openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
November 2022
- 2 participants
- 149 discussions
SUSE-SU-2022:3913-1: moderate: Security update for vsftpd
by opensuse-security@opensuse.org 08 Nov '22
by opensuse-security@opensuse.org 08 Nov '22
08 Nov '22
SUSE Security Update: Security update for vsftpd
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3913-1
Rating: moderate
References: #1196918 SLE-24275
Affected Products:
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that contains security fixes and contains one
feature can now be installed.
Description:
This update for vsftpd fixes the following issues:
Bugfixes:
- Removed unsupported systemd hardening options (bsc#1196918).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3913=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3913=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3913=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3913=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3913=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3913=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3913=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-3913=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3913=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3913=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-3913=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Manager Proxy 4.1 (x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
vsftpd-3.0.5-150200.12.12.1
vsftpd-debuginfo-3.0.5-150200.12.12.1
vsftpd-debugsource-3.0.5-150200.12.12.1
References:
https://bugzilla.suse.com/1196918
1
0
SUSE-SU-2022:3907-1: moderate: Security update for gstreamer-plugins-base
by opensuse-security@opensuse.org 08 Nov '22
by opensuse-security@opensuse.org 08 Nov '22
08 Nov '22
SUSE Security Update: Security update for gstreamer-plugins-base
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3907-1
Rating: moderate
References: #1185448
Cross-References: CVE-2021-3522
CVSS scores:
CVE-2021-3522 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-3522 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for gstreamer-plugins-base fixes the following issues:
- CVE-2021-3522: Fixed ID3v2 tag frame size check and potential invalid
reads (bsc#1185448).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3907=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3907=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3907=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3907=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3907=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3907=1
Package List:
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
gstreamer-plugins-base-1.16.3-150200.4.6.2
gstreamer-plugins-base-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-debugsource-1.16.3-150200.4.6.2
libgstallocators-1_0-0-1.16.3-150200.4.6.2
libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstapp-1_0-0-1.16.3-150200.4.6.2
libgstapp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstaudio-1_0-0-1.16.3-150200.4.6.2
libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstgl-1_0-0-1.16.3-150200.4.6.2
libgstgl-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstriff-1_0-0-1.16.3-150200.4.6.2
libgstriff-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-1.16.3-150200.4.6.2
libgsttag-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-1.16.3-150200.4.6.2
libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.6.2
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
gstreamer-plugins-base-doc-1.16.3-150200.4.6.2
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
gstreamer-plugins-base-1.16.3-150200.4.6.2
gstreamer-plugins-base-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-debugsource-1.16.3-150200.4.6.2
gstreamer-plugins-base-devel-1.16.3-150200.4.6.2
gstreamer-plugins-base-doc-1.16.3-150200.4.6.2
libgstallocators-1_0-0-1.16.3-150200.4.6.2
libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstapp-1_0-0-1.16.3-150200.4.6.2
libgstapp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstaudio-1_0-0-1.16.3-150200.4.6.2
libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstfft-1_0-0-1.16.3-150200.4.6.2
libgstfft-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstgl-1_0-0-1.16.3-150200.4.6.2
libgstgl-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstriff-1_0-0-1.16.3-150200.4.6.2
libgstriff-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstrtp-1_0-0-1.16.3-150200.4.6.2
libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstsdp-1_0-0-1.16.3-150200.4.6.2
libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-1.16.3-150200.4.6.2
libgsttag-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-1.16.3-150200.4.6.2
libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.6.2
typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstApp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstAudio-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstGL-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstRtp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstSdp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstTag-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstVideo-1_0-1.16.3-150200.4.6.2
- openSUSE Leap 15.3 (noarch):
gstreamer-plugins-base-lang-1.16.3-150200.4.6.2
- openSUSE Leap 15.3 (x86_64):
gstreamer-plugins-base-32bit-1.16.3-150200.4.6.2
gstreamer-plugins-base-32bit-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-devel-32bit-1.16.3-150200.4.6.2
libgstallocators-1_0-0-32bit-1.16.3-150200.4.6.2
libgstallocators-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstapp-1_0-0-32bit-1.16.3-150200.4.6.2
libgstapp-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstaudio-1_0-0-32bit-1.16.3-150200.4.6.2
libgstaudio-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstfft-1_0-0-32bit-1.16.3-150200.4.6.2
libgstfft-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstgl-1_0-0-32bit-1.16.3-150200.4.6.2
libgstgl-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-32bit-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstriff-1_0-0-32bit-1.16.3-150200.4.6.2
libgstriff-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstrtp-1_0-0-32bit-1.16.3-150200.4.6.2
libgstrtp-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-32bit-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstsdp-1_0-0-32bit-1.16.3-150200.4.6.2
libgstsdp-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-32bit-1.16.3-150200.4.6.2
libgsttag-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-32bit-1.16.3-150200.4.6.2
libgstvideo-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (x86_64):
gstreamer-plugins-base-32bit-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-debugsource-1.16.3-150200.4.6.2
libgstaudio-1_0-0-32bit-1.16.3-150200.4.6.2
libgstaudio-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-32bit-1.16.3-150200.4.6.2
libgsttag-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-32bit-1.16.3-150200.4.6.2
libgstvideo-1_0-0-32bit-debuginfo-1.16.3-150200.4.6.2
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
gstreamer-plugins-base-1.16.3-150200.4.6.2
gstreamer-plugins-base-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-debugsource-1.16.3-150200.4.6.2
gstreamer-plugins-base-devel-1.16.3-150200.4.6.2
libgstallocators-1_0-0-1.16.3-150200.4.6.2
libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstapp-1_0-0-1.16.3-150200.4.6.2
libgstapp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstaudio-1_0-0-1.16.3-150200.4.6.2
libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstfft-1_0-0-1.16.3-150200.4.6.2
libgstfft-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstgl-1_0-0-1.16.3-150200.4.6.2
libgstgl-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstriff-1_0-0-1.16.3-150200.4.6.2
libgstriff-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstrtp-1_0-0-1.16.3-150200.4.6.2
libgstrtp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-1.16.3-150200.4.6.2
libgstrtsp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstsdp-1_0-0-1.16.3-150200.4.6.2
libgstsdp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-1.16.3-150200.4.6.2
libgsttag-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-1.16.3-150200.4.6.2
libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.6.2
typelib-1_0-GstAllocators-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstApp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstAudio-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstGL-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstPbutils-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstRtp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstRtsp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstSdp-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstTag-1_0-1.16.3-150200.4.6.2
typelib-1_0-GstVideo-1_0-1.16.3-150200.4.6.2
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
gstreamer-plugins-base-lang-1.16.3-150200.4.6.2
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
gstreamer-plugins-base-1.16.3-150200.4.6.2
gstreamer-plugins-base-debuginfo-1.16.3-150200.4.6.2
gstreamer-plugins-base-debugsource-1.16.3-150200.4.6.2
libgstallocators-1_0-0-1.16.3-150200.4.6.2
libgstallocators-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstapp-1_0-0-1.16.3-150200.4.6.2
libgstapp-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstaudio-1_0-0-1.16.3-150200.4.6.2
libgstaudio-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstgl-1_0-0-1.16.3-150200.4.6.2
libgstgl-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-1.16.3-150200.4.6.2
libgstpbutils-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstriff-1_0-0-1.16.3-150200.4.6.2
libgstriff-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgsttag-1_0-0-1.16.3-150200.4.6.2
libgsttag-1_0-0-debuginfo-1.16.3-150200.4.6.2
libgstvideo-1_0-0-1.16.3-150200.4.6.2
libgstvideo-1_0-0-debuginfo-1.16.3-150200.4.6.2
References:
https://www.suse.com/security/cve/CVE-2021-3522.html
https://bugzilla.suse.com/1185448
1
0
SUSE-SU-2022:3908-1: moderate: Security update for gstreamer-plugins-good
by opensuse-security@opensuse.org 08 Nov '22
by opensuse-security@opensuse.org 08 Nov '22
08 Nov '22
SUSE Security Update: Security update for gstreamer-plugins-good
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3908-1
Rating: moderate
References: #1201688 #1201693 #1201702 #1201704 #1201706
#1201707 #1201708
Cross-References: CVE-2022-1920 CVE-2022-1921 CVE-2022-1922
CVE-2022-1923 CVE-2022-1924 CVE-2022-1925
CVE-2022-2122
CVSS scores:
CVE-2022-1920 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1920 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-1921 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1921 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-1922 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1922 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1923 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1923 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1924 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1924 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1925 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1925 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-2122 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2122 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for gstreamer-plugins-good fixes the following issues:
- CVE-2022-1920: Fixed integer overflow in WavPack header handling code
(bsc#1201688).
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in
avidemux element (bsc#1201693).
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip
(bsc#1201704).
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo
(bsc#1201706).
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP
(bsc#1201707).
