SUSE Security Update: Security update for grub2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2035-1
Rating: important
References: #1191184 #1191185 #1191186 #1193282 #1197948
#1198460 #1198493 #1198495 #1198496 #1198581
Cross-References: CVE-2021-3695 CVE-2021-3696 CVE-2021-3697
CVE-2022-28733 CVE-2022-28734 CVE-2022-28735
CVE-2022-28736
CVSS scores:
CVE-2021-3695 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2021-3696 (SUSE): 5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L
CVE-2021-3697 (SUSE): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2022-28733 (SUSE): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-28735 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-28736 (SUSE): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for SUSE Manager Proxy 4.3
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves 7 vulnerabilities and has three fixes
is now available.
Description:
This update for grub2 fixes the following issues:
This update provides security fixes and hardenings for Boothole 3 /
Boothole 2022 (bsc#1198581)
- CVE-2021-3695: Fixed that a crafted PNG grayscale image could lead to
out-of-bounds write in heap (bsc#1191184)
- CVE-2021-3696: Fixed that a crafted PNG image could lead to out-of-bound
write during huffman table handling (bsc#1191185)
- CVE-2021-3697: Fixed that a crafted JPEG image could lead to buffer
underflow write in the heap (bsc#1191186)
- CVE-2022-28733: Fixed fragmentation math in net/ip (bsc#1198460)
- CVE-2022-28734: Fixed an out-of-bound write for split http headers
(bsc#1198493)
- CVE-2022-28735: Fixed some verifier framework changes (bsc#1198495)
- CVE-2022-28736: Fixed a use-after-free in chainloader command
(bsc#1198496)
- Update SBAT security contact (bsc#1193282)
- Bump grub's SBAT generation to 2
- Use boot disks in OpenFirmware, fixing regression caused when the root
LV is completely in the boot LUN (bsc#1197948)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2035=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-2035=1
- SUSE Linux Enterprise Module for SUSE Manager Proxy 4.3:
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2022-2035=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2035=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
grub2-2.06-150400.11.5.2
grub2-branding-upstream-2.06-150400.11.5.2
grub2-debuginfo-2.06-150400.11.5.2
- openSUSE Leap 15.4 (aarch64 s390x x86_64):
grub2-debugsource-2.06-150400.11.5.2
- openSUSE Leap 15.4 (noarch):
grub2-arm64-efi-2.06-150400.11.5.2
grub2-arm64-efi-debug-2.06-150400.11.5.2
grub2-i386-pc-2.06-150400.11.5.2
grub2-i386-pc-debug-2.06-150400.11.5.2
grub2-powerpc-ieee1275-2.06-150400.11.5.2
grub2-powerpc-ieee1275-debug-2.06-150400.11.5.2
grub2-snapper-plugin-2.06-150400.11.5.2
grub2-systemd-sleep-plugin-2.06-150400.11.5.2
grub2-x86_64-efi-2.06-150400.11.5.2
grub2-x86_64-efi-debug-2.06-150400.11.5.2
grub2-x86_64-xen-2.06-150400.11.5.2
- openSUSE Leap 15.4 (s390x):
grub2-s390x-emu-2.06-150400.11.5.2
grub2-s390x-emu-debug-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):
grub2-x86_64-xen-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for SUSE Manager Proxy 4.3 (noarch):
grub2-arm64-efi-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
grub2-2.06-150400.11.5.2
grub2-debuginfo-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 s390x x86_64):
grub2-debugsource-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):
grub2-arm64-efi-2.06-150400.11.5.2
grub2-i386-pc-2.06-150400.11.5.2
grub2-powerpc-ieee1275-2.06-150400.11.5.2
grub2-snapper-plugin-2.06-150400.11.5.2
grub2-systemd-sleep-plugin-2.06-150400.11.5.2
grub2-x86_64-efi-2.06-150400.11.5.2
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (s390x):
grub2-s390x-emu-2.06-150400.11.5.2
References:
https://www.suse.com/security/cve/CVE-2021-3695.htmlhttps://www.suse.com/security/cve/CVE-2021-3696.htmlhttps://www.suse.com/security/cve/CVE-2021-3697.htmlhttps://www.suse.com/security/cve/CVE-2022-28733.htmlhttps://www.suse.com/security/cve/CVE-2022-28734.htmlhttps://www.suse.com/security/cve/CVE-2022-28735.htmlhttps://www.suse.com/security/cve/CVE-2022-28736.htmlhttps://bugzilla.suse.com/1191184https://bugzilla.suse.com/1191185https://bugzilla.suse.com/1191186https://bugzilla.suse.com/1193282https://bugzilla.suse.com/1197948https://bugzilla.suse.com/1198460https://bugzilla.suse.com/1198493https://bugzilla.suse.com/1198495https://bugzilla.suse.com/1198496https://bugzilla.suse.com/1198581
SUSE Security Update: Security update for go1.17
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2004-1
Rating: important
References: #1190649 #1200134 #1200135 #1200136 #1200137
Cross-References: CVE-2022-29804 CVE-2022-30580 CVE-2022-30629
CVE-2022-30634
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for go1.17 fixes the following issues:
Update to go1.17.11 (released 2022-06-01) (bsc#1190649):
- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large
buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random
ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on
Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running
unintended binary on Windows (bsc#1200136).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2004=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2004=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2004=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2004=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- openSUSE Leap 15.3 (aarch64 i586 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.17-1.17.11-150000.1.37.1
go1.17-doc-1.17.11-150000.1.37.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.17-race-1.17.11-150000.1.37.1
References:
https://www.suse.com/security/cve/CVE-2022-29804.htmlhttps://www.suse.com/security/cve/CVE-2022-30580.htmlhttps://www.suse.com/security/cve/CVE-2022-30629.htmlhttps://www.suse.com/security/cve/CVE-2022-30634.htmlhttps://bugzilla.suse.com/1190649https://bugzilla.suse.com/1200134https://bugzilla.suse.com/1200135https://bugzilla.suse.com/1200136https://bugzilla.suse.com/1200137
SUSE Security Update: Security update for go1.18
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2005-1
Rating: important
References: #1193742 #1200134 #1200135 #1200136 #1200137
Cross-References: CVE-2022-29804 CVE-2022-30580 CVE-2022-30629
CVE-2022-30634
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves four vulnerabilities and has one
errata is now available.
