openSUSE Security Update: Security update for libxls
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0812-1
Rating: moderate
References: #1179532
Cross-References: CVE-2020-27819
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libxls fixes the following issues:
libxsl was updated to release 1.6.2:
* Fix NULL pointer dereferences in the xls2csv tool [boo#1179532]
[CVE-2020-27819]
Update to release 1.6.1
* Enabled decoding of non-Unicode character sets in older (BIFF5) XLS
files.
* Improved string conversion performance in newer files.
update to 1.5.3:
* Allow truncated XLS files
* Fix long-standing "extra column" bug #73
* Support for RSTRING records (rich-text cells in older BIFF5 files)
tidyverse/readxl#611
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-812=1
Package List:
- openSUSE Leap 15.2 (x86_64):
libxls-debuginfo-1.6.2-lp152.2.3.1
libxls-debugsource-1.6.2-lp152.2.3.1
libxls-devel-1.6.2-lp152.2.3.1
libxls-tools-1.6.2-lp152.2.3.1
libxls-tools-debuginfo-1.6.2-lp152.2.3.1
libxlsreader8-1.6.2-lp152.2.3.1
libxlsreader8-debuginfo-1.6.2-lp152.2.3.1
References:
https://www.suse.com/security/cve/CVE-2020-27819.htmlhttps://bugzilla.suse.com/1179532
openSUSE Security Update: Security update for singularity
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0810-1
Rating: moderate
References: #1184147
Cross-References: CVE-2021-29136
CVSS scores:
CVE-2021-29136 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CVE-2021-29136 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for singularity fixes the following issues:
singularity was updated to version 3.7.3:
- Fix for CVE-2021-29136: A dependency used to extract docker/OCI image
layers can be tricked into modifying host files by creating a malicious
layer that has a symlink with the name "." (or "/"), when running as
root.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-810=1
Package List:
- openSUSE Backports SLE-15-SP2 (aarch64 s390x x86_64):
singularity-3.7.3-bp152.2.19.3
References:
https://www.suse.com/security/cve/CVE-2021-29136.htmlhttps://bugzilla.suse.com/1184147
openSUSE Security Update: Security update for libX11
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0807-1
Rating: moderate
References: #1182506
Cross-References: CVE-2021-31535
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libX11 fixes the following issues:
- CVE-2021-31535: Fixed missing request length checks in libX11
(bsc#1182506).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-807=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
libX11-6-1.6.5-lp152.5.15.1
libX11-6-debuginfo-1.6.5-lp152.5.15.1
libX11-debugsource-1.6.5-lp152.5.15.1
libX11-devel-1.6.5-lp152.5.15.1
libX11-xcb1-1.6.5-lp152.5.15.1
libX11-xcb1-debuginfo-1.6.5-lp152.5.15.1
- openSUSE Leap 15.2 (noarch):
libX11-data-1.6.5-lp152.5.15.1
- openSUSE Leap 15.2 (x86_64):
libX11-6-32bit-1.6.5-lp152.5.15.1
libX11-6-32bit-debuginfo-1.6.5-lp152.5.15.1
libX11-devel-32bit-1.6.5-lp152.5.15.1
libX11-xcb1-32bit-1.6.5-lp152.5.15.1
libX11-xcb1-32bit-debuginfo-1.6.5-lp152.5.15.1
References:
https://www.suse.com/security/cve/CVE-2021-31535.htmlhttps://bugzilla.suse.com/1182506
openSUSE Security Update: Security update for hivex
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0806-1
Rating: moderate
References: #1185013
Cross-References: CVE-2021-3504
CVSS scores:
CVE-2021-3504 (NVD) : 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2021-3504 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for hivex fixes the following issues:
- CVE-2021-3504: hivex: missing bounds check within hivex_open()
(bsc#1185013)
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-806=1
Package List:
- openSUSE Leap 15.2 (x86_64):
hivex-1.3.14-lp152.4.3.1
hivex-debuginfo-1.3.14-lp152.4.3.1
hivex-debugsource-1.3.14-lp152.4.3.1
hivex-devel-1.3.14-lp152.4.3.1
libhivex0-1.3.14-lp152.4.3.1
libhivex0-debuginfo-1.3.14-lp152.4.3.1
ocaml-hivex-1.3.14-lp152.4.3.1
ocaml-hivex-debuginfo-1.3.14-lp152.4.3.1
ocaml-hivex-devel-1.3.14-lp152.4.3.1
perl-Win-Hivex-1.3.14-lp152.4.3.1
perl-Win-Hivex-debuginfo-1.3.14-lp152.4.3.1
python-hivex-1.3.14-lp152.4.3.1
python-hivex-debuginfo-1.3.14-lp152.4.3.1
- openSUSE Leap 15.2 (noarch):
hivex-lang-1.3.14-lp152.4.3.1
References:
https://www.suse.com/security/cve/CVE-2021-3504.htmlhttps://bugzilla.suse.com/1185013
openSUSE Security Update: Security update for curl
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0808-1
Rating: moderate
References: #1186114 SLE-17956
Cross-References: CVE-2021-22898
CVSS scores:
CVE-2021-22898 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability, contains one
feature is now available.
