitorx and mwaitx has been
added. This includes new intrinsic and built-in support. It is enabled
through option -mmwaitx. The instructions monitorx and mwaitx implement
the same functionality as the old monitor and mwait instructions. In
addition mwaitx adds a configurable timer. The timer value is received
as third argument and stored in register %ebx.
- x86-64 targets now allow stack realignment from a word-aligned stack
pointer using the command-line option -mstackrealign or __attribute__
((force_align_arg_pointer)). This allows functions compiled with
a vector-aligned stack to be invoked from objects that keep only
word-alignment.
- Support for address spaces __seg_fs, __seg_gs, and __seg_tls. These
can be used to access data via the %fs and %gs segments without having
to resort to inline assembly.
- Support for AMD Zen (family 17h) processors is now available through
the -march=znver1 and -mtune=znver1 options.
PowerPC / PowerPC64 / RS6000 improvements:
- PowerPC64 now supports IEEE 128-bit floating-point using the
__float128 data type. In GCC 6, this is not enabled by default, but you
can enable it with -mfloat128. The IEEE 128-bit floating-point support
requires the use of the VSX instruction set. IEEE 128-bit floating-point
values are passed and returned as a single vector value. The software
emulator for IEEE 128-bit floating-point support is only built on
PowerPC GNU/Linux systems where the default CPU is at least power7. On
future ISA 3.0 systems (POWER 9 and later), you will be able to use the
-mfloat128-hardware option to use the ISA 3.0 instructions that support
IEEE 128-bit floating-point. An additional type (__ibm128) has been added
to refer to the IBM extended double type that normally implements long
double. This will allow for a future transition to implementing long
double with IEEE 128-bit floating-point.
- Basic support has been added for POWER9 hardware that will use the
recently published OpenPOWER ISA 3.0 instructions. The following new
switches are available:
- -mcpu=power9: Implement all of the ISA 3.0 instructions supported by
the compiler.
- -mtune=power9: In the future, apply tuning for POWER9 systems. Currently,
POWER8 tunings are used.
- -mmodulo: Generate code using the ISA 3.0 integer instructions (modulus,
count trailing zeros, array index support, integer multiply/add).
- -mpower9-fusion: Generate code to suitably fuse instruction sequences for
a POWER9 system.
- -mpower9-dform: Generate code to use the new D-form (register+offset) memory
instructions for the vector registers.
- -mpower9-vector: Generate code using the new ISA 3.0 vector (VSX or Altivec)
instructions.
- -mpower9-minmax: Reserved for future development.
- -mtoc-fusion: Keep TOC entries together to provide more fusion opportunities.
- New constraints have been added to support IEEE 128-bit floating-point and ISA 3.0
instructions.
- Support has been added for __builtin_cpu_is() and __builtin_cpu_supports(),
allowing for very fast access to AT_PLATFORM, AT_HWCAP, and AT_HWCAP2 values.
This requires use of glibc 2.23 or later.
- All hardware transactional memory builtins now correctly behave as
memory barriers. Programmers can use #ifdef __TM_FENCE__ to determine
whether their 'old' compiler treats the builtins as barriers.
- Split-stack support has been added for gccgo on PowerPC64 for both
big- and little-endian (but not for 32-bit). The gold linker from at
least binutils 2.25.1 must be available in the PATH when configuring and
building gccgo to enable split stack. (The requirement for binutils 2.25.1
applies to PowerPC64 only.) The split-stack feature allows a small initial
stack size to be allocated for each goroutine, which increases as needed.
- GCC on PowerPC now supports the standard lround function.
- The 'q', 'S', 'T', and 't' asm-constraints have been removed.
- The 'b', 'B', 'm', 'M', and 'W' format modifiers have been removed.
S/390, System z, IBM z Systems improvements:
- Support for the IBM z13 processor has been added. When using the
-march=z13 option, the compiler will generate code making use of the
new instructions and registers introduced with the vector extension
facility. The -mtune=z13 option enables z13 specific instruction
scheduling without making use of new instructions.
- Compiling code with -march=z13 reduces the default alignment of vector
types bigger than 8 bytes to 8. This is an ABI change and care must be
taken when linking modules compiled with different arch levels which
interchange variables containing vector type values. For newly compiled
code the GNU linker will emit a warning.
- The -mzvector option enables a C/C++ language extension. This extension
provides a new keyword vector which can be used to define vector type
variables. (Note: This is not available when enforcing strict standard
compliance e.g. with -std=c99. Either enable GNU extensions with
e.g. -std=gnu99 or use __vector instead of vector.)
- Additionally a set of overloaded builtins is provided which is partially
compatible to the PowerPC Altivec builtins. In order to make use of
these builtins the vecintrin.h header file needs to be included.
- The new command line options -march=native, and -mtune=native are now
available on native IBM z Systems. Specifying these options will cause
GCC to auto-detect the host CPU and rewrite these options to the optimal
setting for that system. If GCC is unable to detect the host CPU these
options have no effect.
- The IBM z Systems port now supports target attributes and
pragmas. Please refer to the documentation for details of available
attributes and pragmas as well as usage instructions.
- -fsplit-stack is now supported as part of the IBM z Systems port. This
feature requires a recent gold linker to be used.
- Support for the g5 and g6 -march=/-mtune= CPU level switches has been
deprecated and will be removed in a future GCC release. -m31 from now
on defaults to -march=z900 if not specified otherwise. -march=native on
a g5/g6 machine will default to -march=z900.
An even more detailed list of features can be found at:
https://gcc.gnu.org/gcc-6/changes.html
| Advisory ID | SUSE-SU-2016:1364-1
|
| Released | Fri Sep 16 17:13:43 2016 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 991389,991390,991391,991746,997420,CVE-2016-5419,CVE-2016-5420,CVE-2016-5421,CVE-2016-7141 |
Description:
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2016-5419: TLS session resumption client cert bypass (bsc#991389)
- CVE-2016-5420: Re-using connections with wrong client cert (bsc#991390)
- CVE-2016-5421: use of connection struct after free (bsc#991391)
- CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS (bsc#997420)
Also the following bug was fixed:
- fixing a performance issue (bsc#991746)
| Advisory ID | SUSE-SU-2016:1370-1
|
| Released | Wed Sep 21 12:58:14 2016 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 994157,CVE-2016-6313 |
Description:
This update for libgcrypt fixes the following issues:
- RNG prediction vulnerability (bsc#994157, CVE-2016-6313)
| Advisory ID | SUSE-SU-2016:1591-1
|
| Released | Wed Nov 2 12:07:51 2016 |
| Summary | Security update for curl |
| Type | security |
| Severity | important |
| References | 1005633,1005634,1005635,1005637,1005638,1005640,1005642,1005643,1005645,1005646,998760,CVE-2016-7167,CVE-2016-8615,CVE-2016-8616,CVE-2016-8617,CVE-2016-8618,CVE-2016-8619,CVE-2016-8620,CVE-2016-8621,CVE-2016-8622,CVE-2016-8623,CVE-2016-8624 |
Description:
This update for curl fixes the following security issues:
- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)
- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)
- CVE-2016-8622: URL unescape heap overflow via integer truncation (bsc#1005643)
- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)
- CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640)
- CVE-2016-8619: double-free in krb5 code (bsc#1005638)
- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)
- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)
- CVE-2016-8616: case insensitive password comparison (bsc#1005634)
- CVE-2016-8615: cookie injection for other servers (bsc#1005633)
- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)
| Advisory ID | SUSE-RU-2016:1614-1
|
| Released | Mon Nov 7 20:01:31 2016 |
| Summary | Recommended update for shadow |
| Type | recommended |
| Severity | low |
| References | 1002975 |
Description:
This update for shadow fixes the following issues:
- Set file modes according to the permissions package and don't attempt to
manipulate them in %files section. (bsc#1002975)
| Advisory ID | SUSE-RU-2016:1641-1
|
| Released | Thu Nov 10 20:02:04 2016 |
| Summary | Recommended update for sg3_utils |
| Type | recommended |
| Severity | moderate |
| References | 1006469,958369,979436 |
Description:
This update for sg3_utils provides the following fixes:
- Adjust 55-scsi-sg3_id.rules to correctly handle VPD page 0x80. This issue could
prevent some IBM Power systems from booting after installation. (bsc#1006469)
- Fix 55-scsi_sg3_id.rules to skip sg_inq on recent kernels. (bsc#979436)
- In some circumstances, the rescan-scsi-bus.sh script failed to identify new LUNs
that have been added to the server. (bsc#958369)
| Advisory ID | SUSE-SU-2016:1744-1
|
| Released | Fri Dec 2 11:42:41 2016 |
| Summary | Security update for pcre |
| Type | security |
| Severity | moderate |
| References | 906574,924960,933288,933878,936227,942865,957566,957567,957598,957600,960837,971741,972127,CVE-2014-8964,CVE-2015-2325,CVE-2015-2327,CVE-2015-2328,CVE-2015-3210,CVE-2015-3217,CVE-2015-5073,CVE-2015-8380,CVE-2015-8381,CVE-2015-8382,CVE-2015-8383,CVE-2015-8384,CVE-2015-8385,CVE-2015-8386,CVE-2015-8387,CVE-2015-8388,CVE-2015-8389,CVE-2015-8390,CVE-2015-8391,CVE-2015-8392,CVE-2015-8393,CVE-2015-8394,CVE-2015-8395,CVE-2016-1283,CVE-2016-3191 |
Description:
This update for pcre to version 8.39 (bsc#972127) fixes several issues.
If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.
This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:
- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).
These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
| Advisory ID | SUSE-RU-2016:1782-1
|
| Released | Fri Dec 9 13:35:02 2016 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1001790,1004289,1005404,1006372,1006690,989831,991443 |
Description:
This update for systemd provides the following fixes:
- Allow to redirect confirmation messages to a different console. (bsc#1006690)
- Do not bind a mount unit to a device, if it was from mountinfo. (bsc#989831)
- Decrease systemd-nspawn's non-fatal mount errors to debug level. (bsc#1004289)
- Don't emit space usage message right after opening the persistent journal. (bsc#991443)
- Change owner of /var/log/journal/remote and create /var/lib/systemd/journal-upload.
(bsc#1006372)
- Document that *KeyIgnoreInhibited only apply to a subset of locks.
- Revert 'logind: really handle *KeyIgnoreInhibited options in logind.conf'.
(bsc#1001790, bsc#1005404)
- Revert 'kbd-model-map: add more mappings offered by Yast'.
- Don't busy loop when we get a notification message we can't process.
- Rename kbd-model-map-extra into kbd-model-map.legacy.
- Add kbd-model-map-extra file which contains the additional maps needed by YaST.
- Drop localfs.service: unused and not needed anymore.
| Advisory ID | SUSE-SU-2016:1827-1
|
| Released | Thu Dec 15 12:41:10 2016 |
| Summary | Security update for pcre |
| Type | security |
| Severity | moderate |
| References | 906574,924960,933288,933878,936227,942865,957566,957567,957598,957600,960837,971741,972127,CVE-2014-8964,CVE-2015-2325,CVE-2015-2327,CVE-2015-2328,CVE-2015-3210,CVE-2015-3217,CVE-2015-5073,CVE-2015-8380,CVE-2015-8381,CVE-2015-8382,CVE-2015-8383,CVE-2015-8384,CVE-2015-8385,CVE-2015-8386,CVE-2015-8387,CVE-2015-8388,CVE-2015-8389,CVE-2015-8390,CVE-2015-8391,CVE-2015-8392,CVE-2015-8393,CVE-2015-8394,CVE-2015-8395,CVE-2016-1283,CVE-2016-3191 |
Description:
This update for pcre to version 8.39 (bsc#972127) fixes several issues.
If you use pcre extensively please be aware that this is an update to a new version. Please
make sure that your software works with the updated version.
This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code. These security issues were fixed:
- CVE-2014-8964: Heap-based buffer overflow in PCRE allowed remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats (bsc#906574).
- CVE-2015-2325: Heap buffer overflow in compile_branch() (bsc#924960).
- CVE-2015-3210: Heap buffer overflow in pcre_compile2() / compile_regex() (bsc#933288)
- CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match() (bsc#933878).
- CVE-2015-5073: Library Heap Overflow Vulnerability in find_fixedlength() (bsc#936227).
- bsc#942865: heap overflow in compile_regex()
- CVE-2015-8380: The pcre_exec function in pcre_exec.c mishandled a // pattern with a \01 string, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957566).
- CVE-2015-2327: PCRE mishandled certain patterns with internal recursive back references, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror (bsc#957567).
- bsc#957598: Various security issues
- CVE-2015-8381: Heap Overflow in compile_regex() (bsc#957598).
- CVE-2015-8382: Regular Expression Uninitialized Pointer Information Disclosure Vulnerability (ZDI-CAN-2547)(bsc#957598).
- CVE-2015-8383: Buffer overflow caused by repeated conditional group(bsc#957598).
- CVE-2015-8384: Buffer overflow caused by recursive back reference by name within certain group(bsc#957598).
- CVE-2015-8385: Buffer overflow caused by forward reference by name to certain group(bsc#957598).
- CVE-2015-8386: Buffer overflow caused by lookbehind assertion(bsc#957598).
- CVE-2015-8387: Integer overflow in subroutine calls(bsc#957598).
- CVE-2015-8388: Buffer overflow caused by certain patterns with an unmatched closing parenthesis(bsc#957598).
- CVE-2015-8389: Infinite recursion in JIT compiler when processing certain patterns(bsc#957598).
- CVE-2015-8390: Reading from uninitialized memory when processing certain patterns(bsc#957598).
- CVE-2015-8391: Some pathological patterns causes pcre_compile() to run for a very long time(bsc#957598).
- CVE-2015-8392: Buffer overflow caused by certain patterns with duplicated named groups(bsc#957598).
- CVE-2015-8393: Information leak when running pcgrep -q on crafted binary(bsc#957598).
- CVE-2015-8394: Integer overflow caused by missing check for certain conditions(bsc#957598).
- CVE-2015-8395: Buffer overflow caused by certain references(bsc#957598).
- CVE-2015-2328: PCRE mishandled the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allowed remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression (bsc#957600).
- CVE-2016-1283: The pcre_compile2 function in pcre_compile.c in PCRE mishandled certain patterns with named subgroups, which allowed remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression (bsc#960837).
- CVE-2016-3191: The compile_branch function in pcre_compile.c in pcre2_compile.c mishandled patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allowed remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression (bsc#971741).
These non-security issues were fixed:
- JIT compiler improvements
- performance improvements
- The Unicode data tables have been updated to Unicode 7.0.0.
| Advisory ID | SUSE-RU-2016:1863-1
|
| Released | Wed Dec 21 10:41:35 2016 |
| Summary | Recommended updated for pth |
| Type | recommended |
| Severity | low |
| References | 1013286 |
Description:
This update adds the 32bit version of libpth20 to SUSE Linux Enterprise 12 SP1 and 12 SP2.
| Advisory ID | SUSE-SU-2017:2-1
|
| Released | Mon Jan 2 08:35:08 2017 |
| Summary | Security update for zlib |
| Type | security |
| Severity | moderate |
| References | 1003577,1003579,1003580,1013882,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842,CVE-2016-9843 |
Description:
This update for zlib fixes the following issues:
CVE-2016-9843: Big-endian out-of-bounds pointer
CVE-2016-9842: Undefined Left Shift of Negative Number (bsc#1003580)
CVE-2016-9840 CVE-2016-9841: Out-of-bounds pointer arithmetic in inftrees.c (bsc#1003579)
Incompatible declarations for external linkage function deflate (bsc#1003577)
| Advisory ID | SUSE-RU-2017:6-1
|
| Released | Tue Jan 3 15:01:58 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1012390,1012591,1012818,1013989,1015515,909418,912715,945340,953807,963290,990538 |
Description:
This update for systemd fixes the following issues:
- core: Make mount units from /proc/self/mountinfo possibly bind to a device. Fixes
unmounting issues when ejecting CDs or DVDs. (bsc#909418, bsc#912715, bsc#945340)
- fstab-generator: Remove bogus condition that leads to warnings on boot. (bsc#1013989)
- coredumpctl: Let gdb handle the SIGINT signal. (bsc#1012591)
- Ship kbd-model-map with the correct contents. (bsc#1015515)
- rules: Set SYSTEMD_READY=0 on DM_UDEV_DISABLE_OTHER_RULES_FLAG=1 only with ADD event.
(bsc#963290, bsc#990538)
- tmpfiles: Don't skip path_set_perms on error. (bsc#953807)
- nspawn: Properly handle image/directory paths that are symbolic links. (bsc#1012390)
- systemctl: Fix 'is-enabled' exit status on failure when executed in chroot. (bsc#1012818)
| Advisory ID | SUSE-RU-2017:32-1
|
| Released | Mon Jan 9 11:50:42 2017 |
| Summary | Recommended update for dirmngr |
| Type | recommended |
| Severity | low |
| References | 994794 |
Description:
This update for dirmngr enables support for daemon mode.
| Advisory ID | SUSE-RU-2017:47-1
|
| Released | Wed Jan 11 11:42:43 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1018214,1018399 |
Description:
This update for systemd fixes the following two issues:
- A regression in the previous update (SUSE-RU-2017:0013-1, bsc#909418) could have caused systemd to freeze.
