SUSE-IU-2023:872-1: Security update of suse-sles-15-sp5-chost-byos-v20231213-hvm-ssd-x86_64

sle-updates at lists.suse.com sle-updates at lists.suse.com
Fri Dec 15 08:01:11 UTC 2023


SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20231213-hvm-ssd-x86_64
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2023:872-1
Image Tags        : suse-sles-15-sp5-chost-byos-v20231213-hvm-ssd-x86_64:20231213
Image Release     : 
Severity          : important
Type              : security
References        : 1041742 1111622 1170175 1176785 1184753 1199282 1200528 1203760
                        1206480 1206667 1206684 1207325 1209998 1210286 1210557 1210660
                        1211427 1212101 1212422 1213915 1214052 1214460 1215427 1215947
                        1215979 1216091 1216377 1216410 1216419 1216664 1216862 1217212
                        1217215 1217573 1217574 CVE-2022-1996 CVE-2022-40897 CVE-2023-2137
                        CVE-2023-22745 CVE-2023-38470 CVE-2023-38473 CVE-2023-4039 CVE-2023-45803
                        CVE-2023-46218 CVE-2023-46219 
-----------------------------------------------------------------

The container suse-sles-15-sp5-chost-byos-v20231213-hvm-ssd-x86_64 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:526-1
Released:    Mon Feb 27 13:52:39 2023
Summary:     Security update for tpm2-0-tss
Type:        security
Severity:    moderate
References:  1207325,CVE-2023-22745
This update for tpm2-0-tss fixes the following issues:

- CVE-2023-22745: Fixed a memory safety issue that could be exploited
  by local attackers with TPM access (bsc#1207325).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4450-1
Released:    Wed Nov 15 10:55:20 2023
Summary:     Recommended update for crypto-policies
Type:        recommended
Severity:    moderate
References:  1209998
This update for crypto-policies fixes the following issues:

  - Enable setting the kernel FIPS mode with the fips-mode-setup and fips-finish-install commands
    (jsc#PED-5041)
  - Adapt fips-mode-setup to use the pbl command from the perl-Bootloader package instead of grubby
    and add a note for transactional systems
  - Ship the man pages for fips-mode-setup and fips-finish-install
  - Make the supported versions change in the update-crypto-policies(8) man page persistent
    (bsc#1209998)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4458-1
Released:    Thu Nov 16 14:38:48 2023
Summary:     Security update for gcc13
Type:        security
Severity:    important
References:  1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,1215427,1216664,CVE-2023-4039
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Work around third party app crash during C++ standard library initialization.  [bsc#1216664]
- Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
- Bump included newlib to version 4.3.0.
- Update to GCC trunk head (r13-5254-g05b9868b182bb9)
- Redo floatn fixinclude pick-up to simply keep what is there.
- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4460-1
Released:    Thu Nov 16 15:00:20 2023
Summary:     Recommended update for rsyslog
Type:        recommended
Severity:    moderate
References:  1210286
This update for rsyslog fixes the following issue:

- fix rsyslog crash in imrelp (bsc#1210286)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4467-1
Released:    Thu Nov 16 17:57:51 2023
Summary:     Security update for python-urllib3
Type:        security
Severity:    moderate
References:  1216377,CVE-2023-45803
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4503-1
Released:    Tue Nov 21 13:25:12 2023
Summary:     Security update for avahi
Type:        security
Severity:    moderate
References:  1215947,1216419,CVE-2023-38470,CVE-2023-38473
This update for avahi fixes the following issues:

- CVE-2023-38470: Ensure each label is at least one byte long (bsc#1215947).
- CVE-2023-38473: Fixed a reachable assertion when parsing a host name (bsc#1216419).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4517-1
Released:    Tue Nov 21 17:30:27 2023
Summary:     Security update for python3-setuptools
Type:        security
Severity:    moderate
References:  1206667,CVE-2022-40897
This update for python3-setuptools fixes the following issues:

- CVE-2022-40897: Fixed Regular Expression Denial of Service (ReDoS) in package_index.py (bsc#1206667).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4534-1
Released:    Thu Nov 23 08:13:57 2023
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    moderate
References:  1041742,1203760,1212422,1215979,1216091
This update for libzypp, zypper fixes the following issues:

- Preliminary disable 'rpm --runposttrans' usage for chrooted systems (bsc#1216091)
- Fix comment typo on zypp.conf (bsc#1215979)
- Attempt to delay %transfiletrigger(postun|in) execution if rpm supports it (bsc#1041742)
- Make sure the old target is deleted before a new one is created (bsc#1203760)
- Return 104 also if info suggests near matches
- Rephrase upgrade message for openSUSE Tumbleweed (bsc#1212422)
- commit: Insert a headline to separate output of different rpm scripts (bsc#1041742)

-----------------------------------------------------------------
Advisory ID: SUSE-feature-2023:4583-1
Released:    Mon Nov 27 10:16:11 2023
Summary:     Feature update for python-psutil
Type:        feature
Severity:    moderate
References:  1111622,1170175,1176785,1184753,1199282
This update for python-psutil, python-requests fixes the following issues:

- update python-psutil to 5.9.1 (bsc#1199282, bsc#1184753, jsc#SLE-24629, jsc#PM-3243, gh#giampaolo/psutil#2043)
- Fix tests: setuptools changed the builddir library path and does not find the
  module from it. Use the installed platlib instead and exclude psutil.tests only later.
- remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS

- Update python-requests to 2.25.1 (bsc#1176785, bsc#1170175, jsc#ECO-3105, jsc#PM-2352, jsc#PED-7192)
- Fixed bug with unintended Authorization header stripping for redirects using default ports (bsc#1111622).


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4619-1
Released:    Thu Nov 30 10:13:52 2023
Summary:     Security update for sqlite3
Type:        security
Severity:    important
References:  1210660,CVE-2023-2137
This update for sqlite3 fixes the following issues:

- CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4659-1
Released:    Wed Dec  6 13:04:57 2023
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1217573,1217574,CVE-2023-46218,CVE-2023-46219
This update for curl fixes the following issues:

- CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573).
- CVE-2023-46219: HSTS long file name clears contents (bsc#1217574).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4671-1
Released:    Wed Dec  6 14:33:41 2023
Summary:     Recommended update for man
Type:        recommended
Severity:    moderate
References:  

This update of man fixes the following problem:

- The 'man' commands is delivered to SUSE Linux Enterprise Micro
  to allow browsing man pages.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4672-1
Released:    Wed Dec  6 14:37:37 2023
Summary:     Security update for suse-build-key
Type:        security
Severity:    important
References:  1216410,1217215
This update for suse-build-key fixes the following issues:

This update runs a import-suse-build-key script.

The previous libzypp-post-script based installation is replaced
with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777).
  - suse-build-key-import.service
  - suse-build-key-import.timer

It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys.
After successful import the timer is disabled.

To manually import them you can also run:

# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc
# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4699-1
Released:    Mon Dec 11 07:02:10 2023
Summary:     Recommended update for gpg2
Type:        recommended
Severity:    moderate
References:  1217212
This update for gpg2 fixes the following issues:

- `dirmngr-client --validate` is broken for DER-encoded files (bsc#1217212)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4723-1
Released:    Tue Dec 12 09:57:51 2023
Summary:     Recommended update for libtirpc
Type:        recommended
Severity:    moderate
References:  1216862
This update for libtirpc fixes the following issue:

- fix sed parsing in specfile (bsc#1216862)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4727-1
Released:    Tue Dec 12 12:27:39 2023
Summary:     Security update for catatonit, containerd, runc
Type:        security
Severity:    important
References:  1200528,CVE-2022-1996

This update of runc and containerd fixes the following issues:

containerd:

- Update to containerd v1.7.8. Upstream release notes:
  https://github.com/containerd/containerd/releases/tag/v1.7.8

    * CVE-2022-1996: Fixed CORS bypass in go-restful (bsc#1200528)

catatonit:

- Update to catatonit v0.2.0.
  * Change license to GPL-2.0-or-later.

- Update to catatont v0.1.7
  * This release adds the ability for catatonit to be used as the only
    process in a pause container, by passing the -P flag (in this mode no
    subprocess is spawned and thus no signal forwarding is done).