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib
(bsc#1201708).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3908=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3908=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
gstreamer-plugins-good-1.20.1-150400.3.3.1
gstreamer-plugins-good-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-debugsource-1.20.1-150400.3.3.1
gstreamer-plugins-good-extra-1.20.1-150400.3.3.1
gstreamer-plugins-good-extra-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-gtk-1.20.1-150400.3.3.1
gstreamer-plugins-good-gtk-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-jack-1.20.1-150400.3.3.1
gstreamer-plugins-good-jack-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-qtqml-1.20.1-150400.3.3.1
gstreamer-plugins-good-qtqml-debuginfo-1.20.1-150400.3.3.1
- openSUSE Leap 15.4 (noarch):
gstreamer-plugins-good-lang-1.20.1-150400.3.3.1
- openSUSE Leap 15.4 (x86_64):
gstreamer-plugins-good-32bit-1.20.1-150400.3.3.1
gstreamer-plugins-good-32bit-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-extra-32bit-1.20.1-150400.3.3.1
gstreamer-plugins-good-extra-32bit-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-jack-32bit-1.20.1-150400.3.3.1
gstreamer-plugins-good-jack-32bit-debuginfo-1.20.1-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
gstreamer-plugins-good-1.20.1-150400.3.3.1
gstreamer-plugins-good-debuginfo-1.20.1-150400.3.3.1
gstreamer-plugins-good-debugsource-1.20.1-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
gstreamer-plugins-good-lang-1.20.1-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2022-1920.html
https://www.suse.com/security/cve/CVE-2022-1921.html
https://www.suse.com/security/cve/CVE-2022-1922.html
https://www.suse.com/security/cve/CVE-2022-1923.html
https://www.suse.com/security/cve/CVE-2022-1924.html
https://www.suse.com/security/cve/CVE-2022-1925.html
https://www.suse.com/security/cve/CVE-2022-2122.html
https://bugzilla.suse.com/1201688
https://bugzilla.suse.com/1201693
https://bugzilla.suse.com/1201702
https://bugzilla.suse.com/1201704
https://bugzilla.suse.com/1201706
https://bugzilla.suse.com/1201707
https://bugzilla.suse.com/1201708
1
0
SUSE-SU-2022:3899-1: important: Security update for sendmail
by opensuse-security@opensuse.org 08 Nov '22
by opensuse-security@opensuse.org 08 Nov '22
08 Nov '22
SUSE Security Update: Security update for sendmail
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3899-1
Rating: important
References: #1202937 #1204696
Cross-References: CVE-2022-31256
CVSS scores:
CVE-2022-31256 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31256 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.1
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for sendmail fixes the following issues:
- CVE-2022-31256: Fixed mail to root privilege escalation via
sm-client.pre script (bsc#1204696, bsc#1202937).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3899=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3899=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3899=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3899=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3899=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3899=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3899=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-3899=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3899=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3899=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3899=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3899=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-3899=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2022-3899=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-3899=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3899=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3899=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3899=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-3899=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-3899=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
rmail-8.15.2-150000.8.9.1
rmail-debuginfo-8.15.2-150000.8.9.1
sendmail-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
sendmail-devel-8.15.2-150000.8.9.1
- openSUSE Leap 15.4 (noarch):
libmilter-doc-8.15.2-150000.8.9.1
sendmail-starttls-8.15.2-150000.8.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
rmail-8.15.2-150000.8.9.1
rmail-debuginfo-8.15.2-150000.8.9.1
sendmail-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
sendmail-devel-8.15.2-150000.8.9.1
- openSUSE Leap 15.3 (noarch):
libmilter-doc-8.15.2-150000.8.9.1
sendmail-starttls-8.15.2-150000.8.9.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Manager Proxy 4.1 (x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (aarch64 ppc64le s390x x86_64):
rmail-8.15.2-150000.8.9.1
rmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
rmail-8.15.2-150000.8.9.1
rmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
- SUSE CaaS Platform 4.0 (x86_64):
libmilter1_0-8.15.2-150000.8.9.1
libmilter1_0-debuginfo-8.15.2-150000.8.9.1
sendmail-debuginfo-8.15.2-150000.8.9.1
sendmail-debugsource-8.15.2-150000.8.9.1
References:
https://www.suse.com/security/cve/CVE-2022-31256.html
https://bugzilla.suse.com/1202937
https://bugzilla.suse.com/1204696
1
0
SUSE-SU-2022:3897-1: important: Security update for the Linux Kernel
by opensuse-security@opensuse.org 08 Nov '22
by opensuse-security@opensuse.org 08 Nov '22
08 Nov '22
SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3897-1
Rating: important
References: #1032323 #1065729 #1152489 #1196018 #1198702
#1200465 #1200788 #1201725 #1202638 #1202686
#1202700 #1203066 #1203098 #1203290 #1203387
#1203391 #1203496 #1203514 #1203770 #1203802
#1204051 #1204053 #1204059 #1204060 #1204125
#1204166 #1204168 #1204354 #1204355 #1204382
#1204402 #1204415 #1204417 #1204431 #1204439
#1204470 #1204479 #1204574 #1204575 #1204619
#1204635 #1204637 #1204646 #1204647 #1204653
#1204728 #1204753 #1204754 PED-1931
Cross-References: CVE-2021-4037 CVE-2022-2153 CVE-2022-28748
CVE-2022-2964 CVE-2022-2978 CVE-2022-3169
CVE-2022-3176 CVE-2022-3424 CVE-2022-3521
CVE-2022-3524 CVE-2022-3535 CVE-2022-3542
CVE-2022-3545 CVE-2022-3565 CVE-2022-3577
CVE-2022-3586 CVE-2022-3594 CVE-2022-3621
CVE-2022-3623 CVE-2022-3625 CVE-2022-3629
CVE-2022-3640 CVE-2022-3646 CVE-2022-3649
CVE-2022-39189 CVE-2022-40768 CVE-2022-41674
CVE-2022-42703 CVE-2022-42719 CVE-2022-42720
CVE-2022-42721 CVE-2022-42722 CVE-2022-43750
CVSS scores:
CVE-2021-4037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-4037 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVE-2022-2153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-2153 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVE-2022-28748 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-2964 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2964 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2978 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-2978 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3169 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3169 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3176 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3176 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3424 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3521 (NVD) : 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3521 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3524 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3524 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3535 (NVD) : 3.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3535 (SUSE): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3542 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3542 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3545 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3545 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3565 (NVD) : 8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3565 (SUSE): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3577 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3577 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3586 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3586 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3594 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3594 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3621 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3621 (SUSE): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3623 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3623 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-3625 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3625 (SUSE): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3629 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3629 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3640 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3640 (SUSE): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3646 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3646 (SUSE): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-3649 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-3649 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
CVE-2022-39189 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-39189 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-40768 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-40768 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2022-41674 (NVD) : 8.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-41674 (SUSE): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42703 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42703 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42719 (NVD) : 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42719 (SUSE): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42720 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42720 (SUSE): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42721 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42721 (SUSE): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-42722 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-42722 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-43750 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-43750 (SUSE): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Public Cloud 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 33 vulnerabilities, contains one
feature and has 15 fixes is now available.
Description:
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive
various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-4037: Fixed function logic vulnerability that allowed local
users to create files for the XFS file-system with an unintended group
ownership and with group execution and SGID permission bits set
(bnc#1198702).
- CVE-2022-2153: Fixed vulnerability in KVM that could allow an
unprivileged local attacker on the host to cause DoS (bnc#1200788).
- CVE-2022-2964, CVE-2022-28748: Fixed memory corruption issues in
ax88179_178a devices (bnc#1202686 bsc#1196018).
- CVE-2022-2978: Fixed use-after-free in the NILFS file system that could
lead to local privilege escalation or DoS (bnc#1202700).
- CVE-2022-3169: Fixed a denial of service flaw which occurs when
consecutive requests to NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET
are sent (bnc#1203290).
- CVE-2022-3176: Fixed use-after-free in io_uring when using POLLFREE
(bnc#1203391).
- CVE-2022-3424: Fixed use-after-free in gru_set_context_option(),
gru_fault() and gru_handle_user_call_os() that could lead to kernel
panic (bsc#1204166).
- CVE-2022-3521: Fixed race condition in kcm_tx_work() in
net/kcm/kcmsock.c (bnc#1204355).
- CVE-2022-3524: Fixed memory leak in ipv6_renew_options() in the IPv6
handler (bnc#1204354).
- CVE-2022-3535: Fixed memory leak in mvpp2_dbgfs_port_init() in
drivers/net/ethernet/marvell/mvpp2/mvpp2_debugfs.c (bnc#1204417).
- CVE-2022-3542: Fixed memory leak in bnx2x_tpa_stop() in
drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c (bnc#1204402).
- CVE-2022-3545: Fixed use-after-free in area_cache_get() in
drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c (bnc#1204415).
- CVE-2022-3565: Fixed use-after-free in del_timer() in
drivers/isdn/mISDN/l1oip_core.c (bnc#1204431).
- CVE-2022-3577: Fixed out-of-bounds memory write flaw in bigben device
driver that could lead to local privilege escalation or DoS
(bnc#1204470).
- CVE-2022-3586: Fixed use-after-free in socket buffer (SKB) that could
allow a local unprivileged user to cause a denial of service
(bnc#1204439).
- CVE-2022-3594: Fixed excessive data logging in intr_callback() in
drivers/net/usb/r8152.c (bnc#1204479).
- CVE-2022-3621: Fixed null pointer dereference in
nilfs_bmap_lookup_at_level() in fs/nilfs2/inode.c (bnc#1204574).
- CVE-2022-3623: Fixed race condition in follow_page_pte() (mm/gup.c)
(bsc#1204575).
- CVE-2022-3625: Fixed use-after-free in
devlink_param_set()/devlink_param_get() in net/core/devlink.c
(bnc#1204637).
- CVE-2022-3629: Fixed memory leak in vsock_connect() in
net/vmw_vsock/af_vsock.c (bnc#1204635).
- CVE-2022-3640: Fixed use-after-free in l2cap_conn_del() in
net/bluetooth/l2cap_core.c (bnc#1204619).
- CVE-2022-3646: Fixed memory leak in nilfs_attach_log_writer() in
fs/nilfs2/segment.c (bnc#1204646).
- CVE-2022-3649: Fixed use-after-free in nilfs_new_inode() in
fs/nilfs2/inode.c (bnc#1204647).