(bsc#1018399)
- Warnings emitted when udev socket units are restarted during package upgrade were silenced. (bsc#1018214)
| Advisory ID | SUSE-RU-2017:98-1
|
| Released | Thu Jan 19 10:17:55 2017 |
| Summary | Recommended update for kmod |
| Type | recommended |
| Severity | low |
| References | 998906 |
Description:
This update for kmod fixes a rare race condition while loading modules.
| Advisory ID | SUSE-SU-2017:149-1
|
| Released | Wed Jan 25 09:17:08 2017 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1012266,1014560,1014566,1020601,997682,CVE-2016-10156 |
Description:
This update for systemd fixes the following issues:
This security issue was fixed:
- CVE-2016-10156: Fix permissions set on permanent timer timestamp files, preventing local unprivileged users from escalating privileges (bsc#1020601).
These non-security issues were fixed:
- Fix permission set on /var/lib/systemd/linger/*
- install: follow config_path symlink (#3362)
- install: fix disable when /etc/systemd/system is a symlink (bsc#1014560)
- run: make --slice= work in conjunction with --scope (bsc#1014566)
- core: don't dispatch load queue when setting Slice= for transient units
- systemctl: remove duplicate entries showed by list-dependencies (#5049) (bsc#1012266)
- rule: don't automatically online standby memory on s390x (bsc#997682)
| Advisory ID | SUSE-SU-2017:185-1
|
| Released | Thu Feb 2 18:22:37 2017 |
| Summary | Security update for cpio |
| Type | security |
| Severity | moderate |
| References | 1020108,963448,CVE-2016-2037 |
Description:
This update for cpio fixes two issues.
This security issue was fixed:
- CVE-2016-2037: The cpio_safer_name_suffix function in util.c in cpio allowed remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file (bsc#963448).
This non-security issue was fixed:
- bsc#1020108: Always use 32 bit CRC to prevent checksum errors for files greater than 32MB
| Advisory ID | SUSE-SU-2017:192-1
|
| Released | Fri Feb 3 18:46:05 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1005544,1010675,1013930,1014873,1017497,CVE-2016-4658,CVE-2016-9318,CVE-2016-9597 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2016-4658: use-after-free error could lead to crash [bsc#1005544]
- Fix NULL dereference in xpointer.c when in recovery mode [bsc#1014873]
- CVE-2016-9597: An XML document with many opening tags could have caused a overflow of the stack not detected by the recursion limits, allowing for DoS (bsc#1017497).
For CVE-2016-9318 we decided not to ship a fix since it can break existing setups. Please take appropriate actions if you parse untrusted XML files
and use the new -noxxe flag if possible (bnc#1010675, bnc#1013930).
| Advisory ID | SUSE-RU-2017:209-1
|
| Released | Tue Feb 7 17:00:47 2017 |
| Summary | Recommended update for libseccomp |
| Type | recommended |
| Severity | low |
| References | 1019900 |
Description:
This update provides libseccomp version 2.3.1 which fixes the following issues:
- Fixed a problem with 32-bit x86 socket syscalls on some systems (fate#321647, bsc#1019900)
- Fixed problems with ipc syscalls on 32-bit x86
- Fixed problems with socket and ipc syscalls on s390 and s390x
| Advisory ID | SUSE-SU-2017:212-1
|
| Released | Wed Feb 8 13:07:24 2017 |
| Summary | Security update for expat |
| Type | security |
| Severity | moderate |
| References | 983215,983216,CVE-2012-6702,CVE-2016-5300 |
Description:
This update for expat fixes the following security issues:
- CVE-2012-6702: Expat, when used in a parser that has not
called XML_SetHashSalt or passed it a seed of 0, made it easier for
context-dependent attackers to defeat cryptographic protection mechanisms
via vectors involving use of the srand function. (bsc#983215)
- CVE-2016-5300: The XML parser in Expat did not use sufficient entropy
for hash initialization, which allowed context-dependent attackers to
cause a denial of service (CPU consumption) via crafted identifiers in
an XML document. NOTE: this vulnerability exists because of an incomplete
fix for CVE-2012-0876. (bsc#983216)
| Advisory ID | SUSE-SU-2017:228-1
|
| Released | Fri Feb 10 15:39:32 2017 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1000677,1001912,1009528,1019637,1021641,1022085,1022086,1022271,CVE-2016-7055,CVE-2017-3731,CVE-2017-3732 |
Description:
This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7055: The x86_64 optimized montgomery multiplication may produce incorrect results (bsc#1009528)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- CVE-2017-3732: BN_mod_exp may produce incorrect results on x86_64 (bsc#1022086)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
Non-security issues fixed:
- fix crash in openssl speed (bsc#1000677)
- fix X509_CERT_FILE path (bsc#1022271)
- AES XTS key parts must not be identical in FIPS mode (bsc#1019637)
| Advisory ID | SUSE-RU-2017:261-1
|
| Released | Mon Feb 20 11:00:28 2017 |
| Summary | Recommended update for dirmngr |
| Type | recommended |
| Severity | low |
| References | 1019276 |
Description:
This update for dirmngr fixes the following issues:
- Properly initialize the dirmngr tmpfilesd files right away and not
just during reboot
- Own the /usr/lib/tmpfiles.d/ folder as it is needed in older systemds
wrt (bsc#1019276)
- Proprely require logrotate as we need it for the dirmngr configs
| Advisory ID | SUSE-RU-2017:365-1
|
| Released | Fri Mar 10 15:16:59 2017 |
| Summary | Recommended update for sg3_utils |
| Type | recommended |
| Severity | low |
| References | 1006175 |
Description:
This update for sg3_utils fixes the following issue:
- Add udev rules to handle legacy CCISS devices (bsc#1006175)
| Advisory ID | SUSE-RU-2017:389-1
|
| Released | Thu Mar 16 14:16:43 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1004094,1006687,1019470,1022014,1022047,1025598,995936 |
Description:
This update for systemd provides the following fixes:
- core: Fix memory leak in transient units. (bsc#1025598)
- core: Destroy all name watching bus slots when we are kicked off the bus. (bsc#1006687)
- sd-event: Fix incorrect assertion. (bsc#995936, bsc#1022014)
- journald: Don't flush to /var/log/journal before we get asked to. (bsc#1004094)
- core: Downgrade warning about duplicate device names. (bsc#1022047)
- units: Remove no longer needed ldconfig service. (bsc#1019470)
| Advisory ID | SUSE-RU-2017:439-1
|
| Released | Tue Mar 21 10:48:47 2017 |
| Summary | Recommended update for netcfg |
| Type | recommended |
| Severity | low |
| References | 1028305,959693 |
Description:
This update for netcfg provides the following fixes:
- Update script to generate services to use UTF8 by default. (bsc#1028305)
- Repack services.bz2 with latest from upstream and adjust the script to not
add all the names and emails at the bottom of the file. (bsc#959693)
| Advisory ID | SUSE-RU-2017:462-1
|
| Released | Fri Mar 24 21:58:07 2017 |
| Summary | Recommended update for lvm2 |
| Type | recommended |
| Severity | moderate |
| References | 1012973,1015943,1017034,1023283,1025560,1025630 |
Description:
This update for lvm2 fixes the following issues:
- Fix clvmd segmentation fault on ppc64le architecture. (bsc#1025630)
- Fix several trivial issues about clvmd/cmirrord resource agents. (bsc#1023283, bsc#1025560)
- Use {local,remote}-fs-pre.target instead of {local,remote}-fs.target. (bsc#1017034)
- Simplify special-case for md in 69-dm-lvm-metadata.rules. (bsc#1012973)
- Add systemd_requires to device-mapper package. (bsc#1015943)
| Advisory ID | SUSE-RU-2017:464-1
|
| Released | Mon Mar 27 15:50:51 2017 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1007851,1029725,1029900 |
Description:
This update for glibc fixes a potential segmentation fault in libpthread:
- Fork in libpthread cannot use IFUNC resolver. (bsc#1007851, bsc#1029725, bsc#1029900)
| Advisory ID | SUSE-RU-2017:580-1
|
| Released | Wed Apr 12 23:58:47 2017 |
| Summary | Recommended update for cpio |
| Type | recommended |
| Severity | important |
| References | 1028410 |
Description:
This update for cpio fixes the following issues:
- A regression caused cpio to crash for tar and ustar archive types
[bsc#1028410]
| Advisory ID | SUSE-SU-2017:609-1
|
| Released | Tue Apr 18 11:28:14 2017 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1015332,1027712,1032309,CVE-2016-9586,CVE-2017-7407 |
Description:
This update for curl fixes the following issues:
Security issue fixed:
- CVE-2016-9586: libcurl printf floating point buffer overflow (bsc#1015332)
- CVE-2017-7407: The ourWriteOut function in tool_writeout.c in curl might have allowed physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which lead to a heap-based buffer over-read (bsc#1032309).
With this release new default ciphers are active (SUSE_DEFAULT, bsc#1027712).
| Advisory ID | SUSE-RU-2017:732-1
|
| Released | Wed May 10 14:03:43 2017 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 1030621 |
Description:
This update for procps fixes the following issues:
- Command w(1) with option -n doesn't work. (bsc#1030621)
| Advisory ID | SUSE-RU-2017:735-1
|
| Released | Wed May 10 15:43:46 2017 |
| Summary | Recommended update for gpg2 |
| Type | recommended |
| Severity | low |
| References | 1036736,986783 |
Description:
This update for gpg2 provides the following fixes:
- Do not install CAcert and other root certificates which are not needed with
Let's Encrypt. (bsc#1036736)
- Initialize the trustdb before import attempt. (bsc#986783)
| Advisory ID | SUSE-RU-2017:751-1
|
| Released | Thu May 11 17:14:30 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1010220,1025398,1025886,1028263,1028610,1029183,1029691,1030290,1031355,1032538,1032660,1033855,1034565,955770 |
Description:
This update for systemd provides the following fixes:
- logind: Update empty and 'infinity' handling for [User]TasksMax. (bsc#1031355)
- importd: Support SUSE style checksums. (fate#322054)
- journal: Don't remove leading spaces. (bsc#1033855)
- Make sure all swap units are ordered before the swap target. (bsc#955770, bsc#1034565)
- hwdb: Fix warning 'atkbd serio0: Unknown key pressed'. (bsc#1010220)
- logind: Restart logind on package update only on SLE12 distros. (bsc#1032660)
- core: Treat masked files as 'unchanged'. (bsc#1032538)
- units: Move Before deps for quota services to remote-fs.target. (bsc#1028263)
- udev: Support predictable ifnames on vio buses. (bsc#1029183)
- udev: Add a persistent rule for ibmvnic devices. (bsc#1029183)
- units: Do not throw a warning in emergency mode if plymouth is not installed. (bsc#1025398)
- core: Downgrade 'Time has been changed' message to debug level. (bsc#1028610)
- vconsole: Don't do GIO_SCRNMAP / GIO_UNISCRNMAP. (bsc#1029691)
- udev-rules: Perform whitespace replacement for symlink subst values. (bsc#1025886)
- Consider chroot updates in fix-machines-subvol-for-rollbacks.sh. (bsc#1030290)
| Advisory ID | SUSE-SU-2017:794-1
|
| Released | Tue May 16 15:41:09 2017 |
| Summary | Security update for bash |
| Type | security |
| Severity | moderate |
| References | 1010845,1035371,CVE-2016-9401 |
Description:
This update for bash fixes an issue that could lead to syntax errors when parsing
scripts that use expr(1) inside loops.
Additionally, the popd build-in now ensures that the normalized stack offset is
within bounds before trying to free that stack entry. This fixes a segmentation
fault.
| Advisory ID | SUSE-RU-2017:799-1
|
| Released | Wed May 17 00:21:13 2017 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | low |
| References | 1026224,1035445 |
Description:
This update for glibc introduces basic support for IBM POWER9 systems. Additionally,
an improper assert in dlclose() has been removed.
| Advisory ID | SUSE-SU-2017:865-1
|
| Released | Wed May 24 16:23:20 2017 |
| Summary | Security update for pam |
| Type | security |
| Severity | moderate |
| References | 1015565,1037824,934920,CVE-2015-3238 |
Description:
This update for pam fixes the following issues:
- CVE-2015-3238: pam_unix in conjunction with SELinux allowed for DoS attacks (bsc#934920).
- log a hint to syslog if /etc/nologin is present, but empty (bsc#1015565).
- If /etc/nologin is present, but empty, log a hint to syslog. (bsc#1015565)
- Added support for libowcrypt.so, if present, to configure support for BLOWFISH (bsc#1037824)
| Advisory ID | SUSE-RU-2017:873-1
|
| Released | Fri May 26 16:19:47 2017 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | low |
| References | 1009532,960273 |
Description:
This update for e2fsprogs provides the following fixes:
- Fix 32/64-bit overflow when multiplying by blocks/clusters per group. This allows
resize2fs(8) to resize file systems larger than 20 TB. (bsc#1009532)
- Update spec file to regenerate initrd when e2fsprogs is updated or uninstalled.
(bsc#960273)
| Advisory ID | SUSE-RU-2017:877-1
|
| Released | Mon May 29 15:11:48 2017 |
| Summary | Recommended update for cryptsetup |
| Type | recommended |
| Severity | low |
| References | 1031998 |
Description:
This update for cryptsetup provides the following fix:
- Don't use a zero-filled empty key, because in FIPS, XTS mode key parts mustn't be equivalent (bsc#1031998)
| Advisory ID | SUSE-SU-2017:891-1
|
| Released | Tue May 30 22:28:21 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1039063,1039064,1039066,1039069,1039661,981114,CVE-2016-1839,CVE-2017-9047,CVE-2017-9048,CVE-2017-9049,CVE-2017-9050 |
Description:
This update for libxml2 fixes the following issues:
- CVE-2017-9047, CVE-2017-9048: The function xmlSnprintfElementContent in valid.c was vulnerable to a stack buffer overflow (bsc#1039063, bsc#1039064)
- CVE-2017-9049: The function xmlDictComputeFastKey in dict.c was vulnerable to a heap-based buffer over-read. (bsc#1039066)
- CVE-2017-9050: The function xmlDictAddString was vulnerable to a heap-based buffer over-read (bsc#1039661)
- CVE-2016-1839: heap-based buffer overflow (xmlDictAddString func) (bnc#1039069)
| Advisory ID | SUSE-RU-2017:907-1
|
| Released | Thu Jun 1 14:23:36 2017 |
| Summary | Recommended update for shadow |
| Type | recommended |
| Severity | low |
| References | 1003978,1031643 |
Description:
This update for shadow fixes the following issues:
- Dynamically added users via pam_group are not listed in groups databases but are
still valid. (bsc#1031643)
- useradd(8) and groupadd(8) performance issue when using SSSD. Previously the entire
possible UID/GID was iterated to find an available UID/GID. This could take long time
over a network device. Instead, find available UID/GID locally, and then check only
those values over network. (bsc#1003978)
| Advisory ID | SUSE-RU-2017:918-1
|
| Released | Tue Jun 6 12:35:44 2017 |
| Summary | Recommended update for libsemanage, selinux-policy |
| Type | recommended |
| Severity | moderate |
| References | 1020143,1032445,1035818,1038189 |
Description:
This update for libsemanage, selinux-policy fixes the following issues:
- Limit to policy version 29 by default.
