openSUSE Security Announce
Threads by month
- ----- 2024 -----
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
July 2022
- 1 participants
- 95 discussions
SUSE-SU-2022:2347-1: moderate: Security update for libnbd
by opensuse-security@opensuse.org 11 Jul '22
by opensuse-security@opensuse.org 11 Jul '22
11 Jul '22
SUSE Security Update: Security update for libnbd
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2347-1
Rating: moderate
References: #1195636
Cross-References: CVE-2022-0485
CVSS scores:
CVE-2022-0485 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for libnbd fixes the following issues:
- CVE-2022-0485: Fixed nbdcopy failure if NBD read or write fails
(bsc#1195636).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2347=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2347=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libnbd-1.9.3-150300.8.9.1
libnbd-debuginfo-1.9.3-150300.8.9.1
libnbd-debugsource-1.9.3-150300.8.9.1
libnbd-devel-1.9.3-150300.8.9.1
libnbd0-1.9.3-150300.8.9.1
libnbd0-debuginfo-1.9.3-150300.8.9.1
nbdfuse-1.9.3-150300.8.9.1
nbdfuse-debuginfo-1.9.3-150300.8.9.1
- openSUSE Leap 15.4 (noarch):
libnbd-bash-completion-1.9.3-150300.8.9.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libnbd-1.9.3-150300.8.9.1
libnbd-debuginfo-1.9.3-150300.8.9.1
libnbd-debugsource-1.9.3-150300.8.9.1
libnbd-devel-1.9.3-150300.8.9.1
libnbd0-1.9.3-150300.8.9.1
libnbd0-debuginfo-1.9.3-150300.8.9.1
nbdfuse-1.9.3-150300.8.9.1
nbdfuse-debuginfo-1.9.3-150300.8.9.1
- openSUSE Leap 15.3 (noarch):
libnbd-bash-completion-1.9.3-150300.8.9.1
References:
https://www.suse.com/security/cve/CVE-2022-0485.html
https://bugzilla.suse.com/1195636
1
0
SUSE-SU-2022:2348-1: important: Security update for crash
by opensuse-security@opensuse.org 11 Jul '22
by opensuse-security@opensuse.org 11 Jul '22
11 Jul '22
SUSE Security Update: Security update for crash
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2348-1
Rating: important
References: #1198581
Affected Products:
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Development Tools 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of crash fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues
(bsc#1198581)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2348=1
- SUSE Linux Enterprise Module for Development Tools 15-SP3:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-2348=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
crash-7.2.9-150300.23.10.1
crash-debuginfo-7.2.9-150300.23.10.1
crash-debugsource-7.2.9-150300.23.10.1
crash-devel-7.2.9-150300.23.10.1
crash-doc-7.2.9-150300.23.10.1
crash-eppic-7.2.9-150300.23.10.1
crash-eppic-debuginfo-7.2.9-150300.23.10.1
crash-kmp-default-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
crash-kmp-default-debuginfo-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
- openSUSE Leap 15.3 (aarch64 x86_64):
crash-kmp-preempt-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
crash-kmp-preempt-debuginfo-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
- openSUSE Leap 15.3 (aarch64):
crash-kmp-64kb-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
crash-kmp-64kb-debuginfo-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
- openSUSE Leap 15.3 (x86_64):
crash-gcore-7.2.9-150300.23.10.1
crash-gcore-debuginfo-7.2.9-150300.23.10.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64):
crash-7.2.9-150300.23.10.1
crash-debuginfo-7.2.9-150300.23.10.1
crash-debugsource-7.2.9-150300.23.10.1
crash-devel-7.2.9-150300.23.10.1
crash-kmp-default-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
crash-kmp-default-debuginfo-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
- SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64):
crash-kmp-64kb-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
crash-kmp-64kb-debuginfo-7.2.9_k5.3.18_150300.59.76-150300.23.10.1
References:
https://bugzilla.suse.com/1198581
1
0
openSUSE-SU-2022:10049-1: moderate: Security update for libqt5-qtwebengine
by opensuse-security@opensuse.org 10 Jul '22
by opensuse-security@opensuse.org 10 Jul '22
10 Jul '22