Description:
This update for curl fixes the following issues:
- CVE-2021-22898: Fixed curl TELNET stack contents disclosure
(bsc#1186114).
- Allow partial chain verification [jsc#SLE-17956]
* Have intermediate certificates in the trust store be treated as
trust-anchors, in the same way as self-signed root CA certificates
are. This allows users to verify servers using the intermediate cert
only, instead of needing the whole chain.
* Set FLAG_TRUSTED_FIRST unconditionally.
* Do not check partial chains with CRL check.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-808=1
Package List:
- openSUSE Leap 15.2 (i586 x86_64):
curl-7.66.0-lp152.3.18.1
curl-debuginfo-7.66.0-lp152.3.18.1
curl-debugsource-7.66.0-lp152.3.18.1
curl-mini-7.66.0-lp152.3.18.1
curl-mini-debuginfo-7.66.0-lp152.3.18.1
curl-mini-debugsource-7.66.0-lp152.3.18.1
libcurl-devel-7.66.0-lp152.3.18.1
libcurl-mini-devel-7.66.0-lp152.3.18.1
libcurl4-7.66.0-lp152.3.18.1
libcurl4-debuginfo-7.66.0-lp152.3.18.1
libcurl4-mini-7.66.0-lp152.3.18.1
libcurl4-mini-debuginfo-7.66.0-lp152.3.18.1
- openSUSE Leap 15.2 (x86_64):
libcurl-devel-32bit-7.66.0-lp152.3.18.1
libcurl4-32bit-7.66.0-lp152.3.18.1
libcurl4-32bit-debuginfo-7.66.0-lp152.3.18.1
References:
https://www.suse.com/security/cve/CVE-2021-22898.htmlhttps://bugzilla.suse.com/1186114
openSUSE Security Update: Security update for libu2f-host
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0799-1
Rating: moderate
References: #1124781 #1128140 #1184648 ECO-3687
Cross-References: CVE-2018-20340 CVE-2019-9578
CVSS scores:
CVE-2018-20340 (NVD) : 6.8 CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20340 (SUSE): 6.4 CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2019-9578 (NVD) : 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-9578 (SUSE): 2.1 CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that solves two vulnerabilities, contains one
feature and has one errata is now available.
Description:
This update for libu2f-host fixes the following issues:
This update ships the u2f-host package (jsc#ECO-3687 bsc#1184648)
Version 1.1.10 (released 2019-05-15)
- Add new devices to udev rules.
- Fix a potentially uninitialized buffer (CVE-2019-9578, bsc#1128140)
Version 1.1.9 (released 2019-03-06)
- Fix CID copying from the init response, which broke compatibility with
some devices.
Version 1.1.8 (released 2019-03-05)
- Add udev rules
- Drop 70-old-u2f.rules and use 70-u2f.rules for everything
- Use a random nonce for setting up CID to prevent fingerprinting
- CVE-2019-9578: Parse the response to init in a more stable way to
prevent leakage of uninitialized stack memory back to the device
(bsc#1128140).