- Fix policy module build failures and wrong policy path on SLE 12 SP2 (bsc#1038189, bsc#1035818, bsc#1020143, bsc#1032445)
| Advisory ID | SUSE-SU-2017:939-1
|
| Released | Mon Jun 12 10:56:22 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1039063,1039064,1039066,1039069,1039661,CVE-2017-9047,CVE-2017-9048,CVE-2017-9049,CVE-2017-9050 |
Description:
This update for libxml2 fixes the following security issues:
- CVE-2017-9050: A heap-based buffer over-read in xmlDictAddString (bsc#1039069, bsc#1039661)
- CVE-2017-9049: A heap-based buffer overflow in xmlDictComputeFastKey (bsc#1039066)
- CVE-2017-9048: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039063)
- CVE-2017-9047: A stack overflow vulnerability in xmlSnprintfElementContent (bsc#1039064)
| Advisory ID | SUSE-RU-2017:959-1
|
| Released | Wed Jun 14 14:38:11 2017 |
| Summary | Recommended update for gcc5 |
| Type | recommended |
| Severity | low |
| References | 1043580 |
Description:
This update for gcc5 fixes the version of libffi in its pkg-config configuration file.
| Advisory ID | SUSE-SU-2017:962-1
|
| Released | Wed Jun 14 16:33:07 2017 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1009470,1037396,1041764,972331,CVE-2017-9287 |
Description:
This update for openldap2 fixes the following issues:
Security issues fixed:
- CVE-2017-9287: A double free vulnerability in the mdb backend during search with page size 0 was fixed (bsc#1041764)
Non security bugs fixed:
- Let OpenLDAP read system-wide certificates by default and don't hide the error if
the user-specified CA location cannot be read. (bsc#1009470)
- Fix an uninitialised variable that causes startup failure (bsc#1037396)
- Fix an issue with transaction management that can cause server crash (bsc#972331)
| Advisory ID | SUSE-SU-2017:985-1
|
| Released | Mon Jun 19 14:57:41 2017 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1042326,931932,CVE-2017-9526 |
Description:
This update for libgcrypt fixes the following issues:
- CVE-2017-9526: Store the session key in secure memory to ensure that constant
time point operations are used in the MPI library. (bsc#1042326)
- Don't require secure memory for the fips selftests, this prevents the
'Oops, secure memory pool already initialized' warning. (bsc#931932)
| Advisory ID | SUSE-SU-2017:990-1
|
| Released | Mon Jun 19 17:19:44 2017 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1039357,1040043,CVE-2017-1000366 |
Description:
This update for glibc fixes the following issues:
- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that
allowed unprivileged system users to manipulate the stack of setuid binaries
to gain special privileges. [bsc#1039357]
- A bug in glibc that could result in deadlocks between malloc() and fork() has
been fixed. [bsc#1040043]
| Advisory ID | SUSE-RU-2017:1033-1
|
| Released | Fri Jun 23 16:38:55 2017 |
| Summary | Recommended update for e2fsprogs |
| Type | recommended |
| Severity | low |
| References | 1038194 |
Description:
This update for e2fsprogs provides the following fixes:
- Don't ignore fsync errors in libext2fs. (bsc#1038194)
- Fix fsync(2) detection in libext2fs. (bsc#1038194)
| Advisory ID | SUSE-SU-2017:1036-1
|
| Released | Mon Jun 26 08:12:24 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1024989,1044337,CVE-2017-0663,CVE-2017-5969 |
Description:
This update for libxml2 fixes the following issues:
Security issues fixed:
- CVE-2017-0663: Fixed a heap buffer overflow in xmlAddID (bsc#1044337)
- CVE-2017-5969: Fixed a NULL pointer deref in xmlDumpElementContent (bsc#1024989)
| Advisory ID | SUSE-RU-2017:1040-1
|
| Released | Mon Jun 26 13:22:26 2017 |
| Summary | Recommended update for libsemanage, policycoreutils |
| Type | recommended |
| Severity | low |
| References | 1043237 |
Description:
This update for libsemanage, policycoreutils fixes the following issue:
- Show version numbers of modules where they are available (bsc#1043237)
| Advisory ID | SUSE-RU-2017:1082-1
|
| Released | Fri Jun 30 10:54:06 2017 |
| Summary | Recommended update for dirmngr |
| Type | recommended |
| Severity | low |
| References | 1045943 |
Description:
This update for dirmngr provides the following fix:
- Change logrotate from Requires to Recommends (bsc#1045943)
| Advisory ID | SUSE-SU-2017:1086-1
|
| Released | Fri Jun 30 15:36:17 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1044887,1044894,CVE-2017-7375,CVE-2017-7376 |
Description:
This update for libxml2 fixes the following issues:
Security issues fixed:
- CVE-2017-7376: Increase buffer space for port in HTTP redirect support (bsc#1044887)
- CVE-2017-7375: Prevent unwanted external entity reference [bsc#1044894, ]
| Advisory ID | SUSE-SU-2017:1104-1
|
| Released | Tue Jul 4 16:13:55 2017 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1004995,1029102,1029516,1036873,1038865,1040258,1040614,1040942,1043758,982303,CVE-2017-9217 |
Description:
This update for systemd fixes the following issues:
Security issue fixed:
- CVE-2017-9217: resolved: Fix null pointer p->question dereferencing that could lead to resolved aborting (bsc#1040614)
The update also fixed several non-security bugs:
- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
The database might be missing when upgrading a package which was
shipping no sysv init scripts nor unit files (at the time --save was
called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
| Advisory ID | SUSE-SU-2017:1116-1
|
| Released | Thu Jul 6 11:37:18 2017 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1046607,CVE-2017-7526 |
Description:
This update for libgcrypt fixes the following issues:
- CVE-2017-7526: Hardening against a local side-channel attack in RSA key handling has been added (bsc#1046607)
| Advisory ID | SUSE-SU-2017:1119-1
|
| Released | Fri Jul 7 11:23:20 2017 |
| Summary | Recommended update for ncurses |
| Type | security |
| Severity | important |
| References | 1000662,1046853,1046858,CVE-2017-10684,CVE-2017-10685 |
Description:
This update for ncurses fixes the following issues:
Security issues fixed:
- CVE-2017-10684: Possible RCE via stack-based buffer overflow in the fmt_entry function. (bsc#1046858)
- CVE-2017-10685: Possible RCE with format string vulnerability in the fmt_entry function. (bsc#1046853)
Bugfixes:
- Drop patch ncurses-5.9-environment.dif as YaST2 ncurses GUI does
not need it anymore and as well as it causes bug bsc#1000662
| Advisory ID | SUSE-RU-2017:1160-1
|
| Released | Fri Jul 14 17:20:26 2017 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | low |
| References | 1031702 |
Description:
This update for openldap2 provides the following fix:
- Fix a regression in handling of non-blocking connection (bsc#1031702)
| Advisory ID | SUSE-SU-2017:1174-1
|
| Released | Wed Jul 19 11:12:51 2017 |
| Summary | Security update for systemd, dracut |
| Type | security |
| Severity | important |
| References | 1032029,1033238,1037120,1040153,1040968,1043900,1045290,1046750,986216,CVE-2017-9445 |
Description:
This update for systemd and dracut fixes the following issues:
Security issues fixed:
- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
from a DNS server. (bsc#1045290)
Non-security issues fixed in systemd:
- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)
Non-security issues fixed in dracut:
- Bail out if module directory does not exist. (bsc#1043900)
- Suppress bogus error message. (bsc#1032029)
- Fix module force loading with systemd. (bsc#986216)
- Ship udev files required by systemd. (bsc#1040153)
- Ignore module resolution errors (e.g. with kgraft). (bsc#1037120)
| Advisory ID | SUSE-RU-2017:1222-1
|
| Released | Wed Jul 26 17:15:18 2017 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | low |
| References | 1034563,1039941 |
Description:
This update for procps provides the following fixes:
- Make pmap handle LazyFree in /proc/smaps (bsc#1034563)
- Allow reading and writing content lines longer than 1024 characters under /proc/sys (bsc#1039941)
- Avoid printing messages when /proc/sys/net/ipv6/conf/*/stable_secret is not set
| Advisory ID | SUSE-SU-2017:1245-1
|
| Released | Thu Aug 3 10:43:15 2017 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1004995,1029102,1029516,1032029,1033238,1036873,1037120,1038865,1040153,1040258,1040614,1040942,1040968,1043758,1043900,1045290,1046750,982303,986216,CVE-2017-9217,CVE-2017-9445 |
Description:
This update for systemd provides several fixes and enhancements.
Security issues fixed:
- CVE-2017-9217: Null pointer dereferencing that could lead to resolved aborting. (bsc#1040614)
- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
from a DNS server. (bsc#1045290)
The update also fixed several non-security bugs:
- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
The database might be missing when upgrading a package which was
shipping no sysv init scripts nor unit files (at the time --save was
called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)
| Advisory ID | SUSE-RU-2017:1268-1
|
| Released | Mon Aug 7 10:09:19 2017 |
| Summary | Recommended update for openssl |
| Type | recommended |
| Severity | moderate |
| References | 1019637,1027079,1027688,1027908,1028281,1028723,1029523,1042392,1044095,1044107,1044175,902364 |
Description:
This update for openssl fixes the following issues including fixes for our ongoing FIPS 140-2 evaluation:
- Remove DES-CBC3-SHA based ciphers from DEFAULT_SUSE to address SWEET32
problem (bsc#1027908)
- Use getrandom syscall instead of reading from /dev/urandom to get
at least 128 bits of entropy to comply with FIPS 140.2 IG 7.14 (bsc#1027079 bsc#1044175)
- Fix x86 extended feature detection (bsc#1029523)
- Allow runtime switching of s390x capabilities via the 'OPENSSL_s390xcap'
environmental variable (bsc#1028723)
- s_client sent empty client certificate (bsc#1028281)
Add back certificate initialization set_cert_key_stuff()
which was removed in a previous update.
- Fix a bug in XTS key handling (bsc#1019637)
- Don't run FIPS power-up self-tests when the checksum files aren't
installed (bsc#1042392)
| Advisory ID | SUSE-SU-2017:1279-1
|
| Released | Mon Aug 7 14:46:40 2017 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1046853,1046858,1047964,1047965,1049344,CVE-2017-10684,CVE-2017-10685,CVE-2017-11112,CVE-2017-11113 |
Description:
This update for ncurses fixes the following issues:
Security issues fixed:
- CVE-2017-11112: Illegal address access in append_acs. (bsc#1047964)
- CVE-2017-11113: Dereferencing NULL pointer in _nc_parse_entry. (bsc#1047965)
- CVE-2017-10684, CVE-2017-10685: Add modified upstream fix from ncurses 6.0 to avoid broken
termcap format (bsc#1046853, bsc#1046858, bsc#1049344)
| Advisory ID | SUSE-RU-2017:1316-1
|
| Released | Thu Aug 10 13:54:27 2017 |
| Summary | Recommended update for cyrus-sasl |
| Type | recommended |
| Severity | moderate |
| References | 1014471,1026825,1044840,938657 |
Description:
This update for cyrus-sasl provides the following fixes:
- Fix SASL GSSAPI mechanism acceptor wrongly returns zero maxbufsize
- Fix unknown authentication mechanism: kerberos5 (bsc#1026825)
- Really use SASLAUTHD_PARAMS variable (bsc#938657)
- Make sure /usr/sbin/rcsaslauthd exists
- Add /usr/sbin/rcsaslauthd symbolic link to /usr/sbin/service (bsc#1014471)
- Silence 'GSSAPI client step 1' debug log message (bsc#1044840)
| Advisory ID | SUSE-SU-2017:1326-1
|
| Released | Fri Aug 11 16:59:04 2017 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | low |
| References | 1038444,CVE-2017-8872 |
Description:
This update for libxml2 fixes the following issues:
Security issues fixed:
- CVE-2017-8872: Out-of-bounds read in htmlParseTryOrFinish. (bsc#1038444)
| Advisory ID | SUSE-RU-2017:1330-1
|
| Released | Mon Aug 14 18:41:29 2017 |
| Summary | Recommended update for sed |
| Type | recommended |
| Severity | low |
| References | 954661 |
Description:
This update for sed provides the following fixes:
- Don't terminate with a segmentation fault if close of last file descriptor fails. (bsc#954661)
| Advisory ID | SUSE-OU-2017:1333-1
|
| Released | Tue Aug 15 17:59:30 2017 |
| Summary | Optional update for libverto |
| Type | optional |
| Severity | low |
| References | 1029561 |
Description:
This update adds the libverto library to OpenStack Cloud Magnum Orchestration channels.
| Advisory ID | SUSE-RU-2017:1334-1
|
| Released | Tue Aug 15 20:09:03 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1048679,874665 |
Description:
This update for systemd fixes the following issues:
- compat-rules: Don't rely on ID_SERIAL when generating 'by-id' links for NVMe devices. (bsc#1048679)
- fstab-generator: Handle NFS 'bg' mounts correctly. (bsc#874665, fate#323464)
- timesyncd: Don't use compiled-in list if FallbackNTP has been configured explicitly.
| Advisory ID | SUSE-SU-2017:1335-1
|
| Released | Wed Aug 16 11:24:21 2017 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1051643,1051644,CVE-2017-1000100,CVE-2017-1000101 |
Description:
This update for curl fixes the following issues:
- CVE-2017-1000100: TFP sends more than buffer size and it could lead to a denial of service (bsc#1051644)
- CVE-2017-1000101: URL globbing out of bounds read could lead to a denial of service (bsc#1051643)
| Advisory ID | SUSE-RU-2017:1347-1
|
| Released | Fri Aug 18 11:03:57 2017 |
| Summary | Recommended update for procps |
| Type | recommended |
| Severity | important |
| References | 1053409 |
Description:
This update for procps fixes the following issues:
- Fix a regression introduced in a previous update that would result in sysctl
dying with a SIGSEGV error (bsc#1053409).
| Advisory ID | SUSE-RU-2017:1349-1
|
| Released | Fri Aug 18 12:31:07 2017 |
| Summary | Recommended update for lua51 |
| Type | recommended |
| Severity | low |
| References | 1051626 |
Description:
This update for lua51 provides the following fixes:
- Add Lua(API) and Lua(devel) symbols to fix building of lua51-luasocket. (bsc#1051626)
| Advisory ID | SUSE-SU-2017:1390-1
|
| Released | Fri Aug 25 15:14:27 2017 |
| Summary | Security update for libzypp |
| Type | security |
| Severity | important |
| References | 1009745,1036659,1038984,1043218,1045735,1046417,1047785,1048315,CVE-2017-7435,CVE-2017-7436,CVE-2017-9269 |
Description:
The Software Update Stack was updated to receive fixes and enhancements.
libzypp:
- CVE-2017-7435, CVE-2017-7436, CVE-2017-9269: Fix GPG check workflows, mainly for unsigned
repositories and packages. (bsc#1045735, bsc#1038984)
- Fix gpg-pubkey release (creation time) computation. (bsc#1036659)
- Update lsof blacklist. (bsc#1046417)
- Re-probe on refresh if the repository type changes. (bsc#1048315)
- Propagate proper error code to DownloadProgressReport. (bsc#1047785)
- Allow to trigger an appdata refresh unconditionally. (bsc#1009745)
- Support custom repo variables defined in /etc/zypp/vars.d.
yast2-pkg-bindings:
- Do not crash when the repository URL is not defined. (bsc#1043218)
| Advisory ID | SUSE-SU-2017:1419-1
|
| Released | Wed Aug 30 15:38:22 2017 |
| Summary | Security update for expat |
| Type | security |
| Severity | moderate |
| References | 1047236,1047240,CVE-2016-9063,CVE-2017-9233 |
Description:
This update for expat fixes the following issues:
- CVE-2016-9063: Possible integer overflow to fix inside XML_Parse leading to unexpected behaviour (bsc#1047240)
- CVE-2017-9233: External Entity Vulnerability could lead to denial of service (bsc#1047236)
| Advisory ID | SUSE-RU-2017:1439-1
|
| Released | Fri Sep 1 15:31:05 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1045384,1045987,1046268,1047379,1048605 |
Description:
This update for systemd fixes the following issues:
- Revert fix for bsc#1004995 which could have caused boot failure on LVM (bsc#1048605)
- compat-rules: drop the bogus 'import everything' rule (bsc#1046268)
- core: use an AF_UNIX/SOCK_DGRAM socket for cgroup agent notification (bsc#1045384 bsc#1047379)
- udev/path_id: introduce support for NVMe devices (bsc#1045987)
| Advisory ID | SUSE-SU-2017:1447-1
|
| Released | Mon Sep 4 15:38:20 2017 |
| Summary | Security update for libzypp, zypper |
| Type | security |
| Severity | important |
| References | 1008325,1038984,1045735,1047785,1054088,1054671,1055920,CVE-2017-7436 |
Description:
The Software Update Stack was updated to receive fixes and enhancements.
libzypp:
- Adapt to work with GnuPG 2.1.23. (bsc#1054088)
- Support signing with subkeys. (bsc#1008325)
- Enhance sort order for media.1/products. (bsc#1054671)
zypper:
- Also show a gpg key's subkeys. (bsc#1008325)
- Improve signature check callback messages. (bsc#1045735)
- Add options to tune the GPG check settings. (bsc#1045735)
- Adapt download callback to report and handle unsigned packages. (bsc#1038984, CVE-2017-7436)
- Report missing/optional files as 'not found' rather than 'error'. (bsc#1047785)
| Advisory ID | SUSE-RU-2017:1450-1
|
| Released | Mon Sep 4 16:36:07 2017 |
| Summary | Recommended update for insserv-compat |
| Type | recommended |
| Severity | low |
| References | 1035062,944903 |
Description:
This update for insserv-compat fixes the following issues:
- Add /etc/init.d hierarchy from former 'filesystem' package. (bsc#1035062)
- Fix directory argument parsing. (bsc#944903)
- Add perl(Getopt::Long) to list of requirements.
| Advisory ID | SUSE-RU-2017:1453-1
|
| Released | Mon Sep 4 21:23:50 2017 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1043333,1046659,1047008 |
Description:
This update for libgcrypt fixes the following issues:
- libgcrypt stored an open file descriptor to the random device in
a static variable between invocations.