openSUSE Security Update: Security update for libqt5-qtwebengine
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10049-1
Rating: moderate
References:
Cross-References: CVE-2022-0797 CVE-2022-1125 CVE-2022-1138
CVE-2022-1305 CVE-2022-1310 CVE-2022-1314
CVE-2022-1493
CVSS scores:
CVE-2022-0797 (NVD) : 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for libqt5-qtwebengine fixes the following issues:
Update to version 5.15.10:
* Fix top level build with no widget
* Fix read-after-free on EGL extensions
* Update Chromium
* Add workaround for unstable gn on macOS in ci
* Pass archiver to gn build
* Fix navigation to non-local URLs
* Add support for universal builds for qtwebengine and qtpdf
* Enable Apple Silicon support
* Fix cross compilation x86_64->arm64 on mac
* Bump version to 5.15.10
* CustomDialogs: Make custom input fields readable in dark mode
* CookieBrowser: Make alternating rows readable in dark mode
* Update Chromium:
* Bump V8_PATCH_LEVEL
* Fix clang set-but-unused-variable warning
* Fix mac toolchain python linker script call
* Fix missing dependency for gpu sources
* Fix python calls
* Fix undefined symbol for universal link
* Quick fix for regression in service workers by reverting backports
* [Backport] CVE-2022-0797: Out of bounds memory access in Mojo
* [Backport] CVE-2022-1125
* [Backport] CVE-2022-1138: Inappropriate implementation in Web Cursor.
* [Backport] CVE-2022-1305: Use after free in storage
* [Backport] CVE-2022-1310: Use after free in regular expressions
* [Backport] CVE-2022-1314: Type Confusion in V8
* [Backport] CVE-2022-1493: Use after free in Dev Tools
* [Backport] On arm64 hosts, set host_cpu to 'arm64', not 'arm'
* [Backport] Security Bug 1296876
* [Backport] Security bug 1269999
* [Backport] Security bug 1280852
* [Backport] Security bug 1292905
* [Backport] Security bug 1304659
* [Backport] Security bug 1306507
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10049=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 x86_64):
libQt5Pdf5-5.15.10-bp154.2.3.2
libQt5PdfWidgets5-5.15.10-bp154.2.3.2
libqt5-qtpdf-devel-5.15.10-bp154.2.3.2
libqt5-qtpdf-examples-5.15.10-bp154.2.3.2
libqt5-qtpdf-imports-5.15.10-bp154.2.3.2
libqt5-qtwebengine-5.15.10-bp154.2.3.2
libqt5-qtwebengine-devel-5.15.10-bp154.2.3.2
libqt5-qtwebengine-examples-5.15.10-bp154.2.3.2
- openSUSE Backports SLE-15-SP4 (noarch):
libqt5-qtpdf-private-headers-devel-5.15.10-bp154.2.3.2
libqt5-qtwebengine-private-headers-devel-5.15.10-bp154.2.3.2
References:
https://www.suse.com/security/cve/CVE-2022-0797.html
https://www.suse.com/security/cve/CVE-2022-1125.html
https://www.suse.com/security/cve/CVE-2022-1138.html
https://www.suse.com/security/cve/CVE-2022-1305.html
https://www.suse.com/security/cve/CVE-2022-1310.html
https://www.suse.com/security/cve/CVE-2022-1314.html
https://www.suse.com/security/cve/CVE-2022-1493.html
1
0
openSUSE-SU-2022:10045-1: moderate: Security update for chafa
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
openSUSE Security Update: Security update for chafa
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10045-1
Rating: moderate
References: #1201211
Cross-References: CVE-2022-2301
Affected Products:
openSUSE Backports SLE-15-SP4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for chafa fixes the following issues:
- CVE-2022-2301: Fixed buffer over-read (boo#1201211)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP4:
zypper in -t patch openSUSE-2022-10045=1
Package List:
- openSUSE Backports SLE-15-SP4 (aarch64 i586 ppc64le s390x x86_64):
chafa-1.8.0-bp154.3.8.1
chafa-debuginfo-1.8.0-bp154.3.8.1
chafa-debugsource-1.8.0-bp154.3.8.1
chafa-devel-1.8.0-bp154.3.8.1
libchafa0-1.8.0-bp154.3.8.1
libchafa0-debuginfo-1.8.0-bp154.3.8.1
- openSUSE Backports SLE-15-SP4 (noarch):
chafa-doc-1.8.0-bp154.3.8.1
References:
https://www.suse.com/security/cve/CVE-2022-2301.html
https://bugzilla.suse.com/1201211
1
0
openSUSE-SU-2022:10044-1: moderate: Security update for chafa
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
openSUSE Security Update: Security update for chafa
