SUSE-CU-2024:3206-1: Security update of suse/manager/5.0/x86_64/proxy-ssh

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Thu Jul 18 07:06:46 UTC 2024


SUSE Container Update Advisory: suse/manager/5.0/x86_64/proxy-ssh
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:3206-1
Container Tags        : suse/manager/5.0/x86_64/proxy-ssh:5.0.0 , suse/manager/5.0/x86_64/proxy-ssh:5.0.0.5.8 , suse/manager/5.0/x86_64/proxy-ssh:latest
Container Release     : 5.8
Severity              : important
Type                  : security
References            : 1209627 1218215 1224392 1225551 1225904 1226642 1227318 1227350
                        CVE-2023-51385 CVE-2024-39894 CVE-2024-4741 CVE-2024-6387 
-----------------------------------------------------------------

The container suse/manager/5.0/x86_64/proxy-ssh was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:2024-1
Released:    Thu Jun 13 16:15:18 2024
Summary:     Recommended update for jitterentropy
Type:        recommended
Severity:    moderate
References:  1209627
This update for jitterentropy fixes the following issues:

- Fixed a stack corruption on s390x: [bsc#1209627]
  * Output size of the STCKE command on s390x is 16 bytes, compared
    to 8 bytes of the STCK command. Fix a stack corruption in the
    s390x version of jent_get_nstime(). Add some more detailed
    information on the STCKE command.

Updated to 3.4.1

* add FIPS 140 hints to man page
* simplify the test tool to search for optimal configurations
* fix: jent_loop_shuffle: re-add setting the time that was lost with 3.4.0
* enhancement: add ARM64 assembler code to read high-res timer
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2059-1
Released:    Tue Jun 18 13:11:29 2024
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1225551,CVE-2024-4741
This update for openssl-1_1 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2275-1
Released:    Tue Jul  2 16:33:30 2024
Summary:     Security update for openssh
Type:        security
Severity:    important
References:  1226642,CVE-2024-6387
This update for openssh fixes the following issues:

- CVE-2024-6387: Fixed race condition in a signal handler (bsc#1226642)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2393-1
Released:    Wed Jul 10 17:33:47 2024
Summary:     Security update for openssh
Type:        security
Severity:    moderate
References:  1218215,1224392,1225904,1227318,1227350,CVE-2023-51385,CVE-2024-39894
This update for openssh fixes the following issues:

Security fixes:

- CVE-2024-39894: Fixed timing attacks against echo-off password entry (bsc#1227318).

Other fixes:
- Add obsoletes for openssh-server-config-rootlogin (bsc#1227350).
- Add #include <stdlib.h> in some files added by the ldap patch to
  fix build with gcc14 (bsc#1225904).
- Remove the recommendation for openssh-server-config-rootlogin
  from openssh-server (bsc#1224392).


The following package changes have been done:

- libjitterentropy3-3.4.1-150000.1.12.1 updated
- openssh-common-9.6p1-150600.6.6.1 updated
- libopenssl1_1-1.1.1w-150600.5.3.1 updated
- openssh-fips-9.6p1-150600.6.6.1 updated
- openssh-server-9.6p1-150600.6.6.1 updated
- openssh-clients-9.6p1-150600.6.6.1 updated
- openssh-9.6p1-150600.6.6.1 updated


More information about the sle-container-updates mailing list