gnome-keyring-daemon on initialization reopened descriptors 0-2
with /dev/null which caused an infinite loop when libgcrypt
attempted to read from the random device (bsc#1043333)
- Avoid seeding the DRBG during FIPS power-up selftests (bsc#1046659)
* don't call gcry_drbg_instantiate() in healthcheck sanity test to
save entropy
* turn off blinding for RSA decryption in selftests_rsa to avoid
allocation of a random integer
- fix a bug in gcry_drbg_healthcheck_sanity() which caused skipping
some of the tests (bsc#1046659)
- dlsym returns PLT address on s390x, dlopen libgcrypt20.so before
calling dlsym (bsc#1047008)
| Advisory ID | SUSE-RU-2017:1548-1
|
| Released | Fri Sep 15 18:19:12 2017 |
| Summary | Recommended update for sg3_utils |
| Type | recommended |
| Severity | moderate |
| References | 1005063,1009269,1012523,1025176,1050767,1050943 |
Description:
This update for sg3_utils provides the following fixes:
- Add lunsearch filter to findresized() so that only LUNs specified using --luns are
rescanned or resized. (bsc#1025176)
- In case the VPD sysfs attributes are missing or cannot be accessed, fallback to use
sg_inq --page when using multipath devices in AutoYast2 installations. (bsc#1012523)
- Generate /dev/disk/by-path links based on WWPN for Fibre Channel NPIV setups. (bsc#1005063)
- Fix dumping data in hexadecimal format in sg_vpd when using the --hex option. (bsc#1050943)
- Fix ID_SERIAL values for KVM disks by exporting all NAA values and removing some validity
checking. (bsc#1050767)
- Make sure initrd is rebuilt on sg3_utils updates. (bsc#1009269)
| Advisory ID | SUSE-RU-2017:1592-1
|
| Released | Tue Sep 26 17:38:03 2017 |
| Summary | Recommended update for lvm2 |
| Type | recommended |
| Severity | moderate |
| References | 1028485,1045628,978055,998893,999878 |
Description:
This update for lvm2 provides the following fixes:
- Create /dev/disk/by-part{label,uuid} and gpt-auto-root links. (bsc#1028485)
- Try to refresh clvmd's device cache on the first failure. (bsc#978055)
- Fix stale device cache in clvmd. (bsc#978055)
- Warn if PV size in metadata is larger than disk device size. (bsc#999878)
- Fix lvm2 activation issue when used on top of multipath. (bsc#998893)
| Advisory ID | SUSE-SU-2017:1644-1
|
| Released | Mon Oct 9 07:52:24 2017 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | moderate |
| References | 1032680,1054028,1056995,903543,CVE-2017-11462 |
Description:
This update for krb5 fixes several issues.
This security issue was fixed:
- CVE-2017-11462: Prevent automatic security context deletion to prevent
double-free (bsc#1056995)
These non-security issues were fixed:
- Set 'rdns' and 'dns_canonicalize_hostname' to false in krb5.conf
in order to improve client security in handling service principle
names. (bsc#1054028)
- Prevent kadmind.service startup failure caused by absence of
LDAP service. (bsc#903543)
- Remove main package's dependency on systemd (bsc#1032680)
| Advisory ID | SUSE-RU-2017:1663-1
|
| Released | Tue Oct 10 12:05:09 2017 |
| Summary | Recommended update for dbus-1 |
| Type | recommended |
| Severity | moderate |
| References | 1043615,1046173 |
Description:
This update for dbus-1 provides the following fixes:
- Fix systemd-logind dbus disconnection by ensuring all required timeouts are restarted.
(bsc#1043615)
- Remove call to initscripts related macros from the spec file as dbus-1 does not ship any
initscript anymore. (bsc#1046173)
| Advisory ID | SUSE-RU-2017:1703-1
|
| Released | Tue Oct 17 13:20:12 2017 |
| Summary | Recommended update for audit |
| Type | recommended |
| Severity | low |
| References | 1042781 |
Description:
This update for audit provides the following fix:
- Make auditd start by forking the systemd service to fix some initialization failures.
(bsc#1042781)
| Advisory ID | SUSE-SU-2017:1758-1
|
| Released | Mon Oct 23 08:47:47 2017 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1060653,1061876,1063824,CVE-2017-1000254,CVE-2017-1000257 |
Description:
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2017-1000254: FTP PWD response parser out of bounds read (bsc#1061876)
- CVE-2017-1000257: IMAP FETCH response out of bounds read (bsc#1063824)
Bugs fixed:
- Fixed error 'error:1408F10B:SSL routines' when connecting to ftps via proxy (bsc#1060653)
| Advisory ID | SUSE-RU-2017:1796-1
|
| Released | Fri Oct 27 21:25:06 2017 |
| Summary | Recommended update for pcre |
| Type | recommended |
| Severity | moderate |
| References | 1058722 |
Description:
This update for pcre fixes the following issues:
- Fixed the pcre stack frame size detection because modern compilers
break it due to cloning and inlining pcre match() function (bsc#1058722)
| Advisory ID | SUSE-RU-2017:1797-1
|
| Released | Sat Oct 28 12:06:19 2017 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1028304,1048645,1060738 |
Description:
This update for permissions fixes the following issues:
- Allows users to install the HPC 'singularity' toolkit for managing singularity containers in setuid root mode. (bsc#1028304)
| Advisory ID | SUSE-SU-2017:1826-1
|
| Released | Wed Nov 8 08:47:17 2017 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | important |
| References | 1065274,CVE-2017-15088 |
Description:
This update for krb5 fixes the following issues:
Security issues fixed:
- CVE-2017-15088: A buffer overflow in get_matching_data() was fixed that could under specific circumstances be used to execute code (bsc#1065274)
| Advisory ID | SUSE-SU-2017:1829-1
|
| Released | Wed Nov 8 08:50:00 2017 |
| Summary | Security update for shadow |
| Type | security |
| Severity | moderate |
| References | 1023895,1052261,980486,CVE-2017-12424 |
Description:
This update for shadow fixes several issues.
This security issue was fixed:
- CVE-2017-12424: The newusers tool could have been forced to manipulate
internal data structures in ways unintended by the authors. Malformed input may
have lead to crashes (with a buffer overflow or other memory corruption) or
other unspecified behaviors (bsc#1052261).
These non-security issues were fixed:
- bsc#1023895: Fixed man page to not contain invalid options and also prevent
warnings when using these options in certain settings
- bsc#980486: Reset user in /var/log/tallylog because of the usage of pam_tally2
| Advisory ID | SUSE-SU-2017:1881-1
|
| Released | Wed Nov 22 16:29:58 2017 |
| Summary | Security update for file |
| Type | security |
| Severity | moderate |
| References | 1009966,1063269,910252,910253,913650,913651,917152,996511,CVE-2014-8116,CVE-2014-8117,CVE-2014-9620,CVE-2014-9621,CVE-2014-9653 |
Description:
The GNU file utility was updated to version 5.22.
Security issues fixed:
- CVE-2014-9621: The ELF parser in file allowed remote attackers to cause a denial of service via a long string. (bsc#913650)
- CVE-2014-9620: The ELF parser in file allowed remote attackers to cause a denial of service via a large number of notes. (bsc#913651)
- CVE-2014-9653: readelf.c in file did not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly have unspecified other impact via a crafted ELF file. (bsc#917152)
- CVE-2014-8116: The ELF parser (readelf.c) in file allowed remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. (bsc#910253)
- CVE-2014-8117: softmagic.c in file did not properly limit recursion, which allowed remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. (bsc#910253)
Version update to file version 5.22
- add indirect relative for TIFF/Exif
- restructure elf note printing to avoid repeated messages
- add note limit, suggested by Alexander Cherepanov
- Bail out on partial pread()'s (Alexander Cherepanov)
- Fix incorrect bounds check in file_printable (Alexander Cherepanov)
- PR/405: ignore SIGPIPE from uncompress programs
- change printable -> file_printable and use it in more places for safety
- in ELF, instead of '(uses dynamic libraries)' when PT_INTERP is present print the interpreter name.
Version update to file version 5.21
- there was an incorrect free in magic_load_buffers()
- there was an out of bounds read for some pascal strings
- there was a memory leak in magic lists
- don't interpret strings printed from files using the current
locale, convert them to ascii format first.
- there was an out of bounds read in elf note reads
Update to file version 5.20
- recognize encrypted CDF documents
- add magic_load_buffers from Brooks Davis
- add thumbs.db support
Additional non-security bug fixes:
- Fixed a memory corruption during rpmbuild (bsc#1063269)
- Backport of a fix for an increased printable string length as found in file 5.30 (bsc#996511)
- file command throws 'Composite Document File V2 Document, corrupt: Can't read SSAT' error against excel 97/2003 file format. (bsc#1009966)
| Advisory ID | SUSE-SU-2017:1903-1
|
| Released | Fri Nov 24 16:19:37 2017 |
| Summary | Security update for perl |
| Type | security |
| Severity | moderate |
| References | 1047178,1057721,1057724,999735,CVE-2017-12837,CVE-2017-12883,CVE-2017-6512 |
Description:
This update for perl fixes the following issues:
Security issues fixed:
- CVE-2017-12837: Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before
5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service
(out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive
modifier. (bnc#1057724)
- CVE-2017-12883: Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before
5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information
or cause a denial of service (application crash) via a crafted regular expression with an invalid
'\N{U+...}' escape. (bnc#1057721)
- CVE-2017-6512: Race condition in the rmtree and remove_tree functions in the File-Path module
before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving
directory-permission loosening logic. (bnc#1047178)
Bug fixes:
- backport set_capture_string changes from upstream (bsc#999735)
- reformat baselibs.conf as source validator workaround
| Advisory ID | SUSE-RU-2017:1916-1
|
| Released | Fri Nov 24 20:15:01 2017 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | important |
| References | 1043333,1059723 |
Description:
This update for libgcrypt provides the following fix:
- Fix a regression in a previous update which caused libgcrypt to leak file descriptors
causing failures when starting rtkit-daemon. (bsc#1059723)
| Advisory ID | SUSE-RU-2017:1917-1
|
| Released | Mon Nov 27 13:32:07 2017 |
| Summary | Optional update for gcc7 |
| Type | recommended |
| Severity | low |
| References | 1056437,1062591,1062592 |
Description:
The GNU Compiler GCC 7 is being added to the Toolchain Module by this update.
New features:
- Support for specific IBM Power9 processor instructions.
- Support for specific IBM zSeries z14 processor instructions.
- New packages cross-npvtx-gcc7 and nvptx-tools added to the Toolchain Module for
specific NVIDIA Card offload support.
The update also supplies gcc7 compatible libstdc++, libgcc_s1 and other gcc derived
libraries for the base products of SUSE Linux Enterprise 12.
Various optimizers have been improved in GCC 7, several of bugs fixed, quite some new
warnings added and the error pin-pointing and fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 7 contains a summary of all the changes that have happened:
https://gcc.gnu.org/gcc-7/changes.html
| Advisory ID | SUSE-RU-2017:1965-1
|
| Released | Thu Nov 30 12:48:45 2017 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1047233,1053671,1057188,1057634,1058695,1058783,1059065,1061384,1062561,1064999,661410 |
Description:
The Software Update Stack was updated to receive fixes and enhancements.
libsolv:
- Many fixes and improvements for cleandeps.
- Always create dup rules for 'distupgrade' jobs.
- Use recommends also for ordering packages.
- Fix splitprovides handling with addalreadyrecommended turned off. (bsc#1059065)
- Expose solver_get_recommendations() in bindings.
- Fix bug in solver_prune_to_highest_prio_per_name resulting in bad output from solver_get_recommendations().
- Support 'without' and 'unless' dependencies.
- Use same heuristic as upstream to determine source RPMs.
- Fix memory leak in bindings.
- Add pool_best_solvables() function.
- Fix 64bit integer parsing from RPM headers.
- Enable bzip2 and xz/lzma compression support.
- Enable complex/rich dependencies on distributions with RPM 4.13+.
libzypp:
- Fix media handling in presence of a repo path prefix. (bsc#1062561)
- Fix RepoProvideFile ignoring a repo path prefix. (bsc#1062561)
- Remove unused legacy notify-message script. (bsc#1058783)
- Support multiple product licenses in repomd. (fate#322276)
- Propagate 'rpm --import' errors. (bsc#1057188)
- Fix typos in zypp.conf.
zypper:
- Locale: Fix possible segmentation fault. (bsc#1064999)
- Add summary hint if product is better updated by a different command. This is mainly
used by rolling distributions like openSUSE Tumbleweed to remind their users to use
'zypper dup' to update (not zypper up or patch). (bsc#1061384)
- Unify '(add|modify)(repo|service)' property related arguments.
- Fixed 'add' commands supporting to set only a subset of properties.
- Introduced '-f/-F' as preferred short option for --[no-]refresh in all four commands.
(bsc#661410, bsc#1053671)
- Fix missing package names in installation report. (bsc#1058695)
- Differ between unsupported and packages with unknown support status. (bsc#1057634)
- Return error code '107' if an RPM's %post configuration script fails, but only
if ZYPPER_ON_CODE12_RETURN_107=1 is set in the environment. (bsc#1047233)
| Advisory ID | SUSE-RU-2017:1966-1
|
| Released | Thu Nov 30 13:45:24 2017 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1004995,1035386,1039099,1040800,1045472,1048605,1050152,1053137,1053595,1055641,1063249 |
Description:
This update for systemd fixes the following issues:
- unit: When JobTimeoutSec= is turned off, implicitly turn off JobRunningTimeoutSec= too.
(bsc#1048605, bsc#1004995)
- compat-rules: Generate compat by-id symlinks with 'nvme' prefix missing and warn users
that have broken symlinks. (bsc#1063249)
- compat-rules: Allow to specify the generation number through the kernel command line.
- scsi_id: Fixup prefix for pre-SPC inquiry reply. (bsc#1039099)
- tmpfiles: Remove old ICE and X11 sockets at boot.
- tmpfiles: Silently ignore any path that passes through autofs. (bsc#1045472)
- pam_logind: Skip leading /dev/ from PAM_TTY field before passing it on.
- shared/machine-pool: Fix another mkfs.btrfs checking. (bsc#1053595)
- shutdown: Fix incorrect fscanf() result check.
- shutdown: Don't remount,ro network filesystems. (bsc#1035386)
- shutdown: Don't be fooled when detaching DM devices with BTRFS. (bsc#1055641)
- bash-completion: Add support for --now. (bsc#1053137)
- Add convert-lib-udev-path.sh script to convert /lib/udev directory into a symlink pointing
to /usr/lib/udev when upgrading from SLE11. (bsc#1050152)
- Add a rule to teach hotplug to offline containers transparently. (bsc#1040800)
| Advisory ID | SUSE-RU-2017:1968-1
|
| Released | Thu Nov 30 19:49:33 2017 |
| Summary | Recommended update for coreutils |
| Type | recommended |
| Severity | low |
| References | 1026567,1043059,965780 |
Description:
This update for coreutils provides the following fixes:
- Fix df(1) to no longer interact with excluded file system types, so for example
specifying -x nfs no longer hangs with problematic nfs mounts. (bsc#1026567)
- Ensure df -l no longer interacts with dummy file system types, so for example no
longer hangs with problematic NFS mounted via system.automount(5). (bsc#1043059)
- Significantly speed up df(1) for huge mount lists. (bsc#965780)
| Advisory ID | SUSE-SU-2017:1970-1
|
| Released | Thu Nov 30 22:55:41 2017 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1055825,1056058,1065363,1066242,CVE-2017-3735,CVE-2017-3736 |
Description:
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2017-3735: openssl1,openssl: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
- CVE-2017-3736: openssl: bn_sqrx8x_internal carry bug on x86_64 (bsc#1066242)
- Out of bounds read+crash in DES_fcrypt (bsc#1065363)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
| Advisory ID | SUSE-RU-2017:2021-1
|
| Released | Fri Dec 8 10:11:04 2017 |
| Summary | Recommended update for file |
| Type | recommended |
| Severity | moderate |
| References | 1070878,1070958 |
Description:
This update for file fixes detection of JPEG files.
| Advisory ID | SUSE-RU-2017:2031-1
|
| Released | Mon Dec 11 12:55:57 2017 |
| Summary | Recommended update for gzip |
| Type | recommended |
| Severity | low |
| References | 1067891 |
Description:
This update for gzip provides the following fix:
- Fix mishandling of leading zeros in the end-of-block code (bsc#1067891)
| Advisory ID | SUSE-RU-2017:2036-1
|
| Released | Wed Dec 13 16:34:21 2017 |
| Summary | Recommended update for util-linux |
| Type | recommended |
| Severity | low |
| References | 1039276,1040968,1055446,1066500 |
Description:
This update for util-linux provides the following fixes:
- Allow unmounting of filesystems without calling stat() on the mount point, when '-c' is used.