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10044-1
Rating: moderate
References: #1201211
Cross-References: CVE-2022-2301
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for chafa fixes the following issues:
- CVE-2022-2301: Fix buffer over-read (boo#1201211)
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-10044=1
Package List:
- openSUSE Backports SLE-15-SP3 (aarch64 i586 ppc64le s390x x86_64):
chafa-1.4.1-bp153.2.8.1
chafa-debuginfo-1.4.1-bp153.2.8.1
chafa-debugsource-1.4.1-bp153.2.8.1
chafa-devel-1.4.1-bp153.2.8.1
libchafa0-1.4.1-bp153.2.8.1
libchafa0-debuginfo-1.4.1-bp153.2.8.1
- openSUSE Backports SLE-15-SP3 (noarch):
chafa-doc-1.4.1-bp153.2.8.1
References:
https://www.suse.com/security/cve/CVE-2022-2301.html
https://bugzilla.suse.com/1201211
1
0
SUSE-SU-2022:2341-1: important: Security update for containerd, docker and runc
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
SUSE Security Update: Security update for containerd, docker and runc
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2341-1
Rating: important
References: #1192051 #1199460 #1199565 #1200088 #1200145
Cross-References: CVE-2022-29162 CVE-2022-31030
CVSS scores:
CVE-2022-29162 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-29162 (SUSE): 4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-31030 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Containers 15-SP3
SUSE Linux Enterprise Module for Containers 15-SP4
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.1
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has three
fixes is now available.
Description:
This update for containerd, docker and runc fixes the following issues:
containerd:
- CVE-2022-31030: Fixed denial of service via invocation of the ExecSync
API (bsc#1200145)
docker:
- Update to Docker 20.10.17-ce. See upstream changelog online at
https://docs.docker.com/engine/release-notes/#201017. (bsc#1200145)
runc:
Update to runc v1.1.3.
Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.3.
* Our seccomp `-ENOSYS` stub now correctly handles multiplexed syscalls on
s390 and s390x. This solves the issue where syscalls the host kernel did
not support would return `-EPERM` despite the existence of the `-ENOSYS`
stub code (this was due to how s390x does syscall multiplexing).
* Retry on dbus disconnect logic in libcontainer/cgroups/systemd now works
as intended; this fix does not affect runc binary itself but is
important for libcontainer users such as Kubernetes.
* Inability to compile with recent clang due to an issue with duplicate
constants in libseccomp-golang.
* When using systemd cgroup driver, skip adding device paths that don't
exist, to stop systemd from emitting warnings about those paths.
* Socket activation was failing when more than 3 sockets were used.
* Various CI fixes.
* Allow to bind mount /proc/sys/kernel/ns_last_pid to inside container.
- Fixed issues with newer syscalls (namely faccessat2) on older kernels on
s390(x) caused by that platform's syscall multiplexing semantics.
(bsc#1192051 bsc#1199565)
Update to runc v1.1.2.
Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.2.
Security issue fixed:
- CVE-2022-29162: A bug was found in runc where runc exec --cap executed
processes with non-empty inheritable Linux process capabilities,
creating an atypical Linux environment. (bsc#1199460)
- `runc spec` no longer sets any inheritable capabilities in the created
example OCI spec (`config.json`) file.
Update to runc v1.1.1.
Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.1.
* runc run/start can now run a container with read-only /dev in OCI spec,
rather than error out. (#3355)
* runc exec now ensures that --cgroup argument is a sub-cgroup. (#3403)
libcontainer systemd v2 manager no longer errors out if one of the files
listed in /sys/kernel/cgroup/delegate do not exist in container's
cgroup. (#3387, #3404)
* Loosen OCI spec validation to avoid bogus "Intel RDT is not supported"
error. (#3406)
* libcontainer/cgroups no longer panics in cgroup v1 managers if stat
of /sys/fs/cgroup/unified returns an error other than ENOENT. (#3435)
Update to runc v1.1.0.
Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.0.
- libcontainer will now refuse to build without the nsenter package being
correctly compiled (specifically this requires CGO to be enabled). This
should avoid folks accidentally creating broken runc binaries (and
incorrectly importing our internal libraries into their projects).
(#3331)
Update to runc v1.1.0~rc1.
Upstream changelog is available from
https://github.com/opencontainers/runc/releases/tag/v1.1.0-rc.1.
+ Add support for RDMA cgroup added in Linux 4.11.
* runc exec now produces exit code of 255 when the exec failed. This may
help in distinguishing between runc exec failures (such as invalid
options, non-running container or non-existent binary etc.) and failures
of the command being executed.
+ runc run: new --keep option to skip removal exited containers artefacts.
This might be useful to check the state (e.g. of cgroup controllers)
after the container has���exited.
+ seccomp: add support for SCMP_ACT_KILL_PROCESS and SCMP_ACT_KILL_THREAD
(the latter is just an alias for SCMP_ACT_KILL).
+ seccomp: add support for SCMP_ACT_NOTIFY (seccomp actions). This allows
users to create sophisticated seccomp filters where syscalls can be
efficiently emulated by privileged processes on the host.
+ checkpoint/restore: add an option (--lsm-mount-context) to set a
different LSM mount context on restore.
+ intelrdt: support ClosID parameter.
+ runc exec --cgroup: an option to specify a (non-top) in-container cgroup
to use for the process being executed.
+ cgroup v1 controllers now support hybrid hierarchy (i.e. when on a
cgroup v1 machine a cgroup2 filesystem is mounted to
/sys/fs/cgroup/unified, runc run/exec now adds the container to the
appropriate cgroup under it).
+ sysctl: allow slashes in sysctl names, to better match sysctl(8)'s
behaviour.
+ mounts: add support for bind-mounts which are inaccessible after
switching the user namespace. Note that this does not permit the
container any additional access to the host filesystem, it simply allows
containers to have bind-mounts configured for paths the user can access
but have restrictive access control settings for other users.
+ Add support for recursive mount attributes using mount_setattr(2). These
have the same names as the proposed mount(8) options -- just prepend r
to the option name (such as rro).
+ Add runc features subcommand to allow runc users to detect what features
runc has been built with. This includes critical information such as
supported mount flags, hook names, and so on. Note that the output of
this command is subject to change and will not be considered stable
until runc 1.2 at the earliest. The runtime-spec specification for this
feature is being developed in opencontainers/runtime-spec#1130.
* system: improve performance of /proc/$pid/stat parsing.
* cgroup2: when /sys/fs/cgroup is configured as a read-write mount, change
the ownership of certain cgroup control files (as per
/sys/kernel/cgroup/delegate) to allow for proper deferral to the
container process.
* runc checkpoint/restore: fixed for containers with an external bind
mount which destination is a symlink.
* cgroup: improve openat2 handling for cgroup directory handle hardening.
runc delete -f now succeeds (rather than timing out) on a paused
container.
* runc run/start/exec now refuses a frozen cgroup (paused container in
case of exec). Users can disable this using --ignore-paused.