- CVE-2022-39189: Fixed a flaw in the x86 KVM subsystem that could allow
unprivileged guest users to compromise the guest kernel via TLB flush
operations on preempted vCPU (bnc#1203066).
- CVE-2022-40768: Fixed information disclosure in stex_queuecommand_lck
(bnc#1203514).
- CVE-2022-41674: Fixed a DoS issue where kernel can crash on the
reception of specific WiFi Frames (bsc#1203770).
- CVE-2022-42703: Fixed use-after-free in mm/rmap.c related to leaf
anon_vma double reuse (bnc#1204168).
- CVE-2022-42719: Fixed MBSSID parsing use-after-free. (bsc#1204051)
- CVE-2022-42720: Fixed BSS refcounting bugs. (bsc#1204059)
- CVE-2022-42721: Avoid nontransmitted BSS list corruption. (bsc#1204060)
- CVE-2022-42722: Fixed crash in beacon protection for P2P-device.
(bsc#1204125)
- CVE-2022-43750: Fixed vulnerability in usbmon that allowed a user-space
client to corrupt the monitor's internal memory (bnc#1204653).
The following non-security bugs were fixed:
- acpi: APEI: do not add task_work to kernel thread to avoid memory leak
(git-fixes).
- acpi: HMAT: Release platform device in case of
platform_device_add_data() fails (git-fixes).
- acpi: extlog: Handle multiple records (git-fixes).
- acpi: processor idle: Practically limit "Dummy wait" workaround to old
Intel systems (bnc#1203802).
- acpi: video: Add Toshiba Satellite/Portege Z830 quirk (git-fixes).
- alsa: Use del_timer_sync( before freeing timer (git-fixes).
- alsa: ac97: fix possible memory leak in snd_ac97_dev_register()
(git-fixes).
- alsa: aoa: Fix I2S device accounting (git-fixes).
- alsa: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()
(git-fixes).
- alsa: asihpi - Remove useless code in hpi_meter_get_peak() (git-fixes).
- alsa: au88x0: use explicitly signed char (git-fixes).
- alsa: dmaengine: increment buffer pointer atomically (git-fixes).
- alsa: hda/hdmi: Do not skip notification handling during PM operation
(git-fixes).
- alsa: hda/realtek: Add Intel Reference SSID to support headset keys
(git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G513 HP jack (git-fixes).
- alsa: hda/realtek: Add pincfg for ASUS G533Z HP jack (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GA503R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS GV601R laptop (git-fixes).
- alsa: hda/realtek: Add quirk for Huawei WRT-WX9 (git-fixes).
- alsa: hda/realtek: Correct pin configs for ASUS G533Z (git-fixes).
- alsa: hda/realtek: Enable 4-speaker output Dell Precision 5530 laptop
(git-fixes).
- alsa: hda/realtek: remove ALC289_FIXUP_DUAL_SPK for Dell 5530
(git-fixes).
- alsa: hda/sigmatel: Fix unused variable warning for beep power change
(git-fixes).
- alsa: hda/sigmatel: Keep power up while beep is enabled (git-fixes).
- alsa: hda/tegra: Align BDL entry to 4KB boundary (git-fixes).
- alsa: hda: Fix position reporting on Poulsbo (git-fixes).
- alsa: hda: add Intel 5 Series / 3400 PCI DID (git-fixes).
- alsa: oss: Fix potential deadlock at unregistration (git-fixes).
- alsa: rawmidi: Drop register_mutex in snd_rawmidi_free() (git-fixes).
- alsa: rme9652: use explicitly signed char (git-fixes).
- alsa: usb-audio: Fix NULL dererence at error path (git-fixes).
- alsa: usb-audio: Fix potential memory leaks (git-fixes).
- arm64: assembler: add cond_yield macro (git-fixes)
- asoc: eureka-tlv320: Hold reference returned from of_find_xxx API
(git-fixes).
- asoc: fsl_sai: Remove unnecessary FIFO reset in ISR (git-fixes).
- asoc: mt6660: Fix PM disable depth imbalance in mt6660_i2c_probe
(git-fixes).
- asoc: nau8824: Fix semaphore unbalance at error paths (git-fixes).
- asoc: rsnd: Add check for rsnd_mod_power_on (git-fixes).
- asoc: tas2770: Reinit regcache on reset (git-fixes).
- asoc: wcd9335: fix order of Slimbus unprepare/disable (git-fixes).
- asoc: wcd934x: fix order of Slimbus unprepare/disable (git-fixes).
- asoc: wm5102: Fix PM disable depth imbalance in wm5102_probe (git-fixes).
- asoc: wm5110: Fix PM disable depth imbalance in wm5110_probe (git-fixes).
- asoc: wm8997: Fix PM disable depth imbalance in wm8997_probe (git-fixes).
- ata: fix ata_id_has_devslp() (git-fixes).
- ata: fix ata_id_has_dipm() (git-fixes).
- ata: fix ata_id_has_ncq_autosense() (git-fixes).
- ata: fix ata_id_sense_reporting_enabled() and
ata_id_has_sense_reporting() (git-fixes).
- ata: libahci_platform: Sanity check the DT child nodes number
(git-fixes).
- bluetooth: L2CAP: Fix user-after-free (git-fixes).
- bluetooth: L2CAP: initialize delayed works at l2cap_chan_create()
(git-fixes).
- bluetooth: hci_core: Fix not handling link timeouts propertly
(git-fixes).
- bluetooth: hci_sysfs: Fix attempting to call device_add multiple times
(git-fixes).
- can: bcm: check the result of can_send() in bcm_can_tx() (git-fixes).
- can: gs_usb: gs_can_open(): fix race dev->can.state condition
(git-fixes).
- can: kvaser_usb: Fix possible completions during init_completion
(git-fixes).
- can: kvaser_usb: Fix use of uninitialized completion (git-fixes).
- can: kvaser_usb_leaf: Fix CAN state after restart (git-fixes).
- can: kvaser_usb_leaf: Fix TX queue out of sync after restart (git-fixes).
- can: mscan: mpc5xxx: mpc5xxx_can_probe(): add missing put_clock() in
error path (git-fixes).
- cgroup/cpuset: Enable update_tasks_cpumask() on top_cpuset (bsc#1204753).
- clk: bcm2835: Make peripheral PLLC critical (git-fixes).
- clk: bcm2835: fix bcm2835_clock_rate_from_divisor declaration
(git-fixes).
- clk: berlin: Add of_node_put() for of_get_parent() (git-fixes).
- clk: imx: imx6sx: remove the SET_RATE_PARENT flag for QSPI clocks
(git-fixes).
- clk: iproc: Do not rely on node name for correct PLL setup (git-fixes).
- clk: mediatek: mt8183: mfgcfg: Propagate rate changes to parent
(git-fixes).
- clk: oxnas: Hold reference returned by of_get_parent() (git-fixes).
- clk: qcom: gcc-msm8916: use ARRAY_SIZE instead of specifying num_parents
(git-fixes).
- clk: qoriq: Hold reference returned by of_get_parent() (git-fixes).
- clk: tegra20: Fix refcount leak in tegra20_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra114_clock_init (git-fixes).
- clk: tegra: Fix refcount leak in tegra210_clock_init (git-fixes).
- clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe
(git-fixes).
- clk: zynqmp: Fix stack-out-of-bounds in strncpy` (git-fixes).
- clk: zynqmp: pll: rectify rate rounding in zynqmp_pll_round_rate
(git-fixes).
- crypto: akcipher - default implementation for setting a private key
(git-fixes).
- crypto: arm64/sha - fix function types (git-fixes)
- crypto: arm64/sha1-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha2-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha3-ce - simplify NEON yield (git-fixes)
- crypto: arm64/sha512-ce - simplify NEON yield (git-fixes)
- crypto: cavium - prevent integer overflow loading firmware (git-fixes).
- crypto: ccp - Release dma channels before dmaengine unrgister
(git-fixes).
- crypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr (git-fixes).
- device property: Fix documentation for *_match_string() APIs (git-fixes).
- dmaengine: ioat: stop mod_timer from resurrecting deleted timer in
__cleanup() (git-fixes).
- dmaengine: xilinx_dma: Report error in case of dma_set_mask_and_coherent
API failure (git-fixes).
- dmaengine: xilinx_dma: cleanup for fetching xlnx,num-fstores property
(git-fixes).
- docs: update mediator information in CoC docs (git-fixes).
- drivers: serial: jsm: fix some leaks in probe (git-fixes).
- drm/amd/display: Limit user regamma to a valid value (git-fixes).
- drm/amdgpu: do not register a dirty callback for non-atomic (git-fixes).
- drm/amdgpu: fix initial connector audio value (git-fixes).
- drm/amdgpu: use dirty framebuffer helper (git-fixes).
- drm/bridge: Avoid uninitialized variable warning (git-fixes).
- drm/bridge: megachips: Fix a null pointer dereference bug (git-fixes).
- drm/bridge: parade-ps8640: Fix regulator supply order (git-fixes).
- drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types (git-fixes).
- drm/mipi-dsi: Detach devices when removing the host (git-fixes).
- drm/msm/dpu: Fix comment typo (git-fixes).
- drm/msm/dpu: index dpu_kms->hw_vbif using vbif_idx (git-fixes).
- drm/msm/dsi: fix memory corruption with too many bridges (git-fixes).
- drm/msm/hdmi: fix memory corruption with too many bridges (git-fixes).
- drm/msm: Fix return type of mdp4_lvds_connector_mode_valid (git-fixes).