(bsc#1040968)
- Fix an infinite loop, a crash and report the correct minimum and maximum frequencies in
lscpu for some processors. (bsc#1055446)
- Fix a lscpu failure on Sydney Amazon EC2 region. (bsc#1066500)
- If multiple subvolumes are mounted, report the default subvolume. (bsc#1039276)
| Advisory ID | SUSE-SU-2017:2097-1
|
| Released | Sat Dec 16 01:59:00 2017 |
| Summary | Security update for openssl |
| Type | security |
| Severity | important |
| References | 1071905,1071906,CVE-2017-3737,CVE-2017-3738 |
Description:
This update for openssl fixes the following issues:
- OpenSSL Security Advisory [07 Dec 2017]
* CVE-2017-3737: OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \'error state\' mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. (bsc#1071905)
* CVE-2017-3738: There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. (bsc#1071906)
| Advisory ID | SUSE-RU-2017:2137-1
|
| Released | Thu Dec 21 17:49:12 2017 |
| Summary | Recommended update for dbus-1 |
| Type | recommended |
| Severity | moderate |
| References | 1046173,1071698 |
Description:
This update for dbus-1 provides the following fixes:
- The previously released fix for systemd-logind dbus disconnections was missing in some
parts of the package, so properly apply it. (bsc#1071698)
- Remove call to initscripts related macros from the spec file as dbus-1 does not ship any
initscript anymore. (bsc#1046173)
| Advisory ID | SUSE-RU-2018:4-1
|
| Released | Tue Jan 2 15:58:20 2018 |
| Summary | Recommended update for libzypp, zypper |
| Type | recommended |
| Severity | moderate |
| References | 1057640,1067605,1068708,1071466,969569 |
Description:
The Software Update Stack was updated to receive fixes and enhancements.
libzypp:
- Don't store duplicated locks. (bsc#969569)
- Fix default for solver.allowNameChange. (bsc#1071466)
- Don't filter procs with a different mnt namespace. (bsc#1068708)
- Support repo variables in an URIs host:port component. (bsc#1057640, bsc#1067605)
zypper:
- Update manpage regarding custom repository variable fixes. (bsc#1057640, bsc#1067605)
| Advisory ID | SUSE-RU-2018:38-1
|
| Released | Tue Jan 9 14:56:43 2018 |
| Summary | Recommended update for kmod |
| Type | recommended |
| Severity | low |
| References | 1070209 |
Description:
This update for kmod provides the following fix:
- Fix resolving .TOC. in modules on 4.4 and older kernel (bsc#1070209)
- Fix kernel master build for ppc64le (bsc#1070209)
| Advisory ID | SUSE-SU-2018:55-1
|
| Released | Fri Jan 12 09:45:49 2018 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1051042,1053188,1063675,1064569,1064580,1064583,1070905,1071319,1073231,1074293,CVE-2017-1000408,CVE-2017-1000409,CVE-2017-15670,CVE-2017-15671,CVE-2017-15804,CVE-2017-16997,CVE-2018-1000001 |
Description:
This update for glibc fixes the following issues:
- A privilege escalation bug in the realpath() function has been fixed.
[CVE-2018-1000001, bsc#1074293]
- A memory leak and a buffer overflow in the dynamic ELF loader has been fixed.
[CVE-2017-1000408, CVE-2017-1000409, bsc#1071319]
- An issue in the code handling RPATHs was fixed that could have been exploited
by an attacker to execute code loaded from arbitrary libraries.
[CVE-2017-16997, bsc#1073231]
- A potential crash caused by a use-after-free bug in pthread_create() has been
fixed. [bsc#1053188]
- A bug that prevented users to build shared objects which use the optimized
libmvec.so API has been fixed. [bsc#1070905]
- A memory leak in the glob() function has been fixed. [CVE-2017-15670,
CVE-2017-15671, CVE-2017-15804, bsc#1064569, bsc#1064580, bsc#1064583]
- A bug that would lose the syscall error code value in case of crashes has
been fixed. [bsc#1063675]
| Advisory ID | SUSE-SU-2018:86-1
|
| Released | Wed Jan 17 09:38:17 2018 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1056127,1056128,1056129,1056131,1056132,1056136,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733 |
Description:
This update for ncurses fixes the following issues:
Security issues fixed:
- CVE-2017-13728: Fix infinite loop in the next_char function in comp_scan.c (bsc#1056136).
- CVE-2017-13730: Fix illegal address access in the function _nc_read_entry_source() (bsc#1056131).
- CVE-2017-13733: Fix illegal address access in the fmt_entry function (bsc#1056127).
- CVE-2017-13729: Fix illegal address access in the _nc_save_str (bsc#1056132).
- CVE-2017-13732: Fix illegal address access in the function dump_uses() (bsc#1056128).
- CVE-2017-13731: Fix illegal address access in the function postprocess_termcap() (bsc#1056129).
| Advisory ID | SUSE-SU-2018:88-1
|
| Released | Wed Jan 17 14:41:17 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1069222,1069226,CVE-2017-8816,CVE-2017-8817 |
Description:
This update for curl fixes the following issues:
Security issues fixed:
- CVE-2017-8816: Buffer overrun flaw in the NTLM authentication code (bsc#1069226).
- CVE-2017-8817: Read out of bounds flaw in the FTP wildcard function (bsc#1069222).
| Advisory ID | SUSE-RU-2018:90-1
|
| Released | Wed Jan 17 14:44:33 2018 |
| Summary | Recommended update for lvm2 |
| Type | recommended |
| Severity | low |
| References | 1063051,1067312 |
Description:
This update for lvm2 provides the following fix:
- Backport various upstream fixes for clvmd. (bsc#1063051)
- Don't print error messages on testing the connection to the daemon. (bsc#1063051)
- Fix handling of udev CHANGE events with systemd. (bsc#1067312)
| Advisory ID | SUSE-RU-2018:146-1
|
| Released | Thu Jan 25 11:44:23 2018 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1064397,1065083 |
Description:
This update for openldap2 provides the following fixes:
- Fix a leak of sockets in case of unsuccessful connection attempts. (bsc#1065083)
- Fix a crash that would happen under heavy load when using back-relay. (bsc#1064397)
| Advisory ID | SUSE-SU-2018:149-1
|
| Released | Thu Jan 25 13:38:37 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1077001,CVE-2018-1000007 |
Description:
This update for curl fixes one issues.
This security issue was fixed:
- CVE-2018-1000007: Prevent leaking authentication data to third parties when following redirects (bsc#1077001)
| Advisory ID | SUSE-SU-2018:209-1
|
| Released | Tue Jan 30 10:53:43 2018 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | moderate |
| References | 1056126,1056127,1056128,1056129,1056131,1056132,1056136,CVE-2017-13728,CVE-2017-13729,CVE-2017-13730,CVE-2017-13731,CVE-2017-13732,CVE-2017-13733,CVE-2017-13734 |
Description:
This update for ncurses fixes several issues.
These security issues were fixed:
- CVE-2017-13734: Prevent illegal address access in the _nc_safe_strcat
function in strings.c that might have lead to a remote denial of service attack
(bsc#1056126).
- CVE-2017-13733: Prevent illegal address access in the fmt_entry function in
progs/dump_entry.c that might have lead to a remote denial of service attack
(bsc#1056127).
- CVE-2017-13732: Prevent illegal address access in the function dump_uses() in
progs/dump_entry.c that might have lead to a remote denial of service attack
(bsc#1056128).
- CVE-2017-13731: Prevent illegal address access in the function
postprocess_termcap() in parse_entry.c that might have lead to a remote denial
of service attack (bsc#1056129).
- CVE-2017-13730: Prevent illegal address access in the function
_nc_read_entry_source() in progs/tic.c that might have lead to a remote denial
of service attack (bsc#1056131).
- CVE-2017-13729: Prevent illegal address access in the _nc_save_str function
in alloc_entry.c that might have lead to a remote denial of service attack
(bsc#1056132).
- CVE-2017-13728: Prevent infinite loop in the next_char function in
comp_scan.c that might have lead to a remote denial of service attack
(bsc#1056136).
| Advisory ID | SUSE-SU-2018:213-1
|
| Released | Tue Jan 30 14:36:40 2018 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1048510,1065276,1066156,1068251,1070428,1071558,1074254,1075724,1076308,897422,CVE-2017-15908,CVE-2018-1049 |
Description:
This update for systemd fixes several issues.
This security issue was fixed:
- CVE-2018-1049: Prevent race that can lead to DoS when using automounts (bsc#1076308).
These non-security issues were fixed:
- core: don't choke if a unit another unit triggers vanishes during reload
- delta: don't ignore PREFIX when the given argument is PREFIX/SUFFIX
- delta: extend skip logic to work on full directory paths (prefix+suffix) (bsc#1070428)
- delta: check if a prefix needs to be skipped only once
- delta: skip symlink paths when split-usr is enabled (#4591)
- sysctl: use raw file descriptor in sysctl_write (#7753)
- sd-netlink: don't take possesion of netlink fd from caller on failure (bsc#1074254)
- Fix the regexp used to detect broken by-id symlinks in /etc/crypttab
It was missing the following case: '/dev/disk/by-id/cr_-xxx'.
- sysctl: disable buffer while writing to /proc (bsc#1071558)
- Use read_line() and LONG_LINE_MAX to read values configuration files. (bsc#1071558)
- sysctl: no need to check for eof twice
- def: add new constant LONG_LINE_MAX
- fileio: add new helper call read_line() as bounded getline() replacement
- service: Don't stop unneeded units needed by restarted service (#7526) (bsc#1066156)
- gpt-auto-generator: fix the handling of the value returned by fstab_has_fstype() in add_swap() (#6280)
- gpt-auto-generator: disable gpt auto logic for swaps if at least one is defined in fstab (bsc#897422)
- fstab-util: introduce fstab_has_fstype() helper
- fstab-generator: ignore root=/dev/nfs (#3591)
- fstab-generator: don't process root= if it happens to be 'gpt-auto' (#3452)
- virt: use XENFEAT_dom0 to detect the hardware domain (#6442, #6662) (#7581) (bsc#1048510)
- analyze: replace --no-man with --man=no in the man page (bsc#1068251)
- udev: net_setup_link: don't error out when we couldn't apply link config (#7328)
- Add missing /etc/systemd/network directory
- Fix parsing of features in detect_vm_xen_dom0 (#7890) (bsc#1048510)
- sd-bus: use -- when passing arguments to ssh (#6706)
- systemctl: make sure we terminate the bus connection first, and then close the pager (#3550)
- sd-bus: bump message queue size (bsc#1075724)
- tmpfiles: downgrade warning about duplicate line
| Advisory ID | SUSE-SU-2018:214-1
|
| Released | Tue Jan 30 14:37:42 2018 |
| Summary | Security update for libtasn1 |
| Type | security |
| Severity | moderate |
| References | 1076832,CVE-2018-6003 |
Description:
This update for libtasn1 fixes one issue.
This security issue was fixed:
- CVE-2018-6003: Prevent a stack exhaustion in _asn1_decode_simple_ber
(lib/decoding.c) when decoding BER encoded structure allowed for DoS
(bsc#1076832).
| Advisory ID | SUSE-SU-2018:276-1
|
| Released | Thu Feb 8 17:47:43 2018 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1077993,1078806,1078813,CVE-2016-5131,CVE-2017-15412,CVE-2017-5130 |
Description:
This update for libxml2 fixes one issue.
This security issue was fixed:
- CVE-2017-15412: Prevent use after free when calling XPath extension functions
that allowed remote attackers to cause DoS or potentially RCE (bsc#1077993)
- CVE-2016-5131: Use-after-free vulnerability in libxml2 allowed
remote attackers to cause a denial of service or possibly have
unspecified other impact via vectors related to the XPointer range-to
function. (bsc#1078813)
- CVE-2017-5130: Fixed a potential remote buffer overflow in function
xmlMemoryStrdup() (bsc#1078806)
| Advisory ID | SUSE-RU-2018:291-1
|
| Released | Mon Feb 12 11:50:39 2018 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | low |
| References | 1057452,1076909 |
Description:
This update for bash provides the following fix:
- Allow process group assignment on all kernel versions to fix the usage of debug traps.
(bsc#1057452)
- Fix a crash when filesystem is full. (bsc#1076909)
- Enable multi-byte characters by default.
| Advisory ID | SUSE-SU-2018:314-1
|
| Released | Thu Feb 15 14:47:35 2018 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1037930,1051791,1073990,1074293,1079036,CVE-2017-12132,CVE-2017-8804,CVE-2018-1000001,CVE-2018-6485,CVE-2018-6551 |
Description:
This update for glibc fixes the following issues:
Security issues fixed:
- CVE-2017-8804: Fix memory leak after deserialization failure in xdr_bytes, xdr_string (bsc#1037930)
- CVE-2017-12132: Reduce EDNS payload size to 1200 bytes (bsc#1051791)
- CVE-2018-6485,CVE-2018-6551: Fix integer overflows in internal memalign and malloc functions (bsc#1079036)
- CVE-2018-1000001: Avoid underflow of malloced area (bsc#1074293)
Non security bugs fixed:
- Release read lock after resetting timeout (bsc#1073990)
| Advisory ID | SUSE-SU-2018:355-1
|
| Released | Mon Feb 26 16:34:46 2018 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1057974,1068588,1071224,1071311,1075801,1077925,CVE-2017-18078 |
Description:
This update for systemd fixes the following issues:
Security issue fixed:
- CVE-2017-18078: tmpfiles: refuse to chown()/chmod() files which are
hardlinked, unless protected_hardlinks sysctl is on. This could be used
by local attackers to gain privileges (bsc#1077925)
Non Security issues fixed:
- core: use id unit when retrieving unit file state (#8038) (bsc#1075801)
- cryptsetup-generator: run cryptsetup service before swap unit (#5480)
- udev-rules: all values can contain escaped double quotes now (#6890)
- strv: fix buffer size calculation in strv_join_quoted()
- tmpfiles: change ownership of symlinks too
- stdio-bridge: Correctly propagate error
- stdio-bridge: remove dead code
- remove bus-proxyd (bsc#1057974)
- core/timer: Prevent timer looping when unit cannot start (bsc#1068588)
- Make systemd-timesyncd use the openSUSE NTP servers by default
Previously systemd-timesyncd used the Google Public NTP servers
time{1..4}.google.com
- Don't ship /usr/lib/systemd/system/tmp.mnt at all (bsc#1071224)
But we still ship a copy in /var.
Users who want to use tmpfs on /tmp are supposed to add a symlink in
/etc/ pointing to the copy shipped in /var.
To support the update path we automatically create the symlink if
tmp.mount in use is located in /usr.
- Enable systemd-networkd on Leap distros only (bsc#1071311)
| Advisory ID | SUSE-RU-2018:375-1
|
| Released | Wed Feb 28 16:33:37 2018 |
| Summary | Recommended update for net-tools |
| Type | recommended |
| Severity | low |
| References | 1009905,1063910 |
Description:
This update for net-tools provides the following fix:
- netstat: fix handling of large socket numbers (bsc#1063910)
| Advisory ID | SUSE-SU-2018:439-1
|
| Released | Fri Mar 9 14:05:22 2018 |
| Summary | Security update for augeas |
| Type | security |
| Severity | low |
| References | 1054171,CVE-2017-7555 |
Description:
This update for augeas fixes the following issues:
Security issue fixed:
- CVE-2017-7555: Fix a memory corruption bug could have lead to arbitrary code execution
by passing crafted strings that would be mis-handled by parse_name() (bsc#1054171).
| Advisory ID | SUSE-SU-2018:443-1
|
| Released | Fri Mar 9 18:02:14 2018 |
| Summary | Security update for glibc |
| Type | security |
| Severity | moderate |
| References | 1081556,CVE-2017-12133 |
Description:
This update for glibc fixes the following issues:
- CVE-2017-12133: Avoid use-after-free read access in clntudp_call (bsc#1081556)
| Advisory ID | SUSE-SU-2018:446-1
|
| Released | Mon Mar 12 13:13:55 2018 |
| Summary | Security update for shadow |
| Type | security |
| Severity | moderate |
| References | 1081294,CVE-2018-7169 |
Description:
This update for shadow fixes the following issues:
- CVE-2018-7169: Fixed an privilege escalation in newgidmap,
which allowed an unprivileged user to be placed in a user namespace where
setgroups(2) is allowed. (bsc#1081294)
| Advisory ID | SUSE-RU-2018:465-1
|
| Released | Thu Mar 15 07:38:52 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1075743,1078358,1081170 |
Description:
This update for systemd fixes the following issues:
- Add dmi/id conditions to 80-acpi-container-hotplug.rules to restrict
the rule that it can only be triggered on Huawei Kunlun 9008, 9016 and
9032 machines. (bsc#1078358, bsc#1081170, bsc#1075743)
| Advisory ID | SUSE-RU-2018:472-1
|
| Released | Thu Mar 15 10:47:40 2018 |
| Summary | Recommended update for libsolv, libzypp, zypper |
| Type | recommended |
| Severity | low |
| References | 1074687,1075449,1076415,1079334,953130 |
Description:
This update for libsolv, libzypp and zypper provides the following fixes:
libsolv:
- Fix a bug that could make fileconflict detection very slow in some cases. (bnc#953130)
- Add new configuration options: ENABLE_RPMDB_LIBRPM and ENABLE_RPMPKG_LIBRPM.