- Update version data embedded in binary to correctly include the git
commit of the release.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2341=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2341=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2341=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2341=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2341=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2341=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2341=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-2341=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2341=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2341=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2341=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2341=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-2341=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2341=1
- SUSE Linux Enterprise Module for Containers 15-SP4:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-2341=1
- SUSE Linux Enterprise Module for Containers 15-SP3:
zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-2341=1
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-2341=1
- SUSE Linux Enterprise Micro 5.1:
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2341=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2341=1
- SUSE Enterprise Storage 7.1:
zypper in -t patch SUSE-Storage-7.1-2022-2341=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2341=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2341=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
docker-kubic-20.10.17_ce-150000.166.1
docker-kubic-debuginfo-20.10.17_ce-150000.166.1
docker-kubic-kubeadm-criconfig-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- openSUSE Leap 15.4 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
docker-fish-completion-20.10.17_ce-150000.166.1
docker-kubic-bash-completion-20.10.17_ce-150000.166.1
docker-kubic-fish-completion-20.10.17_ce-150000.166.1
docker-kubic-zsh-completion-20.10.17_ce-150000.166.1
docker-zsh-completion-20.10.17_ce-150000.166.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
docker-kubic-20.10.17_ce-150000.166.1
docker-kubic-debuginfo-20.10.17_ce-150000.166.1
docker-kubic-kubeadm-criconfig-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- openSUSE Leap 15.3 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
docker-fish-completion-20.10.17_ce-150000.166.1
docker-kubic-bash-completion-20.10.17_ce-150000.166.1
docker-kubic-fish-completion-20.10.17_ce-150000.166.1
docker-kubic-zsh-completion-20.10.17_ce-150000.166.1
docker-zsh-completion-20.10.17_ce-150000.166.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Manager Server 4.1 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Manager Proxy 4.1 (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Manager Proxy 4.1 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server for SAP 15 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server 15-SP1-BCL (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Server 15-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Server 15-LTSS (s390x):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
containerd-ctr-1.6.6-150000.73.2
- SUSE Linux Enterprise Module for Containers 15-SP4 (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Module for Containers 15-SP4 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Module for Containers 15-SP3 (aarch64 ppc64le s390x x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Module for Containers 15-SP3 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
docker-fish-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
containerd-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):
containerd-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Enterprise Storage 7.1 (aarch64 x86_64):
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Enterprise Storage 7 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
- SUSE Enterprise Storage 6 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE CaaS Platform 4.0 (noarch):
docker-bash-completion-20.10.17_ce-150000.166.1
- SUSE CaaS Platform 4.0 (x86_64):
containerd-1.6.6-150000.73.2
containerd-ctr-1.6.6-150000.73.2
docker-20.10.17_ce-150000.166.1
docker-debuginfo-20.10.17_ce-150000.166.1
runc-1.1.3-150000.30.1
runc-debuginfo-1.1.3-150000.30.1
References:
https://www.suse.com/security/cve/CVE-2022-29162.html
https://www.suse.com/security/cve/CVE-2022-31030.html
https://bugzilla.suse.com/1192051
https://bugzilla.suse.com/1199460
https://bugzilla.suse.com/1199565
https://bugzilla.suse.com/1200088
https://bugzilla.suse.com/1200145
1
0
SUSE-SU-2022:2342-1: important: Security update for apache2
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
SUSE Security Update: Security update for apache2
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2342-1
Rating: important
References: #1200338 #1200340 #1200341 #1200345 #1200348
#1200350 #1200352
Cross-References: CVE-2022-26377 CVE-2022-28614 CVE-2022-28615
CVE-2022-29404 CVE-2022-30522 CVE-2022-30556
CVE-2022-31813
CVSS scores:
CVE-2022-26377 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-26377 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2022-28614 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-28614 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-28615 (NVD) : 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CVE-2022-28615 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-29404 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-29404 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30522 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30522 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-30556 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-30556 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-31813 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-31813 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that fixes 7 vulnerabilities is now available.