- drm/msm: Make .remove and .shutdown HW shutdown consistent (git-fixes).
- drm/nouveau/nouveau_bo: fix potential memory leak in nouveau_bo_alloc()
(git-fixes).
- drm/nouveau: fix a use-after-free in nouveau_gem_prime_import_sg_table()
(git-fixes).
- drm/omap: dss: Fix refcount leak bugs (git-fixes).
- drm/rockchip: Fix return type of cdn_dp_connector_mode_valid (git-fixes).
- drm/scheduler: quieten kernel-doc warnings (git-fixes).
- drm/udl: Restore display mode on resume (git-fixes).
- drm: Prevent drm_copy_field() to attempt copying a NULL pointer
(git-fixes).
- drm: Use size_t type for len variable in drm_copy_field() (git-fixes).
- drm: bridge: adv7511: fix CEC power down control register offset
(git-fixes).
- drm: fix drm_mipi_dbi build errors (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Anbernic Win600 (git-fixes).
- drm:pl111: Add of_node_put() when breaking out of
for_each_available_child_of_node() (git-fixes).
- dyndbg: fix module.dyndbg handling (git-fixes).
- dyndbg: let query-modname override actual module name (git-fixes).
- efi: Correct Macmini DMI match in uefi cert quirk (git-fixes).
- efi: libstub: drop pointless get_memory_map() call (git-fixes).
- exfat: Return ENAMETOOLONG consistently for oversized paths (bsc#1204053
bsc#1201725).
- fbdev: cyber2000fb: fix missing pci_disable_device() (git-fixes).
- fbdev: da8xx-fb: Fix error handling in .remove() (git-fixes).
- firmware: arm_scmi: Add SCMI PM driver remove routine (git-fixes).
- firmware: google: Test spinlock on panic path to avoid lockups
(git-fixes).
- fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
(git-fixes).
- gpio: rockchip: request GPIO mux to pinctrl when setting direction
(git-fixes).
- hid: hid-logitech-hidpp: avoid unnecessary assignments in
hidpp_connect_event (git-fixes).
- hid: hidraw: fix memory leak in hidraw_release() (git-fixes).
- hid: magicmouse: Do not set BTN_MOUSE on double report (git-fixes).
- hid: multitouch: Add memory barriers (git-fixes).
- hid: roccat: Fix use-after-free in roccat_read() (git-fixes).
- hsi: omap_ssi: Fix refcount leak in ssi_probe (git-fixes).
- hsi: omap_ssi_port: Fix dma_map_sg error check (git-fixes).
- hwmon/coretemp: Handle large core ID value (git-fixes).
- ib/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD
(git-fixes)
- ib/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes)
- ib/core: Only update PKEY and GID caches on respective events (git-fixes)
- ib/hfi1: Adjust pkey entry in index 0 (git-fixes)
- ib/hfi1: Fix abba locking issue with sc_disable() (git-fixes)
- ib/hfi1: Fix possible null-pointer dereference in
_extend_sdma_tx_descs() (git-fixes)
- ib/mlx4: Add support for REJ due to timeout (git-fixes)
- ib/mlx4: Use port iterator and validation APIs (git-fixes)
- ib/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
(git-fixes)
- ib/rdmavt: Add __init/__exit annotations to module init/exit funcs
(git-fixes)
- ib/srpt: Remove redundant assignment to ret (git-fixes)
- iio: ABI: Fix wrong format of differential capacitance channel ABI
(git-fixes).
- iio: adc: ad7923: fix channel readings for some variants (git-fixes).
- iio: adc: at91-sama5d2_adc: check return status for pressure and touch
(git-fixes).
- iio: adc: at91-sama5d2_adc: fix AT91_SAMA5D2_MR_TRACKTIM_MAX (git-fixes).
- iio: adc: at91-sama5d2_adc: lock around oversampling and sample freq
(git-fixes).
- iio: adc: mcp3911: use correct id bits (git-fixes).
- iio: dac: ad5593r: Fix i2c read protocol requirements (git-fixes).
- iio: inkern: only release the device node when done with it (git-fixes).
- iio: light: tsl2583: Fix module unloading (git-fixes).
- iio: pressure: dps310: Refactor startup procedure (git-fixes).
- iio: pressure: dps310: Reset chip after timeout (git-fixes).
- input: i8042 - fix refount leak on sparc (git-fixes).
- input: xpad - add supported devices as contributed on github (git-fixes).
- input: xpad - fix wireless 360 controller breaking after suspend
(git-fixes).
- irqchip/ls-extirq: Fix invalid wait context by avoiding to use regmap
(git-fixes).
- kABI: arm64/crypto/sha512 Preserve function signature (git-fixes).
- kbuild: Add skip_encoding_btf_enum64 option to pahole (git-fixes).
- kbuild: remove the target in signal traps when interrupted (git-fixes).
- kbuild: sink stdout from cmd for silent build (git-fixes).
- kbuild: skip per-CPU BTF generation for pahole v1.18-v1.21
(jsc#SLE-24559).
- kthread: Extract KTHREAD_IS_PER_CPU (bsc#1204753).
- kvm: nVMX: Unconditionally purge queued/injected events on nested "exit"
(git-fixes).
- kvm: s390: Clarify SIGP orders versus STOP/RESTART (git-fixes).
- kvm: s390: VSIE: fix MVPG handling for prefixing and MSO (git-fixes).
- kvm: s390: clear kicked_mask before sleeping again (git-fixes).
- kvm: s390: preserve deliverable_mask in __airqs_kick_single_vcpu
(git-fixes).
- kvm: s390: pv: do not present the ecall interrupt twice (git-fixes).
- kvm: s390: split kvm_s390_real_to_abs (git-fixes).
- kvm: s390x: fix SCK locking (git-fixes)
- kvm: x86/emulator: Fix handing of POP SS to correctly set
interruptibility (git-fixes).
- lib/sg_pool: change module_init(sg_pool_init) to subsys_initcall
(git-fixes).
- libata: add ATA_HORKAGE_NOLPM for Pioneer BDR-207M and BDR-205
(git-fixes).
- locking/csd_lock: Change csdlock_debug from early_param to __setup
(git-fixes).
- mISDN: fix use-after-free bugs in l1oip timer handlers (git-fixes).
- mISDN: hfcpci: Fix use-after-free bug in hfcpci_softirq (git-fixes).
- mac802154: Fix LQI recording (git-fixes).
- mailbox: bcm-ferxrm-mailbox: Fix error check for dma_map_sg (git-fixes).
- media: aspeed-video: ignore interrupts that are not enabled (git-fixes).
- media: cedrus: Set the platform driver data earlier (git-fixes).
- media: coda: Add more H264 levels for CODA960 (git-fixes).
- media: coda: Fix reported H264 profile (git-fixes).
- media: cx88: Fix a null-ptr-deref bug in buffer_prepare() (git-fixes).
- media: dvb_vb2: fix possible out of bound access (git-fixes).
- media: v4l2-dv-timings: add sanity checks for blanking values
(git-fixes).
- media: videodev2.h: V4L2_DV_BT_BLANKING_HEIGHT should check 'interlaced'
(git-fixes).
- media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init
(git-fixes).
- memory: of: Fix refcount leak bug in of_get_ddr_timings() (git-fixes).
- memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()
(git-fixes).
- mfd: fsl-imx25: Fix an error handling path in mx25_tsadc_setup_irq()
(git-fixes).
- mfd: intel_soc_pmic: Fix an error handling path in
intel_soc_pmic_i2c_probe() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_irq_init() and
lp8788_irq_init() (git-fixes).
- mfd: lp8788: Fix an error handling path in lp8788_probe() (git-fixes).
- mfd: sm501: Add check for platform_driver_register() (git-fixes).
- misc: ocxl: fix possible refcount leak in afu_ioctl() (git-fixes).
- mm, memcg: avoid stale protection values when cgroup is above protection
(bsc#1204754).
- mm/hugetlb: fix races when looking up a CONT-PTE/PMD size hugetlb page
(bsc#1204575).
- mm: memcontrol: fix occasional OOMs due to proportional memory.low
reclaim (bsc#1204754).
- mmc: au1xmmc: Fix an error handling path in au1xmmc_probe() (git-fixes).
- mmc: core: Fix kernel panic when remove non-standard SDIO card
(git-fixes).
- mmc: core: Replace with already defined values for readability
(git-fixes).
- mmc: core: Terminate infinite loop in SD-UHS voltage switch (git-fixes).
- mmc: moxart: fix 4-bit bus width and remove 8-bit bus width (git-fixes).
- mmc: sdhci-msm: add compatible string check for sdm670 (git-fixes).
- mmc: sdhci-sprd: Fix minimum clock limit (git-fixes).
- mmc: wmt-sdmmc: Fix an error handling path in wmt_mci_probe()
(git-fixes).
- mtd: devices: docg3: check the return value of devm_ioremap() in the
probe (git-fixes).
- mtd: rawnand: atmel: Unmap streaming DMA mappings (git-fixes).
- mtd: rawnand: marvell: Use correct logic for nand-keep-config
(git-fixes).
- mtd: rawnand: meson: fix bit map use in meson_nfc_ecc_correct()
(git-fixes).
- net/ieee802154: fix uninit value bug in dgram_sendmsg (git-fixes).
- net: ieee802154: return -EINVAL for unknown addr type (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: Add new usb-id for Dell branded EM7455 (git-fixes).
- net: usb: qmi_wwan: add Quectel RM520N (git-fixes).
- openvswitch: Fix double reporting of drops in dropwatch (git-fixes).
- openvswitch: Fix overreporting of drops in dropwatch (git-fixes).
