SUSE-IU-2024:1182-1: Security update of suse/sl-micro/6.0/baremetal-os-container

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Tue Sep 10 08:31:52 UTC 2024


SUSE Image Update Advisory: suse/sl-micro/6.0/baremetal-os-container
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2024:1182-1
Image Tags        : suse/sl-micro/6.0/baremetal-os-container:2.1.2 , suse/sl-micro/6.0/baremetal-os-container:2.1.2-3.54 , suse/sl-micro/6.0/baremetal-os-container:latest
Image Release     : 3.54
Severity          : important
Type              : security
References        : 1188441 1208690 1216594 1216598 1220724 1221239 1221482 1221940
                        1222992 1223423 1223424 1223425 1226412 1226529 1226586 1228041
                        CVE-2023-38469 CVE-2023-38471 CVE-2024-2961 CVE-2024-33599 CVE-2024-33600
                        CVE-2024-33601 CVE-2024-33602 
-----------------------------------------------------------------

The container suse/sl-micro/6.0/baremetal-os-container was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: 29
Released:    Wed Sep  4 12:41:35 2024
Summary:     Recommended update for gcc13
Type:        recommended
Severity:    important
References:  1188441,1220724,1221239
This update for gcc13 fixes the following issues:

- Update to GCC 13.3 release

- Removed Fiji support from the GCN offload compiler as that is requiring
  Code Object version 3 which is no longer supported by llvm18.
- Avoid combine spending too much compile-time and memory doing nothing
  on s390x.  [bsc#1188441]
- Make requirement to lld version specific to avoid requiring the
  meta-package.
- Fix unwinding for JIT code.  [bsc#1221239] 
- Revert libgccjit dependency change.  [bsc#1220724]

-----------------------------------------------------------------
Advisory ID: 32
Released:    Thu Sep  5 12:12:35 2024
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1221482,1221940,1222992,1223423,1223424,1223425,1228041,CVE-2024-2961,CVE-2024-33599,CVE-2024-33600,CVE-2024-33601,CVE-2024-33602
This update for glibc fixes the following issues:

Fixed security issues:

- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)
- CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bsc#1223423)
- CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bsc#1223424)
- CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bsc#1223424)
- CVE-2024-33601, CVE-2024-33602: netgroup: Use two buffers in addgetnetgrentX (bsc#1223425)
- CVE-2024-2961: iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (bsc#1222992)

Fixed non-security issues:

- Add workaround for invalid use of libc_nonshared.a with non-SUSE libc (bsc#1221482)
- Fix segfault in wcsncmp (bsc#1228041)
- Also include stat64 in the 32-bit libc_nonshared.a workaround (bsc#1221482)
- Avoid creating ULP prologue for _start routine (bsc#1221940)
- Also add libc_nonshared.a workaround to 32-bit x86 compat package (bsc#1221482)
- malloc: Use __get_nprocs on arena_get2
- linux: Use rseq area unconditionally in sched_getcpu

-----------------------------------------------------------------
Advisory ID: 33
Released:    Thu Sep  5 14:13:47 2024
Summary:     Recommended update for dracut
Type:        recommended
Severity:    moderate
References:  1208690,1226412,1226529
This update for dracut fixes the following issues:

- Update to version 059+suse.567.gadd3169d:
  * feat(crypt): force the inclusion of crypttab entries with x-initrd.attach (bsc#1226529)
  * fix(mdraid): try to assemble the missing raid device (bsc#1226412)
  * fix(dracut-install): continue parsing if ldd prints 'cannot be preloaded' (bsc#1208690)

-----------------------------------------------------------------
Advisory ID: 35
Released:    Thu Sep  5 15:38:19 2024
Summary:     Security update for avahi
Type:        security
Severity:    moderate
References:  1216594,1216598,1226586,CVE-2023-38469,CVE-2023-38471
This update for avahi fixes the following issues:

Security issues fixed:

- CVE-2023-38471: Extract host name using avahi_unescape_label (bsc#1216594).
- CVE-2023-38469: Reject overly long TXT resource records (bsc#1216598).

Non-security issue fixed:

- no longer supply bogus services to callbacks (bsc#1226586).


The following package changes have been done:

- glibc-2.38-7.1 updated
- libgcc_s1-13.3.0+git8781-1.1 updated
- libstdc++6-13.3.0+git8781-1.1 updated
- SL-Micro-release-6.0-24.14 updated
- dracut-059+suse.571.g32b61281-1.1 updated
- libcurl4-8.6.0-2.1 updated
- glibc-locale-base-2.38-7.1 updated
- libavahi-common3-0.8-5.1 updated
- libavahi-core7-0.8-5.1 updated
- libavahi-client3-0.8-5.1 updated
- avahi-0.8-5.1 updated
- container:SL-Micro-base-container-2.1.2-3.32 updated


More information about the sle-container-updates mailing list