Version 1.1.7 (released 2019-01-08)
- Fix for trusting length from device in device init.
- Fix for buffer overflow when receiving data from device. (YSA-2019-01,
CVE-2018-20340, bsc#1124781)
- Add udev rules for some new devices.
- Add udev rule for Feitian ePass FIDO
- Add a timeout to the register and authenticate actions. This update
was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-799=1
Package List:
- openSUSE Leap 15.2 (x86_64):
libu2f-host-debuginfo-1.1.10-lp152.4.3.1
libu2f-host-debugsource-1.1.10-lp152.4.3.1
libu2f-host-devel-1.1.10-lp152.4.3.1
libu2f-host-doc-1.1.10-lp152.4.3.1
libu2f-host0-1.1.10-lp152.4.3.1
libu2f-host0-debuginfo-1.1.10-lp152.4.3.1
u2f-host-1.1.10-lp152.4.3.1
u2f-host-debuginfo-1.1.10-lp152.4.3.1
References:
https://www.suse.com/security/cve/CVE-2018-20340.htmlhttps://www.suse.com/security/cve/CVE-2019-9578.htmlhttps://bugzilla.suse.com/1124781https://bugzilla.suse.com/1128140https://bugzilla.suse.com/1184648
openSUSE Security Update: Security update for mpv
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0798-1
Rating: important
References: #1186230
Cross-References: CVE-2021-30145
CVSS scores:
CVE-2021-30145 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for mpv fixes the following issues:
- CVE-2021-30145: Fixed format string vulnerability allows user-assisted
remote attackers to achieve code execution via a crafted m3u playlist
file (boo#1186230)
This update was imported from the openSUSE:Leap:15.2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-798=1
Package List:
- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):
libmpv1-0.32.0+git.20200301T004003.e7bab0025f-bp152.2.6.1
mpv-0.32.0+git.20200301T004003.e7bab0025f-bp152.2.6.1
mpv-devel-0.32.0+git.20200301T004003.e7bab0025f-bp152.2.6.1
- openSUSE Backports SLE-15-SP2 (noarch):
mpv-bash-completion-0.32.0+git.20200301T004003.e7bab0025f-bp152.2.6.1
mpv-zsh-completion-0.32.0+git.20200301T004003.e7bab0025f-bp152.2.6.1
References:
https://www.suse.com/security/cve/CVE-2021-30145.htmlhttps://bugzilla.suse.com/1186230
openSUSE Security Update: Security update for rubygem-actionpack-5_1
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0797-1
Rating: important
References: #1185715
Cross-References: CVE-2021-22885
CVSS scores:
CVE-2021-22885 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
openSUSE Leap 15.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for rubygem-actionpack-5_1 fixes the following issues:
- CVE-2021-22885: Fixed possible information disclosure / unintended
method execution in Action Pack (bsc#1185715).
This update was imported from the SUSE:SLE-15:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2021-797=1
Package List:
- openSUSE Leap 15.2 (x86_64):
ruby2.5-rubygem-actionpack-5_1-5.1.4-lp152.5.6.1
ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-lp152.5.6.1
References:
https://www.suse.com/security/cve/CVE-2021-22885.htmlhttps://bugzilla.suse.com/1185715
openSUSE Security Update: Security update for python-httplib2
______________________________________________________________________________
Announcement ID: openSUSE-SU-2021:0796-1
Rating: moderate
References: #1171998 #1182053
Cross-References: CVE-2020-11078 CVE-2021-21240
CVSS scores:
CVE-2020-11078 (NVD) : 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
CVE-2020-11078 (SUSE): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
CVE-2021-21240 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2021-21240 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Backports SLE-15-SP2
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for python-httplib2 contains the following fixes:
Security fixes included in this update:
- CVE-2021-21240: Fixed a regular expression denial of service via
malicious header (bsc#1182053).
- CVE-2020-11078: Fixed an issue where an attacker could change request
headers and body (bsc#1171998).