- Update to catatonit v0.1.6, which fixes a few bugs -- mainly ones related to
  socket activation or features somewhat adjacent to socket activation (such as
  passing file descriptors).

runc:

- Update to runc v1.1.10. Upstream changelog is available from
  https://github.com/opencontainers/runc/releases/tag/v1.1.10



The following package changes have been done:

- containerd-ctr-1.7.8-150000.103.1 updated
- containerd-1.7.8-150000.103.1 updated
- crypto-policies-20210917.c9d86d1-150400.3.6.1 updated
- curl-8.0.1-150400.5.36.1 updated
- dracut-055+suse.375.g1167ed75-150500.3.15.1 updated
- gpg2-2.2.27-150300.3.8.1 updated
- grub2-i386-pc-2.06-150500.29.11.1 updated
- grub2-x86_64-efi-2.06-150500.29.11.1 updated
- grub2-x86_64-xen-2.06-150500.29.11.1 updated
- grub2-2.06-150500.29.11.1 updated
- kernel-default-5.14.21-150500.55.39.1 updated
- libavahi-client3-0.8-150400.7.10.1 updated
- libavahi-common3-0.8-150400.7.10.1 updated
- libcurl4-8.0.1-150400.5.36.1 updated
- libdevmapper1_03-2.03.22_1.02.196-150500.7.9.1 updated
- libgcc_s1-13.2.1+git7813-150000.1.6.1 updated
- libopeniscsiusr0-0.2.0-150500.46.3.1 updated
- libopenssl1_1-1.1.1l-150500.17.22.1 updated
- libp11-kit0-0.23.22-150500.8.3.1 updated
- libsqlite3-0-3.44.0-150000.3.23.1 updated
- libstdc++6-13.2.1+git7813-150000.1.6.1 updated
- libtirpc-netconfig-1.3.4-150300.3.23.1 updated
- libtirpc3-1.3.4-150300.3.23.1 updated
- libtss2-esys0-3.1.0-150400.3.3.1 added
- libtss2-fapi1-3.1.0-150400.3.3.1 added
- libtss2-mu0-3.1.0-150400.3.3.1 added
- libtss2-rc0-3.1.0-150400.3.3.1 added
- libtss2-sys1-3.1.0-150400.3.3.1 added
- libtss2-tctildr0-3.1.0-150400.3.3.1 added
- libxml2-2-2.10.3-150500.5.11.1 updated
- libzypp-17.31.22-150400.3.43.1 updated
- open-iscsi-2.1.9-150500.46.3.1 updated
- openssl-1_1-1.1.1l-150500.17.22.1 updated
- p11-kit-tools-0.23.22-150500.8.3.1 updated
- p11-kit-0.23.22-150500.8.3.1 updated
- python3-requests-2.25.1-150300.3.6.1 updated
- python3-setuptools-44.1.1-150400.9.6.1 updated
- python3-urllib3-1.25.10-150300.4.9.1 updated
- rsyslog-module-relp-8.2306.0-150400.5.21.1 updated
- rsyslog-8.2306.0-150400.5.21.1 updated
- runc-1.1.10-150000.55.1 updated
- samba-client-libs-4.17.12+git.427.2619dc0bed-150500.3.14.1 updated
- suse-build-key-12.0-150000.8.37.1 updated
- suseconnect-ng-1.4.0~git0.b0f7c25bfdfa-150500.3.6.1 updated
- system-group-hardware-20170617-150400.24.2.1 updated
- system-group-kvm-20170617-150400.24.2.1 updated
- system-group-wheel-20170617-150400.24.2.1 updated
- system-user-nobody-20170617-150400.24.2.1 updated
- tpm2.0-tools-5.2-150400.4.6 added
- vim-data-common-9.0.2103-150500.20.6.1 updated
- vim-9.0.2103-150500.20.6.1 updated
- xen-libs-4.17.2_08-150500.3.15.1 updated
- xen-tools-domU-4.17.2_08-150500.3.15.1 updated
- zypper-1.14.66-150400.3.35.1 updated


More information about the sle-updates mailing list