From sle-updates at lists.suse.com Mon Nov 1 23:17:52 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 00:17:52 +0100 (CET) Subject: SUSE-RU-2021:3588-1: Recommended update for sle-we-release Message-ID: <20211101231752.29FFCFBBB@maintenance.suse.de> SUSE Recommended Update: Recommended update for sle-we-release ______________________________________________________________________________ Announcement ID: SUSE-RU-2021:3588-1 Rating: low References: Affected Products: SUSE Linux Enterprise Workstation Extension 15-SP2 ______________________________________________________________________________ An update that has 0 recommended fixes can now be installed. Description: This update for sle-we-release provides the following fix: - Adjust the EOL date to 2021-12-31. Patch Instructions: To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-WE-15-SP2-2021-3588=1 Package List: - SUSE Linux Enterprise Workstation Extension 15-SP2 (x86_64): sle-we-release-15.2-5.3.3 References: From sle-updates at lists.suse.com Mon Nov 1 23:19:04 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 00:19:04 +0100 (CET) Subject: SUSE-RU-2021:3589-1: moderate: Recommended update for apparmor Message-ID: <20211101231904.5FB8AFBBB@maintenance.suse.de> SUSE Recommended Update: Recommended update for apparmor ______________________________________________________________________________ Announcement ID: SUSE-RU-2021:3589-1 Rating: moderate References: #1191690 Affected Products: SUSE MicroOS 5.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for apparmor fixes the following issues: - Fixed an issue when apparmor provides python2 and python3 libraries with the same name. (bsc#1191690) Patch Instructions: To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE MicroOS 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2021-3589=1 - SUSE Linux Enterprise Module for Server Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2021-3589=1 - SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-3589=1 Package List: - SUSE MicroOS 5.1 (aarch64 s390x x86_64): apparmor-debugsource-2.13.6-3.3.1 apparmor-parser-2.13.6-3.3.1 apparmor-parser-debuginfo-2.13.6-3.3.1 libapparmor-debugsource-2.13.6-3.3.1 libapparmor1-2.13.6-3.3.1 libapparmor1-debuginfo-2.13.6-3.3.1 pam_apparmor-2.13.6-3.3.1 pam_apparmor-debuginfo-2.13.6-3.3.1 - SUSE MicroOS 5.1 (noarch): apparmor-abstractions-2.13.6-3.3.1 - SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64): apache2-mod_apparmor-2.13.6-3.3.1 apache2-mod_apparmor-debuginfo-2.13.6-3.3.1 apparmor-debugsource-2.13.6-3.3.1 - SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): apparmor-debugsource-2.13.6-3.3.1 apparmor-parser-2.13.6-3.3.1 apparmor-parser-debuginfo-2.13.6-3.3.1 libapparmor-debugsource-2.13.6-3.3.1 libapparmor-devel-2.13.6-3.3.1 libapparmor1-2.13.6-3.3.1 libapparmor1-debuginfo-2.13.6-3.3.1 pam_apparmor-2.13.6-3.3.1 pam_apparmor-debuginfo-2.13.6-3.3.1 perl-apparmor-2.13.6-3.3.1 perl-apparmor-debuginfo-2.13.6-3.3.1 python3-apparmor-2.13.6-3.3.1 python3-apparmor-debuginfo-2.13.6-3.3.1 - SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): apparmor-abstractions-2.13.6-3.3.1 apparmor-docs-2.13.6-3.3.1 apparmor-parser-lang-2.13.6-3.3.1 apparmor-profiles-2.13.6-3.3.1 apparmor-utils-2.13.6-3.3.1 apparmor-utils-lang-2.13.6-3.3.1 - SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64): libapparmor1-32bit-2.13.6-3.3.1 libapparmor1-32bit-debuginfo-2.13.6-3.3.1 pam_apparmor-32bit-2.13.6-3.3.1 pam_apparmor-32bit-debuginfo-2.13.6-3.3.1 References: https://bugzilla.suse.com/1191690 From sle-updates at lists.suse.com Tue Nov 2 11:20:46 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 12:20:46 +0100 (CET) Subject: SUSE-RU-2021:3591-1: moderate: Recommended update for man-pages Message-ID: <20211102112046.AFF4EFDAB@maintenance.suse.de> SUSE Recommended Update: Recommended update for man-pages ______________________________________________________________________________ Announcement ID: SUSE-RU-2021:3591-1 Rating: moderate References: #1185534 Affected Products: SUSE Linux Enterprise Module for Basesystem 15-SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for man-pages fixes the following issues: - Added missing manual entry for kernel_lockdown in section 7 (bsc#1185534) Patch Instructions: To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-3591=1 Package List: - SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): man-pages-4.16-13.3.1 References: https://bugzilla.suse.com/1185534 From sle-updates at lists.suse.com Tue Nov 2 11:22:06 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 