SUSE-SU-2025:20014-1: important: Security update for openssl-3, libpulp, ulp-macros
SLE-UPDATES
null at suse.de
Wed Jun 4 09:23:17 UTC 2025
# Security update for openssl-3, libpulp, ulp-macros
Announcement ID: SUSE-SU-2025:20014-1
Release Date: 2025-02-03T08:48:39Z
Rating: important
References:
* bsc#1220523
* bsc#1220690
* bsc#1220693
* bsc#1220696
* bsc#1221365
* bsc#1221751
* bsc#1221752
* bsc#1221753
* bsc#1221760
* bsc#1221763
* bsc#1221786
* bsc#1221787
* bsc#1221821
* bsc#1221822
* bsc#1221824
* bsc#1221827
* bsc#1222548
* bsc#1222899
* bsc#1223306
* bsc#1223336
* bsc#1223428
* bsc#1224388
* bsc#1225291
* bsc#1225551
* bsc#1226463
* bsc#1227138
* bsc#1229465
Cross-References:
* CVE-2024-2511
* CVE-2024-4603
* CVE-2024-4741
* CVE-2024-5535
* CVE-2024-6119
CVSS scores:
* CVE-2024-2511 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2511 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-4603 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-4603 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-4741 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5535 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6119 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-6119 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-6119 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* SUSE Linux Micro 6.0
An update that solves five vulnerabilities and has 22 fixes can now be
installed.
## Description:
This update for openssl-3, libpulp, ulp-macros fixes the following issues:
openssl-3: \- CVE-2024-6119: possible denial of service in X.509 name checks
(bsc#1229465) \- CVE-2024-5535: SSL_select_next_proto buffer overread
(bsc#1227138) \- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers
(bsc#1225551) \- CVE-2024-4603: Check DSA parameters for excessive sizes before
validating (bsc#1224388) \- CVE-2024-2511: Fix unconstrained session cache
growth in TLSv1.3 (bsc#1222548) \- FIPS: Deny SHA-1 signature verification in
FIPS provider (bsc#1221365) \- FIPS: RSA keygen PCT requirements. (bsc#1221760,
bsc#1221753) \- FIPS: Check that the fips provider is available before setting
it as the default provider in FIPS mode. (bsc#1220523) \- FIPS: Port openssl to
use jitterentropy (bsc#1220523) \- FIPS: Block non-Approved Elliptic Curves
(bsc#1221786) \- FIPS: Service Level Indicator (bsc#1221365) \- FIPS: Output the
FIPS-validation name and module version which uniquely identify the FIPS
validated module. (bsc#1221751) \- FIPS: Add required selftests (bsc#1221760) \-
FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821) \- FIPS:
Recommendation for Password-Based Key Derivation (bsc#1221827) \- FIPS:
Zeroization is required (bsc#1221752) \- FIPS: Reseed DRBG (bsc#1220690,
bsc#1220693, bsc#1220696) \- FIPS: NIST SP 800-56Brev2 (bsc#1221824) \- FIPS:
Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787) \-
FIPS: Port openssl to use jitterentropy (bsc#1220523) \- FIPS: NIST SP
800-56Arev3 (bsc#1221822) \- FIPS: Error state has to be enforced (bsc#1221753)
\- Build with enabled sm2 and sm4 support (bsc#1222899) \- fix non-reproducible
build issue \- Fix HDKF key derivation (bsc#1225291) \- Enable livepatching
support (bsc#1223428)
libpulp: \- Update package with libpulp-0.3.5 * Change .so load policy from lazy
to eager. * Fix patch of references when mprotect is enabled. * Fix tramposed
calloc arguments. * Fix crash of ulp packer on empty lines.
* Disabled ptrace_scope through aaa_base-enable-ptrace package (bsc#1221763).
* Update package with libpulp-0.3.4:
* Add debuginfo into ulp extract.
* Disabled ptrace_scope when building the package (bsc#1221763).
* Update package with libpulp-0.3.3:
* Fixed a race condition when process list is empty.
* Removed "Unable to get section data" error message (bsc#1223306).
* Bumped asunsafe_conversion attempts from 100 to 2000.
* Fixed banner test on clang-18.
* Check if ptrace_scope is enabled when attempting a ptrace operation (bsc#1221763).
* Update package with libpulp-0.3.1:
* Add timestamp information on `ulp patches`.
ulp-macros: \- Initial release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-58=1
## Package List:
* SUSE Linux Micro 6.0 (x86_64)
* libpulp0-debuginfo-0.3.5-1.1
* libpulp-tools-debuginfo-0.3.5-1.1
* libpulp-debugsource-0.3.5-1.1
* libpulp0-0.3.5-1.1
* libpulp-tools-0.3.5-1.1
* SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
* libopenssl-3-fips-provider-debuginfo-3.1.4-6.1
* openssl-3-debuginfo-3.1.4-6.1
* jitterentropy-devel-3.4.1-3.1
* libopenssl3-3.1.4-6.1
* openssl-3-debugsource-3.1.4-6.1
* openssl-3-3.1.4-6.1
* libopenssl-3-fips-provider-3.1.4-6.1
* libjitterentropy3-3.4.1-3.1
* libopenssl-3-devel-3.1.4-6.1
* libopenssl3-debuginfo-3.1.4-6.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2511.html
* https://www.suse.com/security/cve/CVE-2024-4603.html
* https://www.suse.com/security/cve/CVE-2024-4741.html
* https://www.suse.com/security/cve/CVE-2024-5535.html
* https://www.suse.com/security/cve/CVE-2024-6119.html
* https://bugzilla.suse.com/show_bug.cgi?id=1220523
* https://bugzilla.suse.com/show_bug.cgi?id=1220690
* https://bugzilla.suse.com/show_bug.cgi?id=1220693
* https://bugzilla.suse.com/show_bug.cgi?id=1220696
* https://bugzilla.suse.com/show_bug.cgi?id=1221365
* https://bugzilla.suse.com/show_bug.cgi?id=1221751
* https://bugzilla.suse.com/show_bug.cgi?id=1221752
* https://bugzilla.suse.com/show_bug.cgi?id=1221753
* https://bugzilla.suse.com/show_bug.cgi?id=1221760
* https://bugzilla.suse.com/show_bug.cgi?id=1221763
* https://bugzilla.suse.com/show_bug.cgi?id=1221786
* https://bugzilla.suse.com/show_bug.cgi?id=1221787
* https://bugzilla.suse.com/show_bug.cgi?id=1221821
* https://bugzilla.suse.com/show_bug.cgi?id=1221822
* https://bugzilla.suse.com/show_bug.cgi?id=1221824
* https://bugzilla.suse.com/show_bug.cgi?id=1221827
* https://bugzilla.suse.com/show_bug.cgi?id=1222548
* https://bugzilla.suse.com/show_bug.cgi?id=1222899
* https://bugzilla.suse.com/show_bug.cgi?id=1223306
* https://bugzilla.suse.com/show_bug.cgi?id=1223336
* https://bugzilla.suse.com/show_bug.cgi?id=1223428
* https://bugzilla.suse.com/show_bug.cgi?id=1224388
* https://bugzilla.suse.com/show_bug.cgi?id=1225291
* https://bugzilla.suse.com/show_bug.cgi?id=1225551
* https://bugzilla.suse.com/show_bug.cgi?id=1226463
* https://bugzilla.suse.com/show_bug.cgi?id=1227138
* https://bugzilla.suse.com/show_bug.cgi?id=1229465
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250604/2f0fa7f1/attachment.htm>
More information about the sle-updates
mailing list