Description:
This update for apache2 fixes the following issues:
- CVE-2022-26377: Fixed possible request smuggling in mod_proxy_ajp
(bsc#1200338)
- CVE-2022-28614: Fixed read beyond bounds via ap_rwrite() (bsc#1200340)
- CVE-2022-28615: Fixed read beyond bounds in ap_strcmp_match()
(bsc#1200341)
- CVE-2022-29404: Fixed denial of service in mod_lua r:parsebody
(bsc#1200345)
- CVE-2022-30556: Fixed information disclosure in mod_lua with
websockets (bsc#1200350)
- CVE-2022-30522: Fixed mod_sed denial of service (bsc#1200352)
- CVE-2022-31813: Fixed mod_proxy X-Forwarded-For dropped by hop-by-hop
mechanism (bsc#1200348)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2342=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2342=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2342=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2342=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2342=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2342=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2342=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-2342=1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-2342=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2342=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2342=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2342=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2342=1
Package List:
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-event-2.4.51-150200.3.48.1
apache2-event-debuginfo-2.4.51-150200.3.48.1
apache2-example-pages-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- openSUSE Leap 15.3 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Manager Server 4.1 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Manager Retail Branch Server 4.1 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Manager Proxy 4.1 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Manager Proxy 4.1 (x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Server 15-SP2-BCL (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64):
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-event-2.4.51-150200.3.48.1
apache2-event-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):
apache2-doc-2.4.51-150200.3.48.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
apache2-2.4.51-150200.3.48.1
apache2-debuginfo-2.4.51-150200.3.48.1
apache2-debugsource-2.4.51-150200.3.48.1
apache2-devel-2.4.51-150200.3.48.1
apache2-prefork-2.4.51-150200.3.48.1
apache2-prefork-debuginfo-2.4.51-150200.3.48.1
apache2-utils-2.4.51-150200.3.48.1
apache2-utils-debuginfo-2.4.51-150200.3.48.1
apache2-worker-2.4.51-150200.3.48.1
apache2-worker-debuginfo-2.4.51-150200.3.48.1
- SUSE Enterprise Storage 7 (noarch):
apache2-doc-2.4.51-150200.3.48.1
References:
https://www.suse.com/security/cve/CVE-2022-26377.html
https://www.suse.com/security/cve/CVE-2022-28614.html
https://www.suse.com/security/cve/CVE-2022-28615.html
https://www.suse.com/security/cve/CVE-2022-29404.html
https://www.suse.com/security/cve/CVE-2022-30522.html
https://www.suse.com/security/cve/CVE-2022-30556.html
https://www.suse.com/security/cve/CVE-2022-31813.html
https://bugzilla.suse.com/1200338
https://bugzilla.suse.com/1200340
https://bugzilla.suse.com/1200341
https://bugzilla.suse.com/1200345
https://bugzilla.suse.com/1200348
https://bugzilla.suse.com/1200350
https://bugzilla.suse.com/1200352
1
0
SUSE-SU-2022:2340-1: important: Security update for fwupdate
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
SUSE Security Update: Security update for fwupdate
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2340-1
Rating: important
References: #1198581
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise Desktop 15-SP4
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP4
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.1
SUSE Manager Server 4.2
SUSE Manager Server 4.3
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that contains security fixes can now be installed.
Description:
This update of fwupdate fixes the following issue:
- rebuild with new secure boot key due to grub2 boothole 3 issues
(bsc#1198581)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2340=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2340=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2340=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2340=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2340=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2340=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2340=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2340=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2340=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2340=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2340=1
- SUSE Linux Enterprise Module for Basesystem 15-SP4:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-2340=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2340=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2340=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2340=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2340=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2340=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2340=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2340=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- openSUSE Leap 15.3 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Manager Server 4.1 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Manager Proxy 4.1 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
- SUSE CaaS Platform 4.0 (x86_64):
fwupdate-12-150100.11.10.1
fwupdate-debuginfo-12-150100.11.10.1
fwupdate-debugsource-12-150100.11.10.1
fwupdate-devel-12-150100.11.10.1
fwupdate-efi-12-150100.11.10.1
fwupdate-efi-debuginfo-12-150100.11.10.1
libfwup1-12-150100.11.10.1
libfwup1-debuginfo-12-150100.11.10.1
References:
https://bugzilla.suse.com/1198581
1
0
SUSE-SU-2022:2344-1: important: Security update for python
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
SUSE Security Update: Security update for python
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:2344-1
Rating: important
References: #1198511
Cross-References: CVE-2015-20107
CVSS scores:
CVE-2015-20107 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2015-20107 (SUSE): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
Affected Products:
SUSE CaaS Platform 4.0
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise Desktop 15-SP3
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Desktop Applications 15-SP3
SUSE Linux Enterprise Module for Python2 15-SP3
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP2-BCL
SUSE Linux Enterprise Server 15-SP2-LTSS
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15-SP2
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Linux Enterprise Storage 7.1
SUSE Manager Proxy 4.1
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.1
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.1
SUSE Manager Server 4.2
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python fixes the following issues:
- CVE-2015-20107: avoid command injection in the mailcap module
(bsc#1198511).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2022-2344=1
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-2344=1
- SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2344=1
- SUSE Manager Retail Branch Server 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2344=1
- SUSE Manager Proxy 4.1:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2344=1
- SUSE Linux Enterprise Server for SAP 15-SP2:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2344=1
- SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2344=1
- SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-2344=1
- SUSE Linux Enterprise Server 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2344=1
- SUSE Linux Enterprise Server 15-SP2-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2344=1
- SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2344=1
- SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2344=1
- SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2022-2344=1
- SUSE Linux Enterprise Module for Python2 15-SP3:
zypper in -t patch SUSE-SLE-Module-Python2-15-SP3-2022-2344=1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2344=1
- SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2344=1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2022-2344=1
- SUSE Enterprise Storage 7:
zypper in -t patch SUSE-Storage-7-2022-2344=1
- SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2022-2344=1
- SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform 'skuba' tool. It
will inform you if it detects new updates and let you then trigger
updating of the complete cluster in a controlled way.