12:22:06 +0100 (CET) Subject: SUSE-RU-2021:3590-1: moderate: Recommended update for libyui Message-ID: <20211102112206.AD365FDAB@maintenance.suse.de> SUSE Recommended Update: Recommended update for libyui ______________________________________________________________________________ Announcement ID: SUSE-RU-2021:3590-1 Rating: moderate References: #1191130 Affected Products: SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP3 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for libyui fixes the following issues: - Fixed crash in NCurses online update when retracted packages are present (bsc#1191130) Patch Instructions: To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2021-3590=1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-3590=1 - SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-3590=1 Package List: - SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64): libyui-ncurses-rest-api-debugsource-4.1.5-3.6.1 libyui-ncurses-rest-api-devel-4.1.5-3.6.1 libyui-ncurses-rest-api15-4.1.5-3.6.1 libyui-ncurses-rest-api15-debuginfo-4.1.5-3.6.1 libyui-qt-rest-api-debugsource-4.1.5-3.6.1 libyui-qt-rest-api-devel-4.1.5-3.6.1 libyui-qt-rest-api15-4.1.5-3.6.1 libyui-qt-rest-api15-debuginfo-4.1.5-3.6.1 libyui-rest-api-debugsource-4.1.5-3.6.1 libyui-rest-api-devel-4.1.5-3.6.1 libyui-rest-api15-4.1.5-3.6.1 libyui-rest-api15-debuginfo-4.1.5-3.6.1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64): libyui-qt-pkg-debugsource-4.1.5-3.6.1 libyui-qt-pkg-devel-4.1.5-3.6.1 libyui-qt-pkg15-4.1.5-3.6.1 libyui-qt-pkg15-debuginfo-4.1.5-3.6.1 - SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): libyui-debugsource-4.1.5-3.6.1 libyui-devel-4.1.5-3.6.1 libyui-ncurses-debugsource-4.1.5-3.6.1 libyui-ncurses-devel-4.1.5-3.6.1 libyui-ncurses-pkg-debugsource-4.1.5-3.6.1 libyui-ncurses-pkg-devel-4.1.5-3.6.1 libyui-ncurses-pkg15-4.1.5-3.6.1 libyui-ncurses-pkg15-debuginfo-4.1.5-3.6.1 libyui-ncurses-tools-4.1.5-3.6.1 libyui-ncurses15-4.1.5-3.6.1 libyui-ncurses15-debuginfo-4.1.5-3.6.1 libyui-qt-debugsource-4.1.5-3.6.1 libyui-qt-devel-4.1.5-3.6.1 libyui-qt-graph-debugsource-4.1.5-3.6.1 libyui-qt-graph-devel-4.1.5-3.6.1 libyui-qt-graph15-4.1.5-3.6.1 libyui-qt-graph15-debuginfo-4.1.5-3.6.1 libyui-qt15-4.1.5-3.6.1 libyui-qt15-debuginfo-4.1.5-3.6.1 libyui15-4.1.5-3.6.1 libyui15-debuginfo-4.1.5-3.6.1 References: https://bugzilla.suse.com/1191130 From sle-updates at lists.suse.com Tue Nov 2 14:17:51 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 15:17:51 +0100 (CET) Subject: SUSE-RU-2021:3594-1: moderate: Recommended update for python Message-ID: <20211102141751.A3533FDAB@maintenance.suse.de> SUSE Recommended Update: Recommended update for python ______________________________________________________________________________ Announcement ID: SUSE-RU-2021:3594-1 Rating: moderate References: #1175619 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP5 SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that has one recommended fix can now be installed. Description: This update for python provides the following fix: - Set correct value of %python2_package_prefix to python (as expected on SLE-12). (bsc#1175619) Patch Instructions: To install this SUSE Recommended Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2021-3594=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-3594=1 Package List: - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): python-base-debuginfo-2.7.18-28.77.1 python-base-debugsource-2.7.18-28.77.1 python-devel-2.7.18-28.77.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libpython2_7-1_0-2.7.18-28.77.1 libpython2_7-1_0-debuginfo-2.7.18-28.77.1 python-2.7.18-28.77.1 python-base-2.7.18-28.77.1 python-base-debuginfo-2.7.18-28.77.1 python-base-debugsource-2.7.18-28.77.1 python-curses-2.7.18-28.77.1 python-curses-debuginfo-2.7.18-28.77.1 python-debuginfo-2.7.18-28.77.1 python-debugsource-2.7.18-28.77.1 python-demo-2.7.18-28.77.1 python-devel-2.7.18-28.77.1 python-gdbm-2.7.18-28.77.1 python-gdbm-debuginfo-2.7.18-28.77.1 python-idle-2.7.18-28.77.1 python-tk-2.7.18-28.77.1 python-tk-debuginfo-2.7.18-28.77.1 python-xml-2.7.18-28.77.1 python-xml-debuginfo-2.7.18-28.77.1 - SUSE Linux Enterprise Server 12-SP5 (s390x x86_64): libpython2_7-1_0-32bit-2.7.18-28.77.1 libpython2_7-1_0-debuginfo-32bit-2.7.18-28.77.1 python-32bit-2.7.18-28.77.1 python-base-32bit-2.7.18-28.77.1 python-base-debuginfo-32bit-2.7.18-28.77.1 python-debuginfo-32bit-2.7.18-28.77.