- Add a new function to change the whatprovides data: pool_set_whatprovides.
- Significant improvements in the selection code.
libzypp:
- Make sure deleted keys are also removed from rpmdb. (bsc#1075449)
- plugin: Don't reject header values containing ':'. (bsc#1074687)
- RpmDb::checkPackage: Fix parsing localized rpm output. (bsc#1076415)
zypper:
- Do not recommend cron as it is not a direct dependency of zypper. (bsc#1079334)
| Advisory ID | SUSE-SU-2018:522-1
|
| Released | Thu Mar 22 08:20:46 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1084521,1084524,1084532,CVE-2018-1000120,CVE-2018-1000121,CVE-2018-1000122 |
Description:
This update for curl fixes the following issues:
Following security issues were fixed:
- CVE-2018-1000120: A buffer overflow exists in the FTP URL handling that allowed an attacker to cause a denial of service or possible code execution (bsc#1084521).
- CVE-2018-1000121: A NULL pointer dereference exists in the LDAP code that allowed an attacker to cause a denial of service (bsc#1084524).
- CVE-2018-1000122: A buffer over-read exists in the RTSP+RTP handling code that allowed an attacker to cause a denial of service or information leakage (bsc#1084532).
| Advisory ID | SUSE-SU-2018:567-1
|
| Released | Thu Mar 29 14:02:08 2018 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | moderate |
| References | 1057662,1081725,1083926,1083927,CVE-2018-5729,CVE-2018-5730 |
Description:
This update for krb5 provides the following fixes:
Security issues fixed:
- CVE-2018-5730: DN container check bypass by supplying special crafted data (bsc#1083927).
- CVE-2018-5729: Null pointer dereference in kadmind or DN container check bypass by supplying special crafted data (bsc#1083926).
Non-security issues fixed:
- Make it possible for legacy applications (e.g. SAP Netweaver) to remain compatible with
newer Kerberos. System administrators who are experiencing this kind of compatibility
issues may set the environment variable GSSAPI_ASSUME_MECH_MATCH to a non-empty value,
and make sure the environment variable is visible and effective to the application
startup script. (bsc#1057662)
- Fix a GSS failure in legacy applications by not indicating deprecated GSS mechanisms in
gss_indicate_mech() list. (bsc#1081725)
| Advisory ID | SUSE-SU-2018:594-1
|
| Released | Thu Apr 5 17:22:37 2018 |
| Summary | Security update for libidn |
| Type | security |
| Severity | moderate |
| References | 1056450,CVE-2017-14062 |
Description:
This update for libidn fixes one issues.
This security issue was fixed:
- CVE-2017-14062: Prevent integer overflow in the decode_digit function that
allowed remote attackers to cause a denial of service or possibly have
unspecified other impact (bsc#1056450).
| Advisory ID | SUSE-SU-2018:624-1
|
| Released | Wed Apr 11 18:02:57 2018 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1087102,CVE-2018-0739 |
Description:
This update for openssl fixes the following issues:
- CVE-2018-0739: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7)
could eventually exceed the stack given malicious input with excessive recursion. This could result
in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from
untrusted sources so this is considered safe. (bsc#1087102).
| Advisory ID | SUSE-SU-2018:730-1
|
| Released | Wed Apr 25 14:14:41 2018 |
| Summary | Security update for perl |
| Type | security |
| Severity | moderate |
| References | 1082216,1082233,1082234,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913 |
Description:
This update for perl fixes the following issues:
Security issues fixed:
- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
| Advisory ID | SUSE-RU-2018:736-1
|
| Released | Wed Apr 25 14:23:49 2018 |
| Summary | Recommended update for libsolv, libzypp |
| Type | recommended |
| Severity | moderate |
| References | 1075978,1077635,1079991,1082318,1086602 |
Description:
This update for libsolv, libzypp provides the following fixes:
Changes in libsolv:
- Make sure the product file comes from /etc/products.d for the fallback product search.
(bsc#1086602)
- Also make use of suggests for ordering packages. (bsc#1077635)
- Fix bad assignment in solution refinement that led to a memory leak. (bsc#1075978)
- Use license tag instead of doc in the spec file. (bsc#1082318)
Changes in libzypp:
- Make sure the product file comes from /etc/products.d for the fallback product search.
(bsc#1086602)
- Fix a memory leak in Digest.cc. (bsc#1075978)
- Add /var/lib/gdm to CheckAccessDeleted blacklist to prevent showing superfluous `zypper ps -s`
messages. (bsc#1079991)
| Advisory ID | SUSE-RU-2018:779-1
|
| Released | Wed May 2 22:16:26 2018 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | low |
| References | 1003714,1027925,1069934 |
Description:
This update for rpm provides the following fixes:
- Fix find-lang.sh to handle special case of .qm file paths correctly. (bsc#1027925)
- Add %sle_version macro to suse_macros. (bsc#1003714)
- Added a %rpm_vercmp macro which accepts two versions as parameters and returns -1, 0, 1
if the first version is less than, equal or greater than the second version respectively.
- Added a %pkg_version macro that accepts a package or capability name as argument and
returns the version number of the installed package. If no package provides the argument,
it returns the string '~~~'.
- Added a %pkg_vcmp macro that accepts 3 parameters. The first parameter is a package name
or provided capability name, the second argument is an operator ( < <= = >= > != )
and the third parameter is a version string to be compared to the installed version of
the first argument.
- Added a %pkg_version_cmp macro which accepts a package or capability name as first argument
and a version number as second argument and returns -1, 0, 1 or '~~~'. The number values
have the same meaning as in %rpm_vercmp and the '~~~' string is returned if the package
or capability can't be found. (bsc#1069934)
| Advisory ID | SUSE-RU-2018:797-1
|
| Released | Mon May 7 07:07:38 2018 |
| Summary | Recommended update for gcc7 |
| Type | recommended |
| Severity | important |
| References | 1061667,1068967,1074621,1083290,1083946,1084812,1087550,1087930 |
Description:
This update for gcc7 to 7.3 release fixes the following issues:
- Update to GCC 7.3 release and further updated to gcc-7-branch head (r258812).
- The Spectre v2 mitigation patch for s390x is now included. [bsc#1083946]
- Adds backport of x86 retpoline support via -mindirect-branch=, -mfunction-return= and friends. [bsc#1074621]
- Update includes a fix for chromium build failure. [bsc#1083290]
- Various AArch64 compile fixes are included:
* Picks fix to no longer enable -mpc-relative-literal-loads by default
with --enable-fix-cortex-a53-843419.
* Enable --enable-fix-cortex-a53-843419 for aarch64. [bsc#1084812] [bsc#1087930]
* Enable --enable-fix-cortex-a53-835769 for aarch64.
* Contains fix for PR82445 which is about a RPI1 bootloader miscompile. [bsc#1061667]
* Fixed bogus stack probe instruction on ARM. [bsc#1068967]
- Revert the ios_base::failure ABI back to compatible behavior with the default ABI. [bsc#1087550]
- Fix nvptx offload target compiler install so GCC can pick up
required files. Split out the newlib part into cross-nvptx-newlib7-devel
and avoid conflicts with GCC 8 variant via Provides/Conflicts
of cross-nvptx-newlib-devel.
| Advisory ID | SUSE-SU-2018:939-1
|
| Released | Thu May 17 08:41:30 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1086825,1092098,CVE-2018-1000301 |
Description:
This update for curl fixes several issues:
Security issues fixed:
- CVE-2018-1000301: Fixed a RTSP bad headers buffer over-read could crash the curl client (bsc#1092098)
Non security issues fixed:
- If the DEFAULT_SUSE cipher list is not available use the HIGH cipher alias before failing.
(bsc#1086825)
| Advisory ID | SUSE-RU-2018:974-1
|
| Released | Wed May 23 16:46:50 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1045092,1051465,1066422,1075804,1082485,1084626,1085062,1086785,1087323 |
Description:
This update for systemd provides the following fixes:
- sysusers: Do not append entries after the NIS ones. (bsc#1085062, bsc#1045092)
- sysusers: Also add support for NIS entries in /etc/shadow.
- sysusers: Make sure to reset errno before calling fget*ent().
- coredump: Respect ulimit -c 0 settings. (bsc#1075804)
- systemctl: Don't make up unit states, and don't eat up errors too eagerly. (bsc#1084626)
- systemctl: Don't mangle unit names in check_unit_generic().
- rules, compat-rules: Fix errors detected by the rule syntax checker.
- python: Use raw strings for regexp patterns.
- compat-rules: Make path_id_compat build with meson.
- compat-rules: Get rid of scsi_id when generating compat symlinks for NVMe devices.
(bsc#1051465)
- Fix memory hotplugging.
- systemd: Add offline environmental condition to the udev rules for acpi container to
prevent them from being triggered by the 'udevadm trigger' from user space. (bsc#1082485)
- systemd-udevd: Limit children-max by the available memory. (bsc#1086785, bsc#1066422)
- Rename the tarball to reflect the exact version used, so that it is clear that it
contains some additional patches on top of the upstream version. Use the commit hash in
the name so the exact version can easily be identified. (bsc#1087323)
| Advisory ID | SUSE-SU-2018:977-1
|
| Released | Wed May 23 17:14:16 2018 |
| Summary | Security update for bash |
| Type | security |
| Severity | moderate |
| References | 1000396,1001299,1086247,CVE-2016-0634,CVE-2016-7543 |
Description:
This update for bash fixes the following issues:
Security issues fixed:
- CVE-2016-7543: A code execution possibility via SHELLOPTS+PS4 variable was fixed (bsc#1001299)
- CVE-2016-0634: Arbitrary code execution via malicious hostname was fixed (bsc#1000396)
Non-security issues fixed:
- Fix repeating self-calling of traps due the combination of a non-interactive shell, a trap handler for SIGINT, an
external process in the trap handler, and a SIGINT within the trap after the external process runs. (bsc#1086247)
| Advisory ID | SUSE-RU-2018:978-1
|
| Released | Wed May 23 17:18:39 2018 |
| Summary | Recommended update for zlib |
| Type | recommended |
| Severity | moderate |
| References | 1071321 |
Description:
This update for zlib fixes the following issues:
- Fix a segmentation fault which was raised when converting a negative value into an unsigned integer (bsc#1071321)
| Advisory ID | SUSE-RU-2018:1028-1
|
| Released | Tue Jun 5 13:20:44 2018 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | low |
| References | 1089884 |
Description:
This update for pam fixes the following issues:
- Fix order of accessed configuration files in man page. (bsc#1089884)
| Advisory ID | SUSE-SU-2018:1077-1
|
| Released | Wed Jun 6 11:44:25 2018 |
| Summary | Security update for glibc |
| Type | security |
| Severity | important |
| References | 1086690,1094150,1094154,1094161,CVE-2017-18269,CVE-2018-11236,CVE-2018-11237 |
Description:
This update for glibc fixes the following issues:
- CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary (bsc#1094150)
- CVE-2018-11236: Fix overflow in path length computation (bsc#1094161)
- CVE-2018-11237: Don't write beyond buffer destination in __mempcpy_avx512_no_vzeroupper (bsc#1094154)
Non security bugs fixed:
- Fix crash in resolver on memory allocation failure (bsc#1086690)
| Advisory ID | SUSE-RU-2018:1082-1
|
| Released | Thu Jun 7 12:58:56 2018 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | 1073879,1080078,964063 |
Description:
This update for rpm fixes the following issues:
- Backport support for no_recompute_build_ids macro. (bsc#964063)
- Fix code execution when evaluating common python-related macros. (bsc#1080078)
Additionally, this update adds python3-rpm to the SUSE Linux Enterprise Server.
| Advisory ID | SUSE-SU-2018:1141-1
|
| Released | Fri Jun 15 13:41:08 2018 |
| Summary | Security update for gpg2 |
| Type | security |
| Severity | important |
| References | 1096745,CVE-2018-12020 |
Description:
This update for gpg2 fixes the following security issue:
- CVE-2018-12020: GnuPG mishandled the original filename during decryption and
verification actions, which allowed remote attackers to spoof the output that
GnuPG sends on file descriptor 2 to other programs that use the '--status-fd 2'
option (bsc#1096745)
| Advisory ID | SUSE-RU-2018:1145-1
|
| Released | Fri Jun 15 19:19:51 2018 |
| Summary | Recommended update for openssl |
| Type | recommended |
| Severity | moderate |
| References | 1090765 |
Description:
This update for openssl provides the following fix:
- Suggest libopenssl1_0_0-hmac from libopenssl1_0_0 package to avoid dependency issues
during updates. (bsc#1090765)
| Advisory ID | SUSE-SU-2018:1242-1
|
| Released | Thu Jun 28 13:44:16 2018 |
| Summary | Security update for procps |
| Type | security |
| Severity | moderate |
| References | 1092100,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126 |
Description:
This update for procps fixes the following security issues:
- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
with HOME unset in an attacker-controlled directory, the attacker could have
achieved privilege escalation by exploiting one of several vulnerabilities in
the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
Inbuilt protection in ps maped a guard page at the end of the overflowed
buffer, ensuring that the impact of this flaw is limited to a crash (temporary
denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
corruption in file2strvec function. This allowed a privilege escalation for a
local attacker who can create entries in procfs by starting processes, which
could result in crashes or arbitrary code execution in proc utilities run by
other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
truncation/integer overflow issues (bsc#1092100).
| Advisory ID | SUSE-SU-2018:1276-1
|
| Released | Thu Jul 5 08:36:17 2018 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1097158,1097624,1098592,CVE-2018-0732 |
Description:
This update for openssl fixes the following issues:
- CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based
ciphersuite a malicious server could have sent a very large prime value to the
client. This caused the client to spend an unreasonably long period of time
generating a key for this prime resulting in a hang until the client has
finished. This could be exploited in a Denial Of Service attack (bsc#1097158).
- Blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
| Advisory ID | SUSE-SU-2018:1328-1
|
| Released | Tue Jul 17 08:07:57 2018 |
| Summary | Security update for perl |
| Type | security |
| Severity | important |
| References | 1068565,1082216,1082233,1082234,1096718,CVE-2018-12015,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913 |
Description:
This update for perl fixes the following issues:
These security issue were fixed:
- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
directory-traversal protection mechanism and overwrite arbitrary files
(bsc#1096718)
This non-security issue was fixed:
- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]
| Advisory ID | SUSE-SU-2018:1351-1
|
| Released | Thu Jul 19 09:43:21 2018 |
| Summary | Security update for shadow |
| Type | security |
| Severity | important |
| References | 1099310,CVE-2016-6252 |
Description:
This update for shadow fixes the following issues:
- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
| Advisory ID | SUSE-SU-2018:1400-1
|
| Released | Thu Jul 26 16:32:29 2018 |
| Summary | Security update for util-linux |
| Type | security |
| Severity | moderate |
| References | 1072947,1078662,1080740,1084300,CVE-2018-7738 |
Description:
This update for util-linux fixes the following issues:
This non-security issue was fixed:
- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
by embedding shell commands in a mountpoint name, which was mishandled during a
umount command by a different user (bsc#1084300).
These non-security issues were fixed:
- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
| Advisory ID | SUSE-SU-2018:1413-1
|
| Released | Fri Jul 27 12:41:13 2018 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1064455,1090766,1097410,CVE-2018-0495 |
Description:
This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:
- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
ECDSA signatures (bsc#1097410).
The following other issues were fixed:
- Extended the fipsdrv dsa-sign and dsa-verify commands with the
--algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
| Advisory ID | SUSE-RU-2018:1450-1
|
| Released | Mon Jul 30 10:10:45 2018 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | low |
| References | 1096282 |
Description:
This update for pam provides the following fix:
- Added /etc/security/limits.d to the pam package. (bsc#1096282)
| Advisory ID | SUSE-RU-2018:1549-1
|
| Released | Mon Aug 13 13:41:22 2018 |
| Summary | Recommended update for sg3_utils |
| Type | recommended |
| Severity | low |
| References | 1065448,1070431,1077787,1092640 |
Description:
This update for sg3_utils provides the following fix:
- Decode standard INQUIRY for CD-ROMs correctly. (bsc#1065448, bsc#1070431)
- Fix page decoding. (bsc#1077787)
- Remove initrd rebuild macros for libsgutils2 subpackage. (bsc#1092640)
- Use %post -p for ldconfig. (bsc#1092640)
| Advisory ID | SUSE-SU-2018:1610-1
|
| Released | Thu Aug 16 14:04:25 2018 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1064455,1090766,1097410,CVE-2018-0495 |
Description:
This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:
- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
ECDSA signatures (bsc#1097410).