- openvswitch: switch from WARN to pr_warn (git-fixes).
- padata: introduce internal padata_get/put_pd() helpers (bsc#1202638).
- padata: make padata_free_shell() to respect pd's ->refcnt (bsc#1202638).
- parisc/sticon: fix reverse colors (bsc#1152489) Backporting notes: *
context changes
- parisc: parisc-agp requires SBA IOMMU driver (bsc#1152489)
- pci: Dynamically map ECAM regions (bsc#1204382).
- pci: Fix used_buses calculation in pci_scan_child_bus_extend()
(git-fixes).
- pci: Sanitise firmware BAR assignments behind a PCI-PCI bridge
(git-fixes).
- phy: qualcomm: call clk_disable_unprepare in the error handling
(git-fixes).
- pinctrl: armada-37xx: Add missing GPIO-only pins (git-fixes).
- pinctrl: armada-37xx: Checks for errors in gpio_request_enable callback
(git-fixes).
- pinctrl: armada-37xx: Fix definitions for MPP pins 20-22 (git-fixes).
- pinctrl: rockchip: add pinmux_ops.gpio_set_direction callback
(git-fixes).
- platform/x86: msi-laptop: Change DMI match / alias strings to fix module
autoloading (git-fixes).
- platform/x86: msi-laptop: Fix old-ec check for backlight registering
(git-fixes).
- platform/x86: msi-laptop: Fix resource cleanup (git-fixes).
- pm: domains: Fix handling of unavailable/disabled idle states
(git-fixes).
- pm: hibernate: Allow hybrid sleep to work with s2idle (git-fixes).
- power: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()
(git-fixes).
- powerpc/64: Remove unused SYS_CALL_TABLE symbol (jsc#SLE-9246 git-fixes).
- powerpc/fadump: align destination address to pagesize (bsc#1204728
ltc#200074).
- powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()
(jsc#SLE-13847 git-fixes).
- powerpc/mm/64s: Drop pgd_huge() (bsc#1065729).
- powerpc/mm: remove pmd_huge/pud_huge stubs and include hugetlb.h
(bsc#1065729).
- powerpc/pci_dn: Add missing of_node_put() (bsc#1065729).
- powerpc/powernv: add missing of_node_put() in opal_export_attrs()
(bsc#1065729).
- powerpc/pseries: Interface to represent PAPR firmware attributes
(bsc#1200465 ltc#197256 jsc#PED-1931).
- quota: widen timestamps for the fs_disk_quota structure (bsc#1203387).
- rdma/bnxt_re: Add missing spin lock initialization (git-fixes)
- rdma/bnxt_re: Fix query SRQ failure (git-fixes)
- rdma/cm: Fix memory leak in ib_cm_insert_listen (git-fixes)
- rdma/cma: Ensure rdma_addr_cancel() happens before issuing more requests
(git-fixes)
- rdma/cma: Fix arguments order in net device validation (git-fixes)
- rdma/core: Sanitize WQ state received from the userspace (git-fixes)
- rdma/cxgb4: Remove MW support (git-fixes)
- rdma/efa: Free IRQ vectors on error flow (git-fixes)
- rdma/efa: Remove double QP type assignment (git-fixes)
- rdma/efa: Use ib_umem_num_dma_pages() (git-fixes)
- rdma/hfi1: Fix potential integer multiplication overflow errors
(git-fixes)
- rdma/hns: Remove unnecessary check for the sgid_attr when modifying QP
(git-fixes)
- rdma/i40iw: Use ib_umem_num_dma_pages() (git-fixes)
- rdma/iwcm: Release resources if iw_cm module initialization fails
(git-fixes)
- rdma/mlx4: Return missed an error if device does not support steering
(git-fixes)
- rdma/mlx5: Add missing check for return value in get namespace flow
(git-fixes)
- rdma/mlx5: Block FDB rules when not in switchdev mode (git-fixes)
- rdma/mlx5: Fix memory leak in error flow for subscribe event routine
(git-fixes)
- rdma/mlx5: Make mkeys always owned by the kernel's PD when not enabled
(git-fixes)
- rdma/mlx5: Set user priority for DCT (git-fixes)
- rdma/mlx5: Use set_mkc_access_pd_addr_fields() in reg_create()
(git-fixes)
- rdma/mthca: Work around -Wenum-conversion warning (git-fixes)
- rdma/qedr: Fix NULL deref for query_qp on the GSI QP (git-fixes)
- rdma/qedr: Fix potential memory leak in __qedr_alloc_mr() (git-fixes)
- rdma/qedr: Fix reporting QP timeout attribute (git-fixes)
- rdma/qib: Remove superfluous fallthrough statements (git-fixes)
- rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL
(git-fixes)
- rdma/rxe: Do not overwrite errno from ib_umem_get() (git-fixes)
- rdma/rxe: Fix "kernel NULL pointer dereference" error (git-fixes)
- rdma/rxe: Fix error unwind in rxe_create_qp() (git-fixes)
- rdma/rxe: Fix extra copies in build_rdma_network_hdr (git-fixes)
- rdma/rxe: Fix extra copy in prepare_ack_packet (git-fixes)
- rdma/rxe: Fix failure during driver load (git-fixes)
- rdma/rxe: Fix over copying in get_srq_wqe (git-fixes)
- rdma/rxe: Fix redundant call to ip_send_check (git-fixes)
- rdma/rxe: Fix redundant skb_put_zero (git-fixes)
- rdma/rxe: Fix rnr retry behavior (git-fixes)
- rdma/rxe: Fix the error caused by qp->sk (git-fixes)
- rdma/rxe: Fix wrong port_cap_flags (git-fixes)
- rdma/rxe: Generate a completion for unsupported/invalid opcode
(git-fixes)
- rdma/rxe: Remove unused pkt->offset (git-fixes)
- rdma/rxe: Return CQE error if invalid lkey was supplied (git-fixes)
- rdma/sa_query: Use strscpy_pad instead of memcpy to copy a string
(git-fixes)
- rdma/siw: Always consume all skbuf data in sk_data_ready() upcall.
(git-fixes)
- rdma/siw: Fix a condition race issue in MPA request processing
(git-fixes)
- rdma/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event
(git-fixes)
- rdma/siw: Pass a pointer to virt_to_page() (git-fixes)
- rdma/usnic: fix set-but-not-unused variable 'flags' warning (git-fixes)
- rdma: Verify port when creating flow rule (git-fixes)
- rdma: remove useless condition in siw_create_cq() (git-fixes)
- regulator: pfuze100: Fix the global-out-of-bounds access in
pfuze100_regulator_probe() (git-fixes).
- regulator: qcom_rpm: Fix circular deferral regression (git-fixes).
- reset: imx7: Fix the iMX8MP PCIe PHY PERST support (git-fixes).
- revert "drivers/video/backlight/platform_lcd.c: add support for
(bsc#1152489)
- revert "drm: bridge: analogix/dp: add panel prepare/unprepare in
suspend/resume time" (git-fixes).
- revert "usb: add quirks for Lenovo OneLink+ Dock" (git-fixes).
- revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes).
- revert "usb: storage: Add quirk for Samsung Fit flash" (git-fixes).
- rpmsg: qcom: glink: replace strncpy() with strscpy_pad() (git-fixes).
- rtc: stmp3xxx: Add failure handling for stmp3xxx_wdt_register()
(git-fixes).
- s390/hypfs: avoid error message under KVM (bsc#1032323).
- sbitmap: Avoid leaving waitqueue in invalid state in __sbq_wake_up()
(git-fixes).
- sbitmap: fix possible io hung due to lost wakeup (git-fixes).
- scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()
(git-fixes).
- scsi: mpt3sas: Fix return value check of dma_get_required_mask()
(git-fixes).
- scsi: qla2xxx: Fix disk failure to rediscover (git-fixes).
- selftest/powerpc: Add PAPR sysfs attributes sniff test (bsc#1200465
ltc#197256 jsc#PED-1931).
- selftests/powerpc: Skip energy_scale_info test on older firmware
(git-fixes).
- serial: Create uart_xmit_advance() (git-fixes).
- serial: tegra-tcu: Use uart_xmit_advance(), fixes icount.tx accounting
(git-fixes).
- serial: tegra: Use uart_xmit_advance(), fixes icount.tx accounting
(git-fixes).
- soc: qcom: smem_state: Add refcounting for the 'state->of_node'
(git-fixes).
- soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() (git-fixes).
- soc: sunxi: sram: Actually claim SRAM regions (git-fixes).
- soc: sunxi: sram: Fix debugfs info for A64 SRAM C (git-fixes).
- soc: sunxi: sram: Prevent the driver from being unbound (git-fixes).
- soc: sunxi_sram: Make use of the helper function
devm_platform_ioremap_resource() (git-fixes).
- spi/omap100k:Fix PM disable depth imbalance in omap1_spi100k_probe
(git-fixes).
- spi: mt7621: Fix an error message in mt7621_spi_probe() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in
spi_qup_pm_resume_runtime() (git-fixes).
- spi: qup: add missing clk_disable_unprepare on error in spi_qup_resume()
(git-fixes).
- spi: s3c64xx: Fix large transfers with DMA (git-fixes).
- staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()
(git-fixes).
- staging: vt6655: fix potential memory leak (git-fixes).
- staging: vt6655: fix some erroneous memory clean-up loops (git-fixes).
- struct pci_config_window kABI workaround (bsc#1204382).
- thermal: intel_powerclamp: Use first online CPU as control_cpu
(git-fixes).
- thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id()
to avoid crash (git-fixes).
- tty/serial: atmel: RS485 & ISO7816: wait for TXRDY before sending data
(git-fixes).