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): python-doc-2.7.18-28.77.1 python-doc-pdf-2.7.18-28.77.1 References: https://bugzilla.suse.com/1175619 From sle-updates at lists.suse.com Tue Nov 2 14:20:36 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 15:20:36 +0100 (CET) Subject: SUSE-SU-2021:14836-1: important: Security update for transfig Message-ID: <20211102142036.DC032FDAB@maintenance.suse.de> SUSE Security Update: Security update for transfig ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:14836-1 Rating: important References: #1190607 #1190611 #1190612 #1190615 #1190616 #1190617 #1190618 #1192019 Cross-References: CVE-2020-21529 CVE-2020-21530 CVE-2020-21531 CVE-2020-21532 CVE-2020-21533 CVE-2020-21534 CVE-2020-21535 CVE-2021-32280 CVSS scores: CVE-2020-21529 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-21530 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-21531 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-21532 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2020-21533 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2020-21534 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2020-21535 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-32280 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: SUSE Linux Enterprise Server 11-SP4-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for transfig fixes the following issues: Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021) - bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c. - bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c. - bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c. - bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c. - bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c. - bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c. - bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c. - bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server 11-SP4-LTSS: zypper in -t patch slessp4-transfig-14836=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-transfig-14836=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-transfig-14836=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-transfig-14836=1 Package List: - SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64): transfig-3.2.8b-160.16.2 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): transfig-3.2.8b-160.16.2 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ppc64 s390x x86_64): transfig-debuginfo-3.2.8b-160.16.2 transfig-debugsource-3.2.8b-160.16.2 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): transfig-debuginfo-3.2.8b-160.16.2 transfig-debugsource-3.2.8b-160.16.2 References: https://www.suse.com/security/cve/CVE-2020-21529.html https://www.suse.com/security/cve/CVE-2020-21530.html https://www.suse.com/security/cve/CVE-2020-21531.html https://www.suse.com/security/cve/CVE-2020-21532.html https://www.suse.com/security/cve/CVE-2020-21533.html https://www.suse.com/security/cve/CVE-2020-21534.html https://www.suse.com/security/cve/CVE-2020-21535.html https://www.suse.com/security/cve/CVE-2021-32280.html https://bugzilla.suse.com/1190607 https://bugzilla.suse.com/1190611 https://bugzilla.suse.com/1190612 https://bugzilla.suse.com/1190615 https://bugzilla.suse.com/1190616 https://bugzilla.suse.com/1190617 https://bugzilla.suse.com/1190618 https://bugzilla.suse.com/1192019 From sle-updates at lists.suse.com Tue Nov 2 14:25:44 2021 From: sle-updates at lists.suse.com (sle-updates at lists.suse.com) Date: Tue, 2 Nov 2021 15:25:44 +0100 (CET) Subject: SUSE-SU-2021:3593-1: moderate: Security update for binutils Message-ID: <20211102142544.ED8DAFDAB@maintenance.suse.de> SUSE Security Update: Security update for binutils ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:3593-1 Rating: moderate References: #1126826 #1126829 #1126831 #1140126 #1142649 #1143609 #1153768 #1153770 #1157755 #1160254 #1160590 #1163333 #1163744 #1179036 #1179341 #1179898 #1179899 #1179900 #1179901 #1179902 #1179903 #1180451 #1180454 #1180461 #1181452 #1182252 #1183511 #1184620 #1184794 ECO-2373 PM-2767 SLE-18637 SLE-19618 SLE-21561 SLE-7464 SLE-7903 Cross-References: CVE-2019-12972 CVE-2019-14250 CVE-2019-14444 CVE-2019-17450 CVE-2019-17451 CVE-2019-9074 CVE-2019-9075 CVE-2019-9077 CVE-2020-16590 CVE-2020-16591 CVE-2020-16592 CVE-2020-16593 CVE-2020-16598 CVE-2020-16599 CVE-2020-35448 CVE-2020-35493 CVE-2020-35496 CVE-2020-35507 CVE-2021-20197 CVE-2021-20284 CVE-2021-3487 CVSS scores: CVE-2019-12972 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-14250 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVE-2019-14250 (SUSE): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVE-2019-14444 