Non security fixes included in this update:
- Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)
- update to 0.19.0:
* auth: parse headers using pyparsing instead of regexp
* auth: WSSE token needs to be string not bytes
- update to 0.18.1: (bsc#1171998, CVE-2020-11078)
* explicit build-backend workaround for pip build isolation bug
* IMPORTANT security vulnerability CWE-93 CRLF injection Force %xx quote
of space, CR, LF characters in uri.
* Ship test suite in source dist
- Update to 0.17.1
* python3: no_proxy was not checked with https
* feature: Http().redirect_codes set, works after follow(_all)_redirects
check This allows one line workaround for old gcloud library that uses
308 response without redirect semantics.
* IMPORTANT cache invalidation change, fix 307 keep method, add 308
Redirects
* proxy: username/password as str compatible with pysocks
* python2: regression in connect() error handling
* add support for password protected certificate files
* feature: Http.close() to clean persistent connections and sensitive
data
- Update to 0.14.0:
* Python3: PROXY_TYPE_SOCKS5 with str user/pass raised TypeError
- version update to 0.13.1 0.13.1
* Python3: Use no_proxy https://github.com/httplib2/httplib2/pull/140
0.13.0
* Allow setting TLS max/min versions
https://github.com/httplib2/httplib2/pull/138 0.12.3
* No changes to library. Distribute py3 wheels. 0.12.1
* Catch socket timeouts and clear dead connection
https://github.com/httplib2/httplib2/issues/18https://github.com/httplib2/httplib2/pull/111
* Officially support Python 3.7 (package metadata)
https://github.com/httplib2/httplib2/issues/123 0.12.0
* Drop support for Python 3.3
* ca_certs from environment HTTPLIB2_CA_CERTS or certifi
https://github.com/httplib2/httplib2/pull/117
* PROXY_TYPE_HTTP with non-empty user/pass raised TypeError: bytes
required https://github.com/httplib2/httplib2/pull/115
* Revert http:443->https workaround
https://github.com/httplib2/httplib2/issues/112
* eliminate connection pool read race
https://github.com/httplib2/httplib2/pull/110
* cache: stronger safename
https://github.com/httplib2/httplib2/pull/101 0.11.3
* No changes, just reupload of 0.11.2 after fixing automatic release
conditions in Travis. 0.11.2
* proxy: py3 NameError basestring
https://github.com/httplib2/httplib2/pull/100 0.11.1
* Fix HTTP(S)ConnectionWithTimeout AttributeError proxy_info
https://github.com/httplib2/httplib2/pull/97 0.11.0
* Add DigiCert Global Root G2 serial 033af1e6a711a9a0bb2864b11d09fae5
https://github.com/httplib2/httplib2/pull/91
* python3 proxy support https://github.com/httplib2/httplib2/pull/90
* If no_proxy environment value ends with comma then proxy is not used
https://github.com/httplib2/httplib2/issues/11
* fix UnicodeDecodeError using socks5 proxy
https://github.com/httplib2/httplib2/pull/64
* Respect NO_PROXY env var in proxy_info_from_url
https://github.com/httplib2/httplib2/pull/58
* NO_PROXY=bar was matching foobar (suffix without dot delimiter) New
behavior matches curl/wget:
- no_proxy=foo.bar will only skip proxy for exact hostname match
- no_proxy=.wild.card will skip proxy for any.subdomains.wild.card
https://github.com/httplib2/httplib2/issues/94
* Bugfix for Content-Encoding: deflate
https://stackoverflow.com/a/22311297
- deleted patches
- Removing certifi patch: httplib2 started to use certifi and this is
already bent to use system certificate bundle by another patch
This update was imported from the SUSE:SLE-15:Update update project. This
update was imported from the openSUSE:Leap:15.2:Update update project.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2021-796=1
Package List:
- openSUSE Backports SLE-15-SP2 (noarch):
python2-httplib2-0.19.0-bp152.3.3.1
References:
https://www.suse.com/security/cve/CVE-2020-11078.htmlhttps://www.suse.com/security/cve/CVE-2021-21240.htmlhttps://bugzilla.suse.com/1171998https://bugzilla.suse.com/1182053