Description:
This update for go1.18 fixes the following issues:
Update to go1.18.3 (released 2022-06-01) (bsc#1193742):
- CVE-2022-30634: Fixed crypto/rand rand.Read hangs with extremely large
buffers (bsc#1200134).
- CVE-2022-30629: Fixed crypto/tls session tickets lack random
ticket_age_add (bsc#1200135).
- CVE-2022-29804: Fixed path/filepath Clean(`.\c:`) returns `c:` on
Windows (bsc#1200137).
- CVE-2022-30580: Fixed os/exec empty Cmd.Path can result in running
unintended binary on Windows (bsc#1200136).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2005=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2005=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-2005=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2005=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- openSUSE Leap 15.4 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- openSUSE Leap 15.3 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
go1.18-1.18.3-150000.1.20.1
go1.18-doc-1.18.3-150000.1.20.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64):
go1.18-race-1.18.3-150000.1.20.1
References:
https://www.suse.com/security/cve/CVE-2022-29804.htmlhttps://www.suse.com/security/cve/CVE-2022-30580.htmlhttps://www.suse.com/security/cve/CVE-2022-30629.htmlhttps://www.suse.com/security/cve/CVE-2022-30634.htmlhttps://bugzilla.suse.com/1193742https://bugzilla.suse.com/1200134https://bugzilla.suse.com/1200135https://bugzilla.suse.com/1200136https://bugzilla.suse.com/1200137
SUSE Security Update: Security update for openvpn
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1934-1
Rating: moderate
References: #1123557 #1197341
Cross-References: CVE-2022-0547
CVSS scores:
CVE-2022-0547 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-0547 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves one vulnerability and has one errata
is now available.
Description:
This update for openvpn fixes the following issues:
- CVE-2022-0547: Fixed possible authentication bypass in external
authentication plug-in (bsc#1197341).
- By default the --suppress-timestamps flag is not needed (bsc#1123557).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1934=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1934=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
openvpn-2.5.6-150400.3.3.1
openvpn-auth-pam-plugin-2.5.6-150400.3.3.1
openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.3.1
openvpn-debuginfo-2.5.6-150400.3.3.1
openvpn-debugsource-2.5.6-150400.3.3.1
openvpn-devel-2.5.6-150400.3.3.1
openvpn-down-root-plugin-2.5.6-150400.3.3.1
openvpn-down-root-plugin-debuginfo-2.5.6-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
openvpn-2.5.6-150400.3.3.1
openvpn-auth-pam-plugin-2.5.6-150400.3.3.1
openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.3.1
openvpn-debuginfo-2.5.6-150400.3.3.1
openvpn-debugsource-2.5.6-150400.3.3.1
openvpn-devel-2.5.6-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2022-0547.htmlhttps://bugzilla.suse.com/1123557https://bugzilla.suse.com/1197341
SUSE Security Update: Security update for redis
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1929-1
Rating: moderate
References: #1198952 #1198953
Cross-References: CVE-2022-24735 CVE-2022-24736
CVSS scores:
CVE-2022-24735 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-24735 (SUSE): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVE-2022-24736 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-24736 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for redis fixes the following issues:
- CVE-2022-24735: Fixed Lua code injection (bsc#1198952).