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-14444 (SUSE): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVE-2019-17450 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-17450 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L CVE-2019-17451 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-17451 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2019-9074 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2019-9074 (SUSE): 6.2 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2019-9075 (NVD) : 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2019-9075 (SUSE): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2019-9077 (NVD) : 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVE-2019-9077 (SUSE): 5.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L CVE-2020-16590 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16590 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2020-16591 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16591 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16592 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16592 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16593 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16593 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16598 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16598 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16599 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-16599 (SUSE): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2020-35448 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVE-2020-35448 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVE-2020-35493 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-35493 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-35496 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-35496 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-35507 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2020-35507 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-20197 (NVD) : 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVE-2021-20197 (SUSE): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N CVE-2021-20284 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-20284 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-3487 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVE-2021-3487 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: SUSE OpenStack Cloud Crowbar 9 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud 8 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server 12-SP4-LTSS SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP2-BCL HPE Helion Openstack 8 ______________________________________________________________________________ An update that solves 21 vulnerabilities, contains 7 features and has 8 fixes is now available. Description: This update for binutils fixes the following issues: Update to binutils 2.37: * The GNU Binutils sources now requires a C99 compiler and library to build. * Support for the arm-symbianelf format has been removed. * Support for Realm Management Extension (RME) for AArch64 has been added. * A new linker option '-z report-relative-reloc' for x86 ELF targets has been added to report dynamic relative relocations. * A new linker option '-z start-stop-gc' has been added to disable special treatment of __start_*/__stop_* references when --gc-sections. * A new linker options '-Bno-symbolic' has been added which will cancel the '-Bsymbolic' and '-Bsymbolic-functions' options. * The readelf tool has a new command line option which can be used to specify how the numeric values of symbols are reported. --sym-base=0|8|10|16 tells readelf to display the values in base 8, base 10 or base 16. A sym base of 0 represents the default action of displaying values under 10000 in base 10 and values above that in base 16. * A new format has been added to the nm program. Specifying '--format=just-symbols' (or just using -j) will tell the program to only display symbol names and nothing else. * A new command line option '--keep-section-symbols' has been added to objcopy and strip. This stops the removal of unused section symbols when the file is copied. Removing these symbols saves space, but sometimes they are needed by other tools. * The '--weaken', '--weaken-symbol' and '--weaken-symbols' options supported by objcopy now make undefined symbols weak on targets that support weak symbols. * Readelf and objdump can now display and use the contents of .debug_sup sections. * Readelf and objdump will now follow links to separate debug info files by default. This