The following other issues were fixed:
- Extended the fipsdrv dsa-sign and dsa-verify commands with the
--algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
| Advisory ID | SUSE-SU-2018:1620-1
|
| Released | Thu Aug 16 14:49:45 2018 |
| Summary | Security update for shadow |
| Type | security |
| Severity | important |
| References | 1099310,CVE-2016-6252 |
Description:
This update for shadow fixes the following issues:
- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
| Advisory ID | SUSE-RU-2018:1632-1
|
| Released | Thu Aug 16 15:27:04 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1039099,1080382,1082004,1082485,1083158,1088052,1088769,1088890,1089761,1090785,1091265,1093851,1095096 |
Description:
This update for systemd fixes the following issues:
- core: In --user mode, report READY=1 as soon as basic.target is reached.
- sd-bus: Extend D-Bus authentication timeout considerably.
- scsi_id: Fixup prefix for pre-SPC inquiry reply. (bsc#1039099)
- udev: Use MAC address match only for ibmveth/ibmvnic/mlx4. (bsc#1095096)
- compat-rules: Generate more compat by-id symlinks for NVMe devices. (bsc#1095096)
- udev: Whitelist mlx4_core locally-administered MAC addresses in the persistent rule generator. (bsc#1083158)
- udev: Don't create by-partlabel/primary and .../logical symlinks. (bsc#1089761)
- rules: Add /dev/disk/by-partuuid symlinks also for dos partition tables.
- device: Make sure to always retroactively start device dependencies. (bsc#1088052)
- device: Skip deserialization of device units when udevd is not running.
- install: 'user' and 'global' scopes are equivalent for user presets. (bsc#1093851)
- install: Search preset files in /run.
- man: Updated systemd-analyze blame description for service-units with Type=simple. (bsc#1091265)
- logind: Fix crash when shutdown is not issued from a tty. (bsc#1088890)
- logind: Do not use an uninitialized variable. (bsc#1088890)
- Disable user services by default. (bsc#1090785)
- Ship 99-sysctl.conf instead of creating it during package installation/update. (bsc#1088769)
Previously this symlink was created in /etc/sysctl.d during %post
which made the symlink not owned and more importantly it was created
only if /etc/sysctl.conf is already installed which is not always
the case during the installation process it seems.
So ship the symlink unconditionally and put it in /usr/lib/sysctl.d
instead since it's a distro default behavior that might be overriden
by sysadmin later.
- systemd: Add offline environmental condition to 80-acpi-container-hotplug.rules. (bsc#1080382, bsc#1082485)
Add the offline event environmental condition to restrict the rule
that is can only be triggered when the change event is received with
the 'offline' environmental data. The 27664c581 'ACPI / scan: Send
change uevent with offine environmental data' kernel patch changed
the corresponding code in kernel.
This change prevents the udev rules for acpi container be triggered
by 'udevadm trigger' from user space.
- build-sys: Explicitly require python3. (bsc#1082004)
| Advisory ID | SUSE-RU-2018:1636-1
|
| Released | Thu Aug 16 15:30:11 2018 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | low |
| References | 1096282 |
Description:
This update for pam provides the following fix:
- Added /etc/security/limits.d to the pam package. (bsc#1096282)
| Advisory ID | SUSE-RU-2018:1689-1
|
| Released | Mon Aug 20 09:02:24 2018 |
| Summary | Recommended update for pam |
| Type | recommended |
| Severity | low |
| References | 1096282 |
Description:
This update for pam provides the following fix:
- Added /etc/security/limits.d to the pam package. (bsc#1096282)
| Advisory ID | SUSE-RU-2018:1691-1
|
| Released | Mon Aug 20 09:04:17 2018 |
| Summary | Recommended update for sg3_utils |
| Type | recommended |
| Severity | low |
| References | 1065448,1070431,1077787,1092640 |
Description:
This update for sg3_utils provides the following fix:
- Decode standard INQUIRY for CD-ROMs correctly. (bsc#1065448, bsc#1070431)
- Fix page decoding. (bsc#1077787)
- Remove initrd rebuild macros for libsgutils2 subpackage. (bsc#1092640)
- Use %post -p for ldconfig. (bsc#1092640)
| Advisory ID | SUSE-SU-2018:1695-1
|
| Released | Mon Aug 20 09:19:20 2018 |
| Summary | Security update for perl |
| Type | security |
| Severity | important |
| References | 1068565,1082216,1082233,1082234,1096718,CVE-2018-12015,CVE-2018-6797,CVE-2018-6798,CVE-2018-6913 |
Description:
This update for perl fixes the following issues:
These security issue were fixed:
- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216).
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233).
- CVE-2018-6797: Fixed sharp-s regexp overflow (bsc#1082234).
- CVE-2018-12015: The Archive::Tar module allowed remote attackers to bypass a
directory-traversal protection mechanism and overwrite arbitrary files
(bsc#1096718)
This non-security issue was fixed:
- fix debugger crash in tab completion with Term::ReadLine::Gnu [bsc#1068565]
| Advisory ID | SUSE-SU-2018:1698-1
|
| Released | Mon Aug 20 09:19:28 2018 |
| Summary | Security update for shadow |
| Type | security |
| Severity | important |
| References | 1099310,CVE-2016-6252 |
Description:
This update for shadow fixes the following issues:
- CVE-2016-6252: Incorrect integer handling could results in local privilege escalation (bsc#1099310)
| Advisory ID | SUSE-RU-2018:1834-1
|
| Released | Wed Sep 5 10:17:42 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | moderate |
| References | 1089761,1090944,1101040,1103910 |
Description:
This update for systemd fixes the following issues:
- cryptsetup: Add support for sector-size= option. (fate#325634)
- resolved: Apply epoch to system time from PID 1. (bsc#1103910)
- core/service: Rework the hold-off time over message.
- core: Don't freeze OnCalendar= timer units when the clock goes back a lot. (bsc#1090944)
- man: SystemMaxUse= clarification in journald.conf(5). (bsc#1101040)
- Add udev.no-partlabel-links kernel command-line option. This option can be used to disable
the generation of the by-partlabel symlinks regardless of the name used. (bsc#1089761)
| Advisory ID | SUSE-SU-2018:1903-1
|
| Released | Fri Sep 14 12:46:21 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1089533,1106019,CVE-2018-14618 |
Description:
This update for curl fixes the following issues:
This security issue was fixed:
- CVE-2018-14618: Prevent integer overflow in the NTLM authentication code (bsc#1106019)
This non-security issue was fixed:
- Fixed erroneous debug message when paired with OpenSSL (bsc#1089533)
| Advisory ID | SUSE-SU-2018:1969-1
|
| Released | Mon Sep 24 08:06:42 2018 |
| Summary | Security update for libzypp, zypper |
| Type | security |
| Severity | important |
| References | 1036304,1045735,1049825,1070851,1076192,1088705,1091624,1092413,1096803,1099847,1100028,1101349,1102429,CVE-2017-9269,CVE-2018-7685 |
Description:
This update for libzypp, zypper fixes the following issues:
Update libzypp to version 16.17.20:
Security issues fixed:
- PackageProvider: Validate deta rpms before caching (bsc#1091624,
bsc#1088705, CVE-2018-7685)
- PackageProvider: Validate downloaded rpm package signatures before
caching (bsc#1091624, bsc#1088705, CVE-2018-7685)
Other bugs fixed:
- lsof: use '-K i' if lsof supports it (bsc#1099847, bsc#1036304)
- Handle http error 502 Bad Gateway in curl backend (bsc#1070851)
- RepoManager: Explicitly request repo2solv to generate application
pseudo packages.
- libzypp-devel should not require cmake (bsc#1101349)
- HardLocksFile: Prevent against empty commit without Target having
been been loaded (bsc#1096803)
- Avoid zombie tar processes (bsc#1076192)
Update to zypper to version 1.13.45:
Security issues fixed:
- Improve signature check callback messages (bsc#1045735, CVE-2017-9269)
- add/modify repo: Add options to tune the GPG check settings
(bsc#1045735, CVE-2017-9269)
Other bugs fixed:
- XML attribute `packages-to-change` added (bsc#1102429)
- man: Strengthen that `--config FILE' affects zypper.conf,
not zypp.conf (bsc#1100028)
- Prevent nested calls to exit() if aborted by a signal (bsc#1092413)
- ansi.h: Prevent ESC sequence strings from going out of scope (bsc#1092413)
- Fix: zypper bash completion expands non-existing options (bsc#1049825)
- Improve signature check callback messages (bsc#1045735)
- add/modify repo: Add options to tune the GPG check settings (bsc#1045735)
| Advisory ID | SUSE-RU-2018:1985-1
|
| Released | Mon Sep 24 11:56:08 2018 |
| Summary | Recommended update for openldap2 |
| Type | recommended |
| Severity | moderate |
| References | 1089640 |
Description:
This update for openldap2 provides the following fix:
- Fix slapd segfaults in mdb_env_reader_dest. (bsc#1089640)
| Advisory ID | SUSE-SU-2018:1994-1
|
| Released | Mon Sep 24 12:55:57 2018 |
| Summary | Security update for shadow |
| Type | security |
| Severity | moderate |
| References | 1106914 |
Description:
This update for shadow fixes the following security issue:
- Prevent useradd from creating intermediate directories with mode 0777 (bsc#1106914)
| Advisory ID | SUSE-SU-2018:2069-1
|
| Released | Fri Sep 28 08:01:25 2018 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1089039,1101246,1101470,1104789,1106197,997043,CVE-2018-0737 |
Description:
This update for openssl fixes the following issues:
These security issues were fixed:
- Prevent One&Done side-channel attack on RSA that allowed physically near
attackers to use EM emanations to recover information (bsc#1104789)
- CVE-2018-0737: The RSA Key generation algorithm has been shown to be
vulnerable to a cache timing side channel attack. An attacker with sufficient
access to mount cache timing attacks during the RSA key generation process
could have recovered the private key (bsc#1089039)
These non-security issues were fixed:
- Add openssl(cli) Provide so the packages that require the openssl
binary can require this instead of the new openssl meta package
(bsc#1101470)
- Fixed path to the engines which are under /lib64 on SLE-12 (bsc#1101246,
bsc#997043)
| Advisory ID | SUSE-RU-2018:2162-1
|
| Released | Fri Oct 5 14:46:53 2018 |
| Summary | Recommended update for krb5 |
| Type | recommended |
| Severity | moderate |
| References | 1088921 |
Description:
This update for krb5 provides the following fix:
- Resolve krb5 GSS credentials immediately if the application requests the lifetime.
(bsc#1088921)
| Advisory ID | SUSE-SU-2018:2181-1
|
| Released | Tue Oct 9 11:08:20 2018 |
| Summary | Security update for libxml2 |
| Type | security |
| Severity | moderate |
| References | 1088279,1088601,1102046,1105166,CVE-2017-18258,CVE-2018-14404,CVE-2018-14567,CVE-2018-9251 |
Description:
This update for libxml2 fixes the following security issues:
- CVE-2018-9251: The xz_decomp function allowed remote attackers to cause a
denial of service (infinite loop) via a crafted XML file that triggers
LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint (bsc#1088279).
- CVE-2018-14567: Prevent denial of service (infinite loop) via a crafted XML
file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint
(bsc#1105166).
- CVE-2018-14404: Prevent NULL pointer dereference in the xmlXPathCompOpEval()
function when parsing an invalid XPath expression in the XPATH_OP_AND or
XPATH_OP_OR case leading to a denial of service attack (bsc#1102046).
- CVE-2017-18258: The xz_head function allowed remote attackers to cause a
denial of service (memory consumption) via a crafted LZMA file, because the
decoder functionality did not restrict memory usage to what is required for a
legitimate file (bsc#1088601).
| Advisory ID | SUSE-RU-2018:2196-1
|
| Released | Thu Oct 11 07:45:16 2018 |
| Summary | Optional update for gcc8 |
| Type | recommended |
| Severity | low |
| References | 1084812,1084842,1087550,1094222,1102564 |
Description:
The GNU Compiler GCC 8 is being added to the Toolchain Module by this
update.
The update also supplies gcc8 compatible libstdc++, libgcc_s1 and other
gcc derived libraries for the base products of SUSE Linux Enterprise 12.
Various optimizers have been improved in GCC 8, several of bugs fixed,
quite some new warnings added and the error pin-pointing and
fix-suggestions have been greatly improved.
The GNU Compiler page for GCC 8 contains a summary of all the changes that
have happened:
https://gcc.gnu.org/gcc-8/changes.html
Also changes needed or common pitfalls when porting software are described on:
https://gcc.gnu.org/gcc-8/porting_to.html
| Advisory ID | SUSE-RU-2018:2217-1
|
| Released | Fri Oct 12 15:07:24 2018 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | moderate |
| References | 1094121,1107430 |
Description:
This update for bash provides the following fixes:
- Fix an inconsistent behaviour regarding expansion of here strings. (bsc#1094121)
- Fix mis-matching of null string with '*' pattern. (bsc#1107430)
- Fix a crash when the lastpipe option is enabled.
- Fix a typo that was preventing the `compat42' shopt option from working as intended.
- Help the shell to process any pending traps at redirection.
- Fix a crashe due to incorrect conversion from an indexed to associative array.
- Avoid the expansion of escape sequences in HOSTNAME in prompt.
- Avoid `xtrace' attack over $PS4.
| Advisory ID | SUSE-SU-2018:2373-1
|
| Released | Mon Oct 22 14:43:47 2018 |
| Summary | Security update for rpm |
| Type | security |
| Severity | moderate |
| References | 1077692,943457,CVE-2017-7500,CVE-2017-7501 |
Description:
This update for rpm fixes the following issues:
These security issues were fixed:
- CVE-2017-7500: rpm did not properly handle RPM installations when a
destination path was a symbolic link to a directory, possibly changing
ownership and permissions of an arbitrary directory, and RPM files being placed
in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
installing an RPM. An attacker with ability to write in a directory where files
will be installed could create symbolic links to an arbitrary location and
modify content, and possibly permissions to arbitrary files, which could be
used for denial of service or possibly privilege escalation (bsc#943457)
This non-security issue was fixed:
- Use ksym-provides tool [bsc#1077692]
| Advisory ID | SUSE-RU-2018:2435-1
|
| Released | Wed Oct 24 14:42:43 2018 |
| Summary | Recommended update for systemd |
| Type | recommended |
| Severity | important |
| References | 1015254,1091677,1093753,1105031,1107640,1107941,1109197,991901 |
Description:
This update for systemd fixes the following issues:
- detect-virt: do not try to read all of /proc/cpuinfo (bsc#1109197)
- emergency: make sure console password agents don't interfere with the emergency shell
- units: remove udev control socket when systemd stops the socket unit (#4039) (bsc#1015254)
- man: document that 'nofail' also has an effect on ordering
- journald: take leading spaces into account in syslog_parse_identifier
- journal: do not remove multiple spaces after identifier in syslog message
- syslog: fix segfault in syslog_parse_priority()
- journal: fix syslog_parse_identifier()
- tmpfiles: don't adjust qgroups on existing subvolumes (bsc#1093753)
- socket-util: attempt SO_RCVBUFFORCE/SO_SNDBUFFORCE only if SO_RCVBUF/SO_SNDBUF fails (bsc#991901)
- user@.service: don't kill user manager at runlevel switch (bsc#1091677)
- units: make sure user@.service runs with dbus still up
- fix race between daemon-reload and other commands (bsc#1105031)
- nspawn: always use mode 555 for /sys (bsc#1107640)
- cryptsetup: do not define arg_sector_size if libgcrypt is v1.x (#9990)
- Enable or disable machines.target according to the presets (bsc#1107941)
| Advisory ID | SUSE-RU-2018:2475-1
|
| Released | Thu Oct 25 16:56:24 2018 |
| Summary | Recommended update for libzypp |
| Type | recommended |
| Severity | moderate |
| References | 1099982,1109877,408814,556664,939392 |
Description:
This update for libzypp fixes the following issues:
- Add filesize check for downloads with known size (bsc#408814)
- Fix conversion of string and glob to regex when compiling queries
(bsc#1099982, bsc#939392, bsc#556664)
- Fix blocking wait for finished child process (bsc#1109877)
| Advisory ID | SUSE-RU-2018:2488-1
|
| Released | Fri Oct 26 12:39:59 2018 |
| Summary | Recommended update for cpio |
| Type | recommended |
| Severity | low |
| References | 1076810,889138 |
Description:
This update for cpio provides the following fix:
- Remove an obsolete patch that was causing cpio not to preserve folder permissions.
(bsc#1076810, bsc#889138)
| Advisory ID | SUSE-RU-2018:2516-1
|
| Released | Mon Oct 29 16:14:48 2018 |
| Summary | Recommended update for console-setup, kbd |
| Type | recommended |
| Severity | moderate |
| References | 1010880,1027379,1056449,1062303,1069468,1085432,360993,675317,825385,830805,958562,963942,984958 |
Description:
This update for kbd and console-setup provides the following fixes:
Changes in console-setup:
- Add console-setup to SLE 12 to make it possible for kbd to provide converted X keymaps.