- tty: serial: fsl_lpuart: disable dma rx/tx use flags in
lpuart_dma_shutdown (git-fixes).
- tty: xilinx_uartps: Fix the ignore_status (git-fixes).
- uas: add no-uas quirk for Hiksemi usb_disk (git-fixes).
- uas: ignore UAS for Thinkplus chips (git-fixes).
- usb-storage: Add Hiksemi USB3-FW to IGNORE_UAS (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: add quirks for Lenovo OneLink+ Dock (git-fixes).
- usb: bdc: change state when port disconnected (git-fixes).
- usb: dwc3: gadget: Avoid starting DWC3 gadget during UDC unbind
(git-fixes).
- usb: dwc3: gadget: Do not set IMI for no_interrupt (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Stop processing more requests on IMI (git-fixes).
- usb: gadget: function: fix dangling pnp_string in f_printer.c
(git-fixes).
- usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()
(git-fixes).
- usb: idmouse: fix an uninit-value in idmouse_open (git-fixes).
- usb: mon: make mmapped memory read only (git-fixes).
- usb: musb: Fix musb_gadget.c rxstate overflow bug (git-fixes).
- usb: serial: console: move mutex_unlock() before usb_serial_put()
(git-fixes).
- usb: serial: ftdi_sio: fix 300 bps rate for SIO (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel BG95 0x0203 composition (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: option: add Quectel RM520N (git-fixes).
- usb: serial: qcserial: add new usb-id for Dell branded EM7455
(git-fixes).
- usb: serial: qcserial: add new usb-id for Dell branded EM7455
(git-fixes).
- usb: typec: ucsi: Remove incorrect warning (git-fixes).
- usb: xhci-mtk: add a function to (un)load bandwidth info (git-fixes).
- usb: xhci-mtk: add only one extra CS for FS/LS INTR (git-fixes).
- usb: xhci-mtk: add some schedule error number (git-fixes).
- usb: xhci-mtk: fix issue of out-of-bounds array access (git-fixes).
- usb: xhci-mtk: get the microframe boundary for ESIT (git-fixes).
- usb: xhci-mtk: use @sch_tt to check whether need do TT schedule
(git-fixes).
- vhost/vsock: Use kvmalloc/kvfree for larger packets (git-fixes).
- video: fbdev: pxa3xx-gcu: Fix integer overflow in pxa3xx_gcu_write
(git-fixes).
- watchdog: armada_37xx_wdt: Fix .set_timeout callback (git-fixes).
- watchdog: ftwdt010_wdt: fix test for platform_get_irq() failure
(git-fixes).
- wifi: ath10k: add peer map clean up for peer delete in
ath10k_sta_state() (git-fixes).
- wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg() (git-fixes).
- wifi: brcmfmac: fix invalid address access when enabling SCAN log level
(git-fixes).
- wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()
(git-fixes).
- wifi: cfg80211: update hidden BSSes to avoid WARN_ON (git-fixes).
- wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue
(other cases) (git-fixes).
- wifi: mac80211: Fix UAF in ieee80211_scan_rx() (git-fixes).
- wifi: mac80211: allow bw change during channel switch in mesh
(git-fixes).
- wifi: mac80211: do not drop packets smaller than the LLC-SNAP header on
fast-rx (git-fixes).
- wifi: mac80211_hwsim: avoid mac80211 warning on bad rate (git-fixes).
- wifi: rt2x00: correctly set BBP register 86 for MT7620 (git-fixes).
- wifi: rt2x00: do not run Rt5592 IQ calibration on MT7620 (git-fixes).
- wifi: rt2x00: set SoC wmac clock register (git-fixes).
- wifi: rt2x00: set VGC gain for both chains of MT7620 (git-fixes).
- wifi: rt2x00: set correct TX_SW_CFG1 MAC register for MT7620 (git-fixes).
- wifi: rtl8xxxu: Fix AIFS written to REG_EDCA_*_PARAM (git-fixes).
- wifi: rtl8xxxu: Fix skb misuse in TX queue selection (git-fixes).
- wifi: rtl8xxxu: Improve rtl8xxxu_queue_select (git-fixes).
- wifi: rtl8xxxu: Remove copy-paste leftover in gen2_update_rate_mask
(git-fixes).
- wifi: rtl8xxxu: gen2: Fix mistake in path B IQ calibration (git-fixes).
- wifi: rtl8xxxu: tighten bounds checking in rtl8xxxu_read_efuse()
(git-fixes).
- xfs: add missing assert in xfs_fsmap_owner_from_rmap (git-fixes).
- xfs: enable big timestamps (bsc#1203387).
- xfs: enable new inode btree counters feature (bsc#1203387).
- xfs: explicitly define inode timestamp range (bsc#1203387).
- xfs: fix memory corruption during remote attr value buffer invalidation
(git-fixes).
- xfs: fix s_maxbytes computation on 32-bit kernels (git-fixes).
- xfs: hoist out xfs_resizefs_init_new_ags() (git-fixes).
- xfs: move incore structures out of xfs_da_format.h (git-fixes).
- xfs: quota: move to time64_t interfaces (bsc#1203387).
- xfs: redefine xfs_ictimestamp_t (bsc#1203387). Refresh
patches.suse/xfs-repair-malformed-inode-items-during-log-recovery.patch.
- xfs: redefine xfs_timestamp_t (bsc#1203387).
- xfs: refactor remote attr value buffer invalidation (git-fixes).
- xfs: remove obsolete AGF counter debugging (git-fixes).
- xfs: rename `new' to `delta' in xfs_growfs_data_private() (git-fixes).
- xfs: reserve data and rt quota at the same time (bsc#1203496).
- xfs: slightly tweak an assert in xfs_fs_map_blocks (git-fixes).
- xfs: store inode btree block counts in AGI header (bsc#1203387).
- xfs: streamline xfs_attr3_leaf_inactive (git-fixes).
- xfs: use a struct timespec64 for the in-core crtime (bsc#1203387).
- xfs: use the finobt block counts to speed up mount times (bsc#1203387).
- xfs: widen ondisk inode timestamps to deal with y2038+ (bsc#1203387).
- xfs: widen ondisk quota expiration timestamps to handle y2038+
(bsc#1203387).
- xhci: Do not show warning for reinit on known broken suspend (git-fixes).
Special Instructions and Notes:
Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3897=1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3:
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2022-3897=1
Package List:
- openSUSE Leap 15.3 (x86_64):
cluster-md-kmp-azure-5.3.18-150300.38.83.1
cluster-md-kmp-azure-debuginfo-5.3.18-150300.38.83.1
dlm-kmp-azure-5.3.18-150300.38.83.1
dlm-kmp-azure-debuginfo-5.3.18-150300.38.83.1
gfs2-kmp-azure-5.3.18-150300.38.83.1
gfs2-kmp-azure-debuginfo-5.3.18-150300.38.83.1
kernel-azure-5.3.18-150300.38.83.1
kernel-azure-debuginfo-5.3.18-150300.38.83.1
kernel-azure-debugsource-5.3.18-150300.38.83.1
kernel-azure-devel-5.3.18-150300.38.83.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.83.1
kernel-azure-extra-5.3.18-150300.38.83.1
kernel-azure-extra-debuginfo-5.3.18-150300.38.83.1
kernel-azure-livepatch-devel-5.3.18-150300.38.83.1
kernel-azure-optional-5.3.18-150300.38.83.1
kernel-azure-optional-debuginfo-5.3.18-150300.38.83.1
kernel-syms-azure-5.3.18-150300.38.83.1
kselftests-kmp-azure-5.3.18-150300.38.83.1
kselftests-kmp-azure-debuginfo-5.3.18-150300.38.83.1
ocfs2-kmp-azure-5.3.18-150300.38.83.1
ocfs2-kmp-azure-debuginfo-5.3.18-150300.38.83.1
reiserfs-kmp-azure-5.3.18-150300.38.83.1
reiserfs-kmp-azure-debuginfo-5.3.18-150300.38.83.1
- openSUSE Leap 15.3 (noarch):
kernel-devel-azure-5.3.18-150300.38.83.1
kernel-source-azure-5.3.18-150300.38.83.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (noarch):
kernel-devel-azure-5.3.18-150300.38.83.1
kernel-source-azure-5.3.18-150300.38.83.1
- SUSE Linux Enterprise Module for Public Cloud 15-SP3 (x86_64):
kernel-azure-5.3.18-150300.38.83.1
kernel-azure-debuginfo-5.3.18-150300.38.83.1
kernel-azure-debugsource-5.3.18-150300.38.83.1
kernel-azure-devel-5.3.18-150300.38.83.1
kernel-azure-devel-debuginfo-5.3.18-150300.38.83.1
kernel-syms-azure-5.3.18-150300.38.83.1
References:
https://www.suse.com/security/cve/CVE-2021-4037.html
https://www.suse.com/security/cve/CVE-2022-2153.html
https://www.suse.com/security/cve/CVE-2022-28748.html
https://www.suse.com/security/cve/CVE-2022-2964.html
https://www.suse.com/security/cve/CVE-2022-2978.html
https://www.suse.com/security/cve/CVE-2022-3169.html
https://www.suse.com/security/cve/CVE-2022-3176.html
https://www.suse.com/security/cve/CVE-2022-3424.html
https://www.suse.com/security/cve/CVE-2022-3521.html
https://www.suse.com/security/cve/CVE-2022-3524.html
https://www.suse.com/security/cve/CVE-2022-3535.html
https://www.suse.com/security/cve/CVE-2022-3542.html
https://www.suse.com/security/cve/CVE-2022-3545.html
https://www.suse.com/security/cve/CVE-2022-3565.html
https://www.suse.com/security/cve/CVE-2022-3577.html
https://www.suse.com/security/cve/CVE-2022-3586.html
https://www.suse.com/security/cve/CVE-2022-3594.html
https://www.suse.com/security/cve/CVE-2022-3621.html
https://www.suse.com/security/cve/CVE-2022-3623.html
https://www.suse.com/security/cve/CVE-2022-3625.html
https://www.suse.com/security/cve/CVE-2022-3629.html
https://www.suse.com/security/cve/CVE-2022-3640.html
https://www.suse.com/security/cve/CVE-2022-3646.html
https://www.suse.com/security/cve/CVE-2022-3649.html
https://www.suse.com/security/cve/CVE-2022-39189.html
https://www.suse.com/security/cve/CVE-2022-40768.html
https://www.suse.com/security/cve/CVE-2022-41674.html
https://www.suse.com/security/cve/CVE-2022-42703.html
https://www.suse.com/security/cve/CVE-2022-42719.html
https://www.suse.com/security/cve/CVE-2022-42720.html
https://www.suse.com/security/cve/CVE-2022-42721.html
https://www.suse.com/security/cve/CVE-2022-42722.html
https://www.suse.com/security/cve/CVE-2022-43750.html
https://bugzilla.suse.com/1032323
https://bugzilla.suse.com/1065729
https://bugzilla.suse.com/1152489
https://bugzilla.suse.com/1196018
https://bugzilla.suse.com/1198702
https://bugzilla.suse.com/1200465
https://bugzilla.suse.com/1200788