- CVE-2022-24736: Fixed Lua NULL pointer dereference (bsc#1198953).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1929=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-1929=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
redis-6.2.6-150400.3.3.7
redis-debuginfo-6.2.6-150400.3.3.7
redis-debugsource-6.2.6-150400.3.3.7
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
redis-6.2.6-150400.3.3.7
redis-debuginfo-6.2.6-150400.3.3.7
redis-debugsource-6.2.6-150400.3.3.7
References:
https://www.suse.com/security/cve/CVE-2022-24735.htmlhttps://www.suse.com/security/cve/CVE-2022-24736.htmlhttps://bugzilla.suse.com/1198952https://bugzilla.suse.com/1198953
SUSE Security Update: Security update for libarchive
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1930-1
Rating: moderate
References: #1022528 #1188572 #1189528 #1197634
Cross-References: CVE-2017-5601 CVE-2021-36976 CVE-2022-26280
CVSS scores:
CVE-2017-5601 (NVD) : 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2017-5601 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
CVE-2021-36976 (NVD) : 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-36976 (SUSE): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-26280 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-26280 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
Affected Products:
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Module for Development Tools 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves three vulnerabilities and has one
errata is now available.
Description:
This update for libarchive fixes the following issues:
- CVE-2022-26280: Fixed out-of-bounds read via the component
zipx_lzma_alone_init (bsc#1197634).
- CVE-2021-36976: Fixed use-after-free in copy_string (called from
do_uncompress_block and process_block) (bsc#1188572).
- CVE-2017-5601: Fixed out-of-bounds memory access preventing
denial-of-service (bsc#1197634, bsc#1189528).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1930=1
- SUSE Linux Enterprise Module for Development Tools 15-SP4:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1930=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1930=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
bsdtar-3.5.1-150400.3.3.1
bsdtar-debuginfo-3.5.1-150400.3.3.1
libarchive-debugsource-3.5.1-150400.3.3.1
libarchive-devel-3.5.1-150400.3.3.1
libarchive13-3.5.1-150400.3.3.1
libarchive13-debuginfo-3.5.1-150400.3.3.1
- openSUSE Leap 15.4 (x86_64):
libarchive13-32bit-3.5.1-150400.3.3.1
libarchive13-32bit-debuginfo-3.5.1-150400.3.3.1
- SUSE Linux Enterprise Module for Development Tools 15-SP4 (aarch64 ppc64le s390x x86_64):
bsdtar-3.5.1-150400.3.3.1
bsdtar-debuginfo-3.5.1-150400.3.3.1
libarchive-debugsource-3.5.1-150400.3.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
libarchive-debugsource-3.5.1-150400.3.3.1
libarchive-devel-3.5.1-150400.3.3.1
libarchive13-3.5.1-150400.3.3.1
libarchive13-debuginfo-3.5.1-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2017-5601.htmlhttps://www.suse.com/security/cve/CVE-2021-36976.htmlhttps://www.suse.com/security/cve/CVE-2022-26280.htmlhttps://bugzilla.suse.com/1022528https://bugzilla.suse.com/1188572https://bugzilla.suse.com/1189528https://bugzilla.suse.com/1197634
SUSE Security Update: Security update for patch
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:1925-1
Rating: moderate
References: #1080985 #1111572 #1142041 #1198106
Cross-References: CVE-2018-6952 CVE-2019-13636
CVSS scores:
CVE-2018-6952 (NVD) : 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2018-6952 (SUSE): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2019-13636 (NVD) : 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2019-13636 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available.
Description:
This update for patch fixes the following issues:
Security issues fixed:
- CVE-2019-13636: Fixed follow symlinks unless --follow-symlinks is given.
This increases the security against malicious patches (bsc#1142041).
- CVE-2018-6952: Fixed swapping fakelines in pch_swap. This bug was
causing a double free leading to a crash (bsc#1080985).
Bugfixes:
- Abort when cleaning up fails. This bug could cause an infinite loop when
a patch wouldn't apply, leading to a segmentation fault (bsc#1111572).
- Pass the correct stat to backup files. This bug would occasionally cause
backup files to be missing when all hunks failed to apply (bsc#1198106).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-1925=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-1925=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1925=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1925=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
patch-2.7.6-150000.5.3.1
patch-debuginfo-2.7.6-150000.5.3.1
patch-debugsource-2.7.6-150000.5.3.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
patch-2.7.6-150000.5.3.1
patch-debuginfo-2.7.6-150000.5.3.1
patch-debugsource-2.7.6-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):
patch-2.7.6-150000.5.3.1
patch-debuginfo-2.7.6-150000.5.3.1
patch-debugsource-2.7.6-150000.5.3.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
patch-2.7.6-150000.5.3.1
patch-debuginfo-2.7.6-150000.5.3.1
patch-debugsource-2.7.6-150000.5.3.1
References:
https://www.suse.com/security/cve/CVE-2018-6952.htmlhttps://www.suse.com/security/cve/CVE-2019-13636.htmlhttps://bugzilla.suse.com/1080985https://bugzilla.suse.com/1111572https://bugzilla.suse.com/1142041https://bugzilla.suse.com/1198106