(fate#325454, fate#318426)
- Make the package build reproducible. (bsc#1062303)
- Removed unneeded requires to kbd in order to resolve build cycle between kbd and
console-setup. (bsc#963942)
Changes in kbd:
- Update to version 2.0.4, including the following fixes (FATE#325454):
* Disable characters greater than or equal to =U+F000 as they do not work properly.
(bsc#1085432)
* Move initial NumLock handling from systemd back to kbd:
* Add kbdsettings service. (bsc#1010880)
* Exclude numlockbios support for non x86 platforms
* Drop references to KEYTABLE and COMPOSETABLE. (bsc#1010880)
* Drop from some fill-up templates and a couple of sysconfig variables not read by
systemd anymore. (fate#319454)
* Replace references to /var/adm/fillup-templates with new %_fillupdir macro. (bsc#1069468)
* Add vlock.pamd PAM file. (bsc#1056449)
* Enable vlock (bsc#1056449).
* Revert dropping of kdb-legacy requirement as there are still packages and installation
flows that needs this to be present. (bsc#1027379)
* Fix data/keymaps/i386/querty/br-abnt2.map. (bsc#984958)
* Fix missing dependency on coreutils for initrd macros. (bsc#958562)
* Call missing initrd macro at postun. (bsc#958562)
* Add the genmap4systemd.sh tool to generate entries for systemd's kbd-model-map table
from xkeyboard-config converted keymaps. (fate#318426)
* genmap4systemd.sh: Use 'abnt2' model for 'br' layouts, 'jp106' model for 'jp' layouts
and 'microsoftpro' for anything else (instead of 'pc105' previously used). (fate#318426)
* Include xkb layouts from xkeyboard-config converted to console
keymaps. (fate#318426)
* euro.map, euro1.map and euro2.map now produce correct unicode character for Euro sign.
(bsc#360993)
* Drop doshell reference from openvt.1 man page. (bsc#675317)
* Drop the --userwait option as it is not used. (bsc#830805)
* Fix a typo in the mac-querty-layout.inc. (bsc#825385)
| Advisory ID | SUSE-RU-2018:2525-1
|
| Released | Tue Oct 30 09:22:45 2018 |
| Summary | Recommended update for bash |
| Type | recommended |
| Severity | important |
| References | 1113117 |
Description:
This update for bash fixes the following issues:
Recently released update introduced a change of behavior which
resulted in broken customers scripts. (bsc#1113117)
| Advisory ID | SUSE-SU-2018:2563-1
|
| Released | Fri Nov 2 17:09:49 2018 |
| Summary | Security update for curl |
| Type | security |
| Severity | moderate |
| References | 1112758,1113660,CVE-2018-16840,CVE-2018-16842 |
Description:
This update for curl fixes the following issues:
- CVE-2018-16840: A use after free in closing SASL handles was fixed (bsc#1112758)
- CVE-2018-16842: A Out-of-bounds Read in tool_msgs.c was fixed which could lead to crashes (bsc#1113660)
| Advisory ID | SUSE-RU-2018:2567-1
|
| Released | Fri Nov 2 18:59:06 2018 |
| Summary | Recommended update for apparmor |
| Type | recommended |
| Severity | moderate |
| References | 1047937,1057150,1057900,1099452,906858 |
Description:
This update for apparmor provides the following fixes:
- Add profile for usr.bin.lessopen.sh (bsc#906858)
- Fix dovecot apparmor profile (bsc#1057150)
- Fix creating profile rules from scanned logs when the chown operation is used (bsc#1047937)
- Fix the traceroute profile to allow ipv6 usage (bsc#1057900)
- Fix duplicate entry of capability when performing aa-logprof (bsc#1099452)
| Advisory ID | SUSE-RU-2018:2593-1
|
| Released | Wed Nov 7 11:04:00 2018 |
| Summary | Recommended update for rpm |
| Type | recommended |
| Severity | moderate |
| References | 1095148,1113100 |
Description:
This update for rpm fixes the following issues:
- Fix superfluous TOC. dependency on PowerPC64 (bsc#1113100)
- Update to current find-provides.ksyms and find-requires.ksyms
scripts (bsc#1095148)
| Advisory ID | SUSE-SU-2018:2659-1
|
| Released | Wed Nov 14 14:14:41 2018 |
| Summary | Security update for systemd |
| Type | security |
| Severity | important |
| References | 1106923,1108835,1109252,1110445,1111278,1112024,1113083,1113632,1113665,CVE-2018-15686,CVE-2018-15688 |
Description:
This update for systemd fixes the following issues:
Security issues fixed:
- CVE-2018-15688: A buffer overflow vulnerability in the dhcp6 client of systemd allowed a malicious dhcp6 server to overwrite heap memory in systemd-networkd. (bsc#1113632)
- CVE-2018-15686: A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. (bsc#1113665)
Non-security issues fixed:
- dhcp6: split assert_return() to be more debuggable when hit
- core: skip unit deserialization and move to the next one when unit_deserialize() fails
- core: properly handle deserialization of unknown unit types (#6476)
- core: don't create Requires for workdir if 'missing ok' (bsc#1113083)
- logind: use manager_get_user_by_pid() where appropriate
- logind: rework manager_get_{user|session}_by_pid() a bit
- login: fix user@.service case, so we don't allow nested sessions (#8051) (bsc#1112024)
- core: be more defensive if we can't determine per-connection socket peer (#7329)
- socket-util: introduce port argument in sockaddr_port()
- service: fixup ExecStop for socket-activated shutdown (#4120)
- service: Continue shutdown on socket activated unit on termination (#4108) (bsc#1106923)
- cryptsetup: build fixes for 'add support for sector-size= option'
- udev-rules: IMPORT cmdline does not recognize keys with similar names (bsc#1111278)
- core: keep the kernel coredump defaults when systemd-coredump is disabled
- core: shorten main() a bit, split out coredump initialization
- core: set RLIMIT_CORE to unlimited by default (bsc#1108835)
- core/mount: fstype may be NULL
- journald: don't ship systemd-journald-audit.socket (bsc#1109252)
- core: make 'tmpfs' dependencies on swapfs a 'default' dep, not an 'implicit' (bsc#1110445)
- mount: make sure we unmount tmpfs mounts before we deactivate swaps (#7076)
- tmp.mount.hm4: After swap.target (#3087)
- Ship systemd-sysv-install helper via the main package
This script was part of systemd-sysvinit sub-package but it was
wrong since systemd-sysv-install is a script used to redirect
enable/disable operations to chkconfig when the unit targets are
sysv init scripts. Therefore it's never been a SySV init tool.
| Advisory ID | SUSE-SU-2018:2760-1
|
| Released | Thu Nov 22 16:25:38 2018 |
| Summary | Security update for openssl |
| Type | security |
| Severity | moderate |
| References | 1112209,1113534,1113652,1113742,CVE-2018-0734,CVE-2018-5407 |
Description:
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).
Non-security issues fixed:
- Fixed infinite loop in DSA generation with incorrect parameters (bsc#1112209).
| Advisory ID | SUSE-SU-2018:2766-1
|
| Released | Fri Nov 23 17:07:27 2018 |
| Summary | Security update for rpm |
| Type | security |
| Severity | important |
| References | 943457,CVE-2017-7500,CVE-2017-7501 |
Description:
This update for rpm fixes the following issues:
These security issues were fixed:
- CVE-2017-7500: rpm did not properly handle RPM installations when a
destination path was a symbolic link to a directory, possibly changing
ownership and permissions of an arbitrary directory, and RPM files being placed
in an arbitrary destination (bsc#943457).
- CVE-2017-7501: rpm used temporary files with predictable names when
installing an RPM. An attacker with ability to write in a directory where files
will be installed could create symbolic links to an arbitrary location and
modify content, and possibly permissions to arbitrary files, which could be
used for denial of service or possibly privilege escalation (bsc#943457)
This is a reissue of the above security fixes for SUSE Linux Enterprise 12 GA, SP1 and SP2 LTSS,
they have already been released for SUSE Linux Enterprise Server 12 SP3.
| Advisory ID | SUSE-SU-2018:1697-1
|
| Released | Fri Nov 23 17:08:32 2018 |
| Summary | Security update for libgcrypt |
| Type | security |
| Severity | moderate |
| References | 1064455,1090766,1097410,CVE-2018-0495 |
Description:
This update for libgcrypt fixes the following issues:
The following security vulnerability was addressed:
- CVE-2018-0495: Mitigate a novel side-channel attack by enabling blinding for
ECDSA signatures (bsc#1097410).
The following other issues were fixed:
- Extended the fipsdrv dsa-sign and dsa-verify commands with the
--algo parameter for the FIPS testing of DSA SigVer and SigGen (bsc#1064455).
- Ensure libgcrypt20-hmac and libgcrypt20 are installed in the correct order. (bsc#1090766)
| Advisory ID | SUSE-SU-2018:1696-1
|
| Released | Mon Nov 26 17:46:39 2018 |
| Summary | Security update for procps |
| Type | security |
| Severity | moderate |
| References | 1092100,CVE-2018-1122,CVE-2018-1123,CVE-2018-1124,CVE-2018-1125,CVE-2018-1126 |
Description:
This update for procps fixes the following security issues:
- CVE-2018-1122: Prevent local privilege escalation in top. If a user ran top
with HOME unset in an attacker-controlled directory, the attacker could have
achieved privilege escalation by exploiting one of several vulnerabilities in
the config_file() function (bsc#1092100).
- CVE-2018-1123: Prevent denial of service in ps via mmap buffer overflow.
Inbuilt protection in ps maped a guard page at the end of the overflowed
buffer, ensuring that the impact of this flaw is limited to a crash (temporary
denial of service) (bsc#1092100).
- CVE-2018-1124: Prevent multiple integer overflows leading to a heap
corruption in file2strvec function. This allowed a privilege escalation for a
local attacker who can create entries in procfs by starting processes, which
could result in crashes or arbitrary code execution in proc utilities run by
other users (bsc#1092100).
- CVE-2018-1125: Prevent stack buffer overflow in pgrep. This vulnerability was
mitigated by FORTIFY limiting the impact to a crash (bsc#1092100).
- CVE-2018-1126: Ensure correct integer size in proc/alloc.* to prevent
truncation/integer overflow issues (bsc#1092100).
| Advisory ID | SUSE-SU-2018:1618-1
|
| Released | Tue Nov 27 13:39:49 2018 |
| Summary | Security update for util-linux |
| Type | security |
| Severity | moderate |
| References | 1072947,1078662,1080740,1084300,CVE-2018-7738 |
Description:
This update for util-linux fixes the following issues:
This non-security issue was fixed:
- CVE-2018-7738: bash-completion/umount allowed local users to gain privileges
by embedding shell commands in a mountpoint name, which was mishandled during a
umount command by a different user (bsc#1084300).
These non-security issues were fixed:
- Fixed crash loop in lscpu (bsc#1072947).
- Fixed possible segfault of umount -a
- Fixed mount -a on NFS bind mounts (bsc#1080740).
- Fixed lsblk on NVMe (bsc#1078662).
| Advisory ID | SUSE-SU-2018:2824-1
|
| Released | Mon Dec 3 15:34:09 2018 |
| Summary | Security update for ncurses |
| Type | security |
| Severity | important |
| References | 1115929,CVE-2018-19211 |
Description:
This update for ncurses fixes the following issue:
Security issue fixed:
- CVE-2018-19211: Fixed denial of service issue that was triggered by a NULL pointer dereference at function _nc_parse_entry (bsc#1115929).
| Advisory ID | SUSE-RU-2018:2836-1
|
| Released | Wed Dec 5 09:29:31 2018 |
| Summary | Recommended update for apparmor |
| Type | recommended |
| Severity | moderate |
| References | 1111965,1113125 |
Description:
This update for apparmor fixes the following issues:
- Systemd aware apparmor.spec, remove old insserv from spec file (bsc#1113125)
- Fix warnings produced because of use of uninitialized variables (bsc#1111965)
| Advisory ID | SUSE-RU-2018:2840-1
|
| Released | Wed Dec 5 09:57:54 2018 |
| Summary | Recommended update for permissions |
| Type | recommended |
| Severity | moderate |
| References | 1028304,1047247,1050467,1097665,1111251 |
Description:
This update for permissions fixes the following issues:
- Allow setuid root for start-suid tool of singularity (group only) bsc#1028304
- Allow setuid root for authbind binary (bsc#1111251)
- A incorrect error message was adjusted (bsc#1047247 bsc#1097665)
- Make btmp root:utmp (bsc#1050467)
| Advisory ID | SUSE-RU-2018:2841-1
|
| Released | Wed Dec 5 09:59:45 2018 |
| Summary | Recommended update for glibc |
| Type | recommended |
| Severity | moderate |
| References | 1105236,1110661,1112858 |
Description:
This update for glibc fixes the following issues:
- Added more checks for valid ld.so.cache file (bsc#1110661)
- Rewrite elf_machine_load_address using _DYNAMIC symbol (bsc#1112858)
- Always use __IPC_64 on powerpc as required by the kernel (bsc#1105236)
| Advisory ID | SUSE-RU-2018:2906-1
|
| Released | Tue Dec 11 21:48:05 2018 |
| Summary | Recommended update for blog |
| Type | recommended |
| Severity | moderate |
| References | 1071568 |
Description:
This update for blog fixes the following issues:
- Hardening of the console list generation (bsc#1071568)
- Changed description of blog-plymouth in same manner as used by the release notes
| Advisory ID | SUSE-SU-2018:2947-1
|
| Released | Mon Dec 17 08:51:28 2018 |
| Summary | Security update for openldap2 |
| Type | security |
| Severity | moderate |
| References | 1073313,CVE-2017-17740 |
Description:
This update for openldap2 fixes the following issues:
Security issue fixed:
- CVE-2017-17740: When both the nops module and the memberof overlay
are enabled, attempts to free a buffer that was allocated on the stack,
which allows remote attackers to cause a denial of service (slapd crash)
via a member MODDN operation. (bsc#1073313)
| Advisory ID | SUSE-RU-2018:3029-1
|
| Released | Fri Dec 21 17:34:05 2018 |
| Summary | Recommended update for libgcrypt |
| Type | recommended |
| Severity | moderate |
| References | 1117355 |
Description:
This update for libgcrypt provides the following fix:
- Fail selftests when checksum file is missing in FIPS mode only. (bsc#1117355)
| Advisory ID | SUSE-RU-2019:43-1
|
| Released | Tue Jan 8 13:07:17 2019 |
| Summary | Recommended update for acl |
| Type | recommended |
| Severity | low |
| References | 953659 |
Description:
This update for acl fixes the following issues:
- quote: Escape literal backslashes (bsc#953659).
| Advisory ID | SUSE-SU-2019:111-1
|
| Released | Thu Jan 17 14:18:31 2019 |
| Summary | Security update for krb5 |
| Type | security |
| Severity | important |
| References | 1120489,CVE-2018-20217 |
Description:
This update for krb5 fixes the following issues:
Security issue fixed:
- CVE-2018-20217: Fixed an assertion issue with older encryption types (bsc#1120489)
| Advisory ID | SUSE-SU-2019:135-1
|
| Released | Mon Jan 21 13:53:58 2019 |
| Summary | Security update for systemd |
| Type | security |
| Severity | moderate |
| References | 1005023,1076696,1101591,1114981,1115518,1119971,1120323,CVE-2018-16864,CVE-2018-16865,CVE-2018-16866 |
Description:
This update for systemd provides the following fixes:
Security issues fixed:
- CVE-2018-16864, CVE-2018-16865: Fixed two memory corruptions through attacker-controlled alloca()s (bsc#1120323)
- CVE-2018-16866: Fixed an information leak in journald (bsc#1120323)
- Fixed an issue during system startup in relation to encrypted swap disks (bsc#1119971)
Non-security issues fixed:
- core: Queue loading transient units after setting their properties. (bsc#1115518)
- logind: Stop managing VT switches if no sessions are registered on that VT. (bsc#1101591)
- terminal-util: introduce vt_release() and vt_restore() helpers.
- terminal: Unify code for resetting kbd utf8 mode a bit.
- terminal Reset should honour default_utf8 kernel setting.
- logind: Make session_restore_vt() static.
- udev: Downgrade message when settting inotify watch up fails. (bsc#1005023)
- log: Never log into foreign fd #2 in PID 1 or its pre-execve() children. (bsc#1114981)
- udev: Ignore the exit code of systemd-detect-virt for memory hot-add. In SLE-12-SP3,
80-hotplug-cpu-mem.rules has a memory hot-add rule that uses systemd-detect-virt to
detect non-zvm environment. The systemd-detect-virt returns exit failure code when it
detected _none_ state. The exit failure code causes that the hot-add memory block can
not be set to online. (bsc#1076696)
| Advisory ID | SUSE-RU-2019:143-1
|
| Released | Tue Jan 22 14:21:55 2019 |
| Summary | Recommended update for ncurses |
| Type | recommended |
| Severity | important |
| References | 1121450 |
Description:
This update for ncurses fixes the following issues:
- ncurses applications freezing (bsc#1121450)