https://bugzilla.suse.com/1201725
https://bugzilla.suse.com/1202638
https://bugzilla.suse.com/1202686
https://bugzilla.suse.com/1202700
https://bugzilla.suse.com/1203066
https://bugzilla.suse.com/1203098
https://bugzilla.suse.com/1203290
https://bugzilla.suse.com/1203387
https://bugzilla.suse.com/1203391
https://bugzilla.suse.com/1203496
https://bugzilla.suse.com/1203514
https://bugzilla.suse.com/1203770
https://bugzilla.suse.com/1203802
https://bugzilla.suse.com/1204051
https://bugzilla.suse.com/1204053
https://bugzilla.suse.com/1204059
https://bugzilla.suse.com/1204060
https://bugzilla.suse.com/1204125
https://bugzilla.suse.com/1204166
https://bugzilla.suse.com/1204168
https://bugzilla.suse.com/1204354
https://bugzilla.suse.com/1204355
https://bugzilla.suse.com/1204382
https://bugzilla.suse.com/1204402
https://bugzilla.suse.com/1204415
https://bugzilla.suse.com/1204417
https://bugzilla.suse.com/1204431
https://bugzilla.suse.com/1204439
https://bugzilla.suse.com/1204470
https://bugzilla.suse.com/1204479
https://bugzilla.suse.com/1204574
https://bugzilla.suse.com/1204575
https://bugzilla.suse.com/1204619
https://bugzilla.suse.com/1204635
https://bugzilla.suse.com/1204637
https://bugzilla.suse.com/1204646
https://bugzilla.suse.com/1204647
https://bugzilla.suse.com/1204653
https://bugzilla.suse.com/1204728
https://bugzilla.suse.com/1204753
https://bugzilla.suse.com/1204754
1
0
SUSE-SU-2022:3889-1: important: Security update for exiv2
by opensuse-security@opensuse.org 07 Nov '22
by opensuse-security@opensuse.org 07 Nov '22
07 Nov '22
SUSE Security Update: Security update for exiv2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3889-1
Rating: important
References: #1068871 #1142675 #1142679 #1185002 #1185218
#1185447 #1185913 #1186053 #1186192 #1188645
#1188733 #1189332 #1189333 #1189334 #1189335
#1189338 PED-1393
Cross-References: CVE-2017-1000128 CVE-2019-13108 CVE-2019-13111
CVE-2020-19716 CVE-2021-29457 CVE-2021-29463
CVE-2021-29470 CVE-2021-29623 CVE-2021-31291
CVE-2021-32617 CVE-2021-34334 CVE-2021-37620
CVE-2021-37621 CVE-2021-37622 CVE-2021-37623
CVSS scores:
CVE-2017-1000128 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2017-1000128 (SUSE): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2019-13108 (NVD) : 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-13108 (SUSE): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2019-13111 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-13111 (SUSE): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2020-19716 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2020-19716 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29457 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-29457 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-29463 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29463 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29470 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29470 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29623 (NVD) : 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2021-29623 (SUSE): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVE-2021-31291 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32617 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-32617 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-34334 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-34334 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37620 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37620 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-37621 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37621 (SUSE): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37622 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37622 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37623 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-37623 (SUSE): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Desktop Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves 15 vulnerabilities, contains one
feature and has one errata is now available.
Description:
This update for exiv2 fixes the following issues:
Updated to version 0.27.5 (jsc#PED-1393):
- CVE-2017-1000128: Fixed stack out of bounds read in JPEG2000 parser
(bsc#1068871).
- CVE-2019-13108: Fixed integer overflow PngImage:readMetadata
(bsc#1142675).
- CVE-2020-19716: Fixed buffer overflow vulnerability in the Databuf
function in types.cpp (bsc#1188645).
- CVE-2021-29457: Fixed heap buffer overflow when write metadata into a
crafted image file (bsc#1185002).
- CVE-2021-29470: Fixed out-of-bounds read in
Exiv2:Jp2Image:encodeJp2Header (bsc#1185447).
- CVE-2021-29623: Fixed read of uninitialized memory (bsc#1186053).
- CVE-2021-31291: Fixed heap-based buffer overflow in jp2image.cpp
(bsc#1188733).
- CVE-2021-32617: Fixed denial of service due to inefficient algorithm
(bsc#1186192).
- CVE-2021-37620: Fixed out-of-bounds read in XmpTextValue:read()
(bsc#1189332).
- CVE-2021-37621: Fixed DoS due to infinite loop in
Image:printIFDStructure (bsc#1189333).
- CVE-2021-37622: Fixed DoS due to infinite loop in
JpegBase:printStructure (bsc#1189334)
- CVE-2021-34334: Fixed DoS due to integer overflow in loop
counter(bsc#1189338)
- CVE-2021-37623: Fixed DoS due to infinite loop in
JpegBase:printStructure (bsc#1189335)
- CVE-2021-29463: Fixed out-of-bounds read in webpimage.cpp (bsc#1185913).
- CVE-2021-34334: Fixed DoS due to integer overflow in loop counter
(bsc#1189338)
- CVE-2019-13111: Fixed integer overflow in WebPImage:decodeChunks that
lead to denial of service (bsc#1142679)
- CVE-2021-29463: Fixed an out-of-bounds read was found in webpimage.cpp
(bsc#1185913)
Bugfixes:
- Fixed build using GCC 11 (bsc#1185218).
A new libexiv2-2_27 shared library is shipped, the libexiv2-2_26 is
provided only for compatibility now.
Please recompile your applications using the exiv2 library.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3889=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-3889=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
exiv2-0.27.5-150400.15.4.1
exiv2-debuginfo-0.27.5-150400.15.4.1
exiv2-debugsource-0.27.5-150400.15.4.1
libexiv2-26-0.26-150400.9.16.1
libexiv2-26-debuginfo-0.26-150400.9.16.1
libexiv2-27-0.27.5-150400.15.4.1
libexiv2-27-debuginfo-0.27.5-150400.15.4.1
libexiv2-devel-0.27.5-150400.15.4.1
libexiv2-xmp-static-0.27.5-150400.15.4.1
- openSUSE Leap 15.4 (noarch):
exiv2-lang-0.27.5-150400.15.4.1
- openSUSE Leap 15.4 (x86_64):
libexiv2-26-32bit-0.26-150400.9.16.1
libexiv2-26-32bit-debuginfo-0.26-150400.9.16.1
libexiv2-27-32bit-0.27.5-150400.15.4.1
libexiv2-27-32bit-debuginfo-0.27.5-150400.15.4.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
exiv2-debuginfo-0.27.5-150400.15.4.1
exiv2-debugsource-0.27.5-150400.15.4.1
libexiv2-26-0.26-150400.9.16.1
libexiv2-26-debuginfo-0.26-150400.9.16.1
libexiv2-27-0.27.5-150400.15.4.1
libexiv2-27-debuginfo-0.27.5-150400.15.4.1
libexiv2-devel-0.27.5-150400.15.4.1
libexiv2-xmp-static-0.27.5-150400.15.4.1
References:
https://www.suse.com/security/cve/CVE-2017-1000128.html
https://www.suse.com/security/cve/CVE-2019-13108.html
https://www.suse.com/security/cve/CVE-2019-13111.html
https://www.suse.com/security/cve/CVE-2020-19716.html
https://www.suse.com/security/cve/CVE-2021-29457.html
https://www.suse.com/security/cve/CVE-2021-29463.html
https://www.suse.com/security/cve/CVE-2021-29470.html
https://www.suse.com/security/cve/CVE-2021-29623.html
https://www.suse.com/security/cve/CVE-2021-31291.html
https://www.suse.com/security/cve/CVE-2021-32617.html
https://www.suse.com/security/cve/CVE-2021-34334.html
https://www.suse.com/security/cve/CVE-2021-37620.html
https://www.suse.com/security/cve/CVE-2021-37621.html
https://www.suse.com/security/cve/CVE-2021-37622.html
https://www.suse.com/security/cve/CVE-2021-37623.html
https://bugzilla.suse.com/1068871
https://bugzilla.suse.com/1142675
https://bugzilla.suse.com/1142679
https://bugzilla.suse.com/1185002
https://bugzilla.suse.com/1185218
https://bugzilla.suse.com/1185447
https://bugzilla.suse.com/1185913
https://bugzilla.suse.com/1186053
https://bugzilla.suse.com/1186192
https://bugzilla.suse.com/1188645
https://bugzilla.suse.com/1188733
https://bugzilla.suse.com/1189332
https://bugzilla.suse.com/1189333
https://bugzilla.suse.com/1189334
https://bugzilla.suse.com/1189335
https://bugzilla.suse.com/1189338
1
0
SUSE-SU-2022:3892-1: moderate: Security update for exiv2
by opensuse-security@opensuse.org 07 Nov '22
by opensuse-security@opensuse.org 07 Nov '22
07 Nov '22
SUSE Security Update: Security update for exiv2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3892-1
Rating: moderate
References: #1142679 #1185913 #1189338
Cross-References: CVE-2019-13111 CVE-2021-29463 CVE-2021-34334
CVSS scores:
CVE-2019-13111 (NVD) : 5.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2019-13111 (SUSE): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-29463 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-29463 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-34334 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-34334 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for exiv2 fixes the following issues:
- CVE-2019-13111: Fixed nteger overflow in WebPImage:decodeChunks
(bsc#1142679).