behaviour can be stopped via the use of the new '-wN' or '--debug-dump=no-follow-links' options for readelf and the '-WN' or '--dwarf=no-follow-links' options for objdump. Also the old behaviour can be restored by the use of the '--enable-follow-debug-links=no' configure time option. The semantics of the =follow-links option have also been slightly changed. When enabled, the option allows for the loading of symbol tables and string tables from the separate files which can be used to enhance the information displayed when dumping other sections, but it does not automatically imply that information from the separate files should be displayed. If other debug section display options are also enabled (eg '--debug-dump=info') then the contents of matching sections in both the main file and the separate debuginfo file *will* be displayed. This is because in most cases the debug section will only be present in one of the files. If however non-debug section display options are enabled (eg '--sections') then the contents of matching parts of the separate debuginfo file will *not* be displayed. This is because in most cases the user probably only wanted to load the symbol information from the separate debuginfo file. In order to change this behaviour a new command line option --process-links can be used. This will allow di0pslay options to applied to both the main file and any separate debuginfo files. * Nm has a new command line option: '--quiet'. This suppresses "no symbols" diagnostic. Update to binutils 2.36: New features in the Assembler: General: * When setting the link order attribute of ELF sections, it is now possible to use a numeric section index instead of symbol name. * Added a .nop directive to generate a single no-op instruction in a target neutral manner. This instruction does have an effect on DWARF line number generation, if that is active. * Removed --reduce-memory-overheads and --hash-size as gas now uses hash tables that can be expand and shrink automatically. X86/x86_64: * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key Locker instructions. * Support non-absolute segment values for lcall and ljmp. * Add {disp16} pseudo prefix to x86 assembler. * Configure with --enable-x86-used-note by default for Linux/x86. ARM/AArch64: * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1, Cortex-R82, Neoverse V1, and Neoverse N2 cores. * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call Stack Recorder Extension) and BRBE (Branch Record Buffer Extension) system registers. * Add support for Armv8-R and Armv8.7-A ISA extensions. * Add support for DSB memory nXS barrier, WFET and WFIT instruction for Armv8.7. * Add support for +csre feature for -march. Add CSR PDEC instruction for CSRE feature in AArch64. * Add support for +flagm feature for -march in Armv8.4 AArch64. * Add support for +ls64 feature for -march in Armv8.7 AArch64. Add atomic 64-byte load/store instructions for this feature. * Add support for +pauth (Pointer Authentication) feature for -march in AArch64. New features in the Linker: * Add --error-handling-script= command line option to allow a helper script to be invoked when an undefined symbol or a missing library is encountered. This option can be suppressed via the configure time switch: --enable-error-handling-script=no. * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark x86-64-{baseline|v[234]} ISA level as needed. * Add -z unique-symbol to avoid duplicated local symbol names. * The creation of PE format DLLs now defaults to using a more secure set of DLL characteristics. * The linker now deduplicates the types in .ctf sections. The new command-line option --ctf-share-types describes how to do this: its default value, share-unconflicted, produces the most compact output. * The linker now omits the "variable section" from .ctf sections by default, saving space. This is almost certainly what you want unless you are working on a project that has its own analogue of symbol tables that are not reflected in the ELF symtabs. New features in other binary tools: * The ar tool's previously unused l modifier is now used for specifying dependencies of a static library. The arguments of this option (or --record-libdeps long form option) will be stored verbatim in the __.LIBDEP member of the archive, which the linker may read at link time. * Readelf can now display the contents of LTO symbol table sections when asked to do so via the --lto-syms command line option. * Readelf now accepts the -C command line option to enable the demangling of symbol names. In addition the --demangle=