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-demo-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-idle-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- openSUSE Leap 15.4 (noarch):
python-doc-2.7.18-150000.41.1
python-doc-pdf-2.7.18-150000.41.1
- openSUSE Leap 15.4 (x86_64):
libpython2_7-1_0-32bit-2.7.18-150000.41.1
libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.41.1
python-32bit-2.7.18-150000.41.1
python-32bit-debuginfo-2.7.18-150000.41.1
python-base-32bit-2.7.18-150000.41.1
python-base-32bit-debuginfo-2.7.18-150000.41.1
- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-demo-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-idle-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- openSUSE Leap 15.3 (noarch):
python-doc-2.7.18-150000.41.1
python-doc-pdf-2.7.18-150000.41.1
- openSUSE Leap 15.3 (x86_64):
libpython2_7-1_0-32bit-2.7.18-150000.41.1
libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.41.1
python-32bit-2.7.18-150000.41.1
python-32bit-debuginfo-2.7.18-150000.41.1
python-base-32bit-2.7.18-150000.41.1
python-base-32bit-debuginfo-2.7.18-150000.41.1
- SUSE Manager Server 4.1 (ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Manager Retail Branch Server 4.1 (x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Manager Proxy 4.1 (x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Module for Python2 15-SP3 (aarch64 ppc64le s390x x86_64):
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Enterprise Storage 7 (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE Enterprise Storage 6 (aarch64 x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
- SUSE CaaS Platform 4.0 (x86_64):
libpython2_7-1_0-2.7.18-150000.41.1
libpython2_7-1_0-debuginfo-2.7.18-150000.41.1
python-2.7.18-150000.41.1
python-base-2.7.18-150000.41.1
python-base-debuginfo-2.7.18-150000.41.1
python-base-debugsource-2.7.18-150000.41.1
python-curses-2.7.18-150000.41.1
python-curses-debuginfo-2.7.18-150000.41.1
python-debuginfo-2.7.18-150000.41.1
python-debugsource-2.7.18-150000.41.1
python-devel-2.7.18-150000.41.1
python-gdbm-2.7.18-150000.41.1
python-gdbm-debuginfo-2.7.18-150000.41.1
python-tk-2.7.18-150000.41.1
python-tk-debuginfo-2.7.18-150000.41.1
python-xml-2.7.18-150000.41.1
python-xml-debuginfo-2.7.18-150000.41.1
References:
https://www.suse.com/security/cve/CVE-2015-20107.html
https://bugzilla.suse.com/1198511
1
0
openSUSE-SU-2022:10043-1: important: Security update for python-ipython
by opensuse-security@opensuse.org 08 Jul '22
by opensuse-security@opensuse.org 08 Jul '22
08 Jul '22
openSUSE Security Update: Security update for python-ipython
______________________________________________________________________________
Announcement ID: openSUSE-SU-2022:10043-1
Rating: important
References: #1194936
Cross-References: CVE-2022-21699
CVSS scores:
CVE-2022-21699 (NVD) : 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVE-2022-21699 (SUSE): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python-ipython fixes the following issues:
- CVE-2022-21699: Confining executed process to have limited privileges.
(boo#1194936).
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP3:
zypper in -t patch openSUSE-2022-10043=1
Package List:
- openSUSE Backports SLE-15-SP3 (noarch):
python3-ipython-7.13.0-bp153.2.6.1
python3-ipython-iptest-7.13.0-bp153.2.6.1
References:
https://www.suse.com/security/cve/CVE-2022-21699.html
https://bugzilla.suse.com/1194936
1
0