- CVE-2021-29463: Fixed out-of-bounds read (bsc#1185913).
- CVE-2021-34334: Fixed a DoS due to integer overflow in loop counter
bug (bsc#1189338).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3892=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-3892=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
exiv2-0.26-150000.6.21.1
exiv2-debuginfo-0.26-150000.6.21.1
exiv2-debugsource-0.26-150000.6.21.1
libexiv2-26-0.26-150000.6.21.1
libexiv2-26-debuginfo-0.26-150000.6.21.1
libexiv2-devel-0.26-150000.6.21.1
libexiv2-doc-0.26-150000.6.21.1
- openSUSE Leap 15.3 (x86_64):
libexiv2-26-32bit-0.26-150000.6.21.1
libexiv2-26-32bit-debuginfo-0.26-150000.6.21.1
- openSUSE Leap 15.3 (noarch):
exiv2-lang-0.26-150000.6.21.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
exiv2-debuginfo-0.26-150000.6.21.1
exiv2-debugsource-0.26-150000.6.21.1
libexiv2-26-0.26-150000.6.21.1
libexiv2-26-debuginfo-0.26-150000.6.21.1
libexiv2-devel-0.26-150000.6.21.1
References:
https://www.suse.com/security/cve/CVE-2019-13111.html
https://www.suse.com/security/cve/CVE-2021-29463.html
https://www.suse.com/security/cve/CVE-2021-34334.html
https://bugzilla.suse.com/1142679
https://bugzilla.suse.com/1185913
https://bugzilla.suse.com/1189338
1
0
SUSE-SU-2022:3884-1: important: Security update for expat
by opensuse-security@opensuse.org 07 Nov '22
by opensuse-security@opensuse.org 07 Nov '22
07 Nov '22
SUSE Security Update: Security update for expat
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3884-1
Rating: important
References: #1204708
Cross-References: CVE-2022-43680
CVSS scores:
CVE-2022-43680 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-43680 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for expat fixes the following issues:
- CVE-2022-43680: Fixed use-after free caused by overeager destruction
of a shared DTD in XML_ExternalEntityParserCreate (bsc#1204708).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3884=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3884=1
- SUSE Linux Enterprise Micro 5.3:
zypper in -t patch SUSE-SLE-Micro-5.3-2022-3884=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
expat-2.4.4-150400.3.12.1
expat-debuginfo-2.4.4-150400.3.12.1
expat-debugsource-2.4.4-150400.3.12.1
libexpat-devel-2.4.4-150400.3.12.1
libexpat1-2.4.4-150400.3.12.1
libexpat1-debuginfo-2.4.4-150400.3.12.1
- openSUSE Leap 15.4 (x86_64):
expat-32bit-debuginfo-2.4.4-150400.3.12.1
libexpat-devel-32bit-2.4.4-150400.3.12.1
libexpat1-32bit-2.4.4-150400.3.12.1
libexpat1-32bit-debuginfo-2.4.4-150400.3.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
expat-2.4.4-150400.3.12.1
expat-debuginfo-2.4.4-150400.3.12.1
expat-debugsource-2.4.4-150400.3.12.1
libexpat-devel-2.4.4-150400.3.12.1
libexpat1-2.4.4-150400.3.12.1
libexpat1-debuginfo-2.4.4-150400.3.12.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64):
expat-32bit-debuginfo-2.4.4-150400.3.12.1
libexpat1-32bit-2.4.4-150400.3.12.1
libexpat1-32bit-debuginfo-2.4.4-150400.3.12.1
- SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64):
expat-debuginfo-2.4.4-150400.3.12.1
expat-debugsource-2.4.4-150400.3.12.1
libexpat1-2.4.4-150400.3.12.1
libexpat1-debuginfo-2.4.4-150400.3.12.1
References:
https://www.suse.com/security/cve/CVE-2022-43680.html
https://bugzilla.suse.com/1204708
1
0
SUSE-SU-2022:3871-1: important: Security update for libxml2
by opensuse-security@opensuse.org 04 Nov '22
by opensuse-security@opensuse.org 04 Nov '22
04 Nov '22
SUSE Security Update: Security update for libxml2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3871-1
Rating: important
References: #1201978 #1204366 #1204367
Cross-References: CVE-2016-3709 CVE-2022-40303 CVE-2022-40304
CVSS scores:
CVE-2016-3709 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2016-3709 (SUSE): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
CVE-2022-40303 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-40304 (SUSE): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Python2 15-SP3
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for libxml2 fixes the following issues:
- CVE-2016-3709: Fixed possible XSS vulnerability (bsc#1201978).
- CVE-2022-40303: Fixed integer overflows with XML_PARSE_HUGE
(bsc#1204366).
- CVE-2022-40304: Fixed dict corruption caused by entity reference
cycles (bsc#1204367).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap Micro 5.2:
zypper in -t patch openSUSE-Leap-Micro-5.2-2022-3871=1
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3871=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3871=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3871=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3871=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3871=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3871=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3871=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-3871=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3871=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3871=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3871=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3871=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-3871=1
- SUSE Linux Enterprise Module for Python2 15-SP3:
zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2022-3871=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3871=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-3871=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3871=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-3871=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-3871=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-3871=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap Micro 5.2 (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- openSUSE Leap 15.3 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-devel-32bit-2.9.7-150000.3.51.1
- openSUSE Leap 15.3 (noarch):
libxml2-doc-2.9.7-150000.3.51.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Manager Server 4.1 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Manager Proxy 4.1 (x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server for SAP 15 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x x86_64):
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Enterprise Storage 7 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
- SUSE Enterprise Storage 6 (x86_64):
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
- SUSE CaaS Platform 4.0 (x86_64):
libxml2-2-2.9.7-150000.3.51.1
libxml2-2-32bit-2.9.7-150000.3.51.1
libxml2-2-32bit-debuginfo-2.9.7-150000.3.51.1
libxml2-2-debuginfo-2.9.7-150000.3.51.1
libxml2-debugsource-2.9.7-150000.3.51.1
libxml2-devel-2.9.7-150000.3.51.1
libxml2-tools-2.9.7-150000.3.51.1
libxml2-tools-debuginfo-2.9.7-150000.3.51.1
python-libxml2-python-debugsource-2.9.7-150000.3.51.1
python2-libxml2-python-2.9.7-150000.3.51.1
python2-libxml2-python-debuginfo-2.9.7-150000.3.51.1
python3-libxml2-python-2.9.7-150000.3.51.1
python3-libxml2-python-debuginfo-2.9.7-150000.3.51.1
References:
https://www.suse.com/security/cve/CVE-2016-3709.html
https://www.suse.com/security/cve/CVE-2022-40303.html
https://www.suse.com/security/cve/CVE-2022-40304.html
https://bugzilla.suse.com/1201978
https://bugzilla.suse.com/1204366
https://bugzilla.suse.com/1204367
1
0
SUSE-SU-2022:3875-1: important: Security update for xmlbeans
by opensuse-security@opensuse.org 04 Nov '22
by opensuse-security@opensuse.org 04 Nov '22
04 Nov '22
SUSE Security Update: Security update for xmlbeans
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:3875-1
Rating: important
References: #1180915
Cross-References: CVE-2021-23926
CVSS scores:
CVE-2021-23926 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2021-23926 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.1
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for xmlbeans fixes the following issues:
- CVE-2021-23926: Fixed XML parsers not protecting from malicious XML
input (bsc#1180915).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-3875=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-3875=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3875=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3875=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3875=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3875=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3875=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3875=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-3875=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-3875=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3875=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3875=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-3875=1
Package List:
- openSUSE Leap 15.4 (noarch):
xmlbeans-2.6.0-150000.5.3.1
xmlbeans-scripts-2.6.0-150000.5.3.1
- openSUSE Leap 15.3 (noarch):
xmlbeans-2.6.0-150000.5.3.1
xmlbeans-scripts-2.6.0-150000.5.3.1
- SUSE Manager Server 4.1 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Manager Proxy 4.1 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
xmlbeans-2.6.0-150000.5.3.1
- SUSE Enterprise Storage 7 (noarch):
xmlbeans-2.6.0-150000.5.3.1
References:
https://www.suse.com/security/cve/CVE-2021-23926.html
https://bugzilla.suse.com/1180915
1
0