SUSE Security Update: Security update for nginx
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0212-1
Rating: important
References: #1204526 #1204527
Cross-References: CVE-2022-41741 CVE-2022-41742
CVSS scores:
CVE-2022-41741 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-41741 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-41742 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CVE-2022-41742 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
Description:
This update for nginx fixes the following issues:
- CVE-2022-41741: Handle duplicated atoms in mp4 streams, to mitigate
out-of-bound reads. (bsc#1204526)
- CVE-2022-41742: Handle duplicated atoms in mp4 streams, to mitigate
out-of-bound reads. (bsc#1204527)
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-212=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-212=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
nginx-1.21.5-150400.3.3.1
nginx-debuginfo-1.21.5-150400.3.3.1
nginx-debugsource-1.21.5-150400.3.3.1
- openSUSE Leap 15.4 (noarch):
nginx-source-1.21.5-150400.3.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
nginx-1.21.5-150400.3.3.1
nginx-debuginfo-1.21.5-150400.3.3.1
nginx-debugsource-1.21.5-150400.3.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (noarch):
nginx-source-1.21.5-150400.3.3.1
References:
https://www.suse.com/security/cve/CVE-2022-41741.htmlhttps://www.suse.com/security/cve/CVE-2022-41742.htmlhttps://bugzilla.suse.com/1204526https://bugzilla.suse.com/1204527
SUSE Security Update: Security update for apache2-mod_auth_openidc
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0215-1
Rating: moderate
References: #1190223 #1199868 #1206441
Cross-References: CVE-2021-39191 CVE-2022-23527
CVSS scores:
CVE-2021-39191 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2021-39191 (SUSE): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CVE-2022-23527 (NVD) : 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVE-2022-23527 (SUSE): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Affected Products:
SUSE Linux Enterprise High Performance Computing 15-SP4
SUSE Linux Enterprise Module for Server Applications 15-SP4
SUSE Linux Enterprise Realtime Extension 15-SP3
SUSE Linux Enterprise Server 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15-SP4
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.3
openSUSE Leap 15.4
______________________________________________________________________________
An update that solves two vulnerabilities and has one
errata is now available.
Description:
This update for apache2-mod_auth_openidc fixes the following issues:
- CVE-2022-23527: Fixed open redirect in oidc_validate_redirect_url()
using tab character (bsc#1206441).
- CVE-2021-39191: Fixed open redirect issue in target_link_uri parameter
(bsc#1190223).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-215=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-215=1
- SUSE Linux Enterprise Module for Server Applications 15-SP4:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-215=1
Package List:
- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):
apache2-mod_auth_openidc-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.22.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (x86_64):
apache2-mod_auth_openidc-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.22.1
- SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):
apache2-mod_auth_openidc-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.22.1
apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.22.1
References:
https://www.suse.com/security/cve/CVE-2021-39191.htmlhttps://www.suse.com/security/cve/CVE-2022-23527.htmlhttps://bugzilla.suse.com/1190223https://bugzilla.suse.com/1199868https://bugzilla.suse.com/1206441
openSUSE Security Update: Security update for virtualbox
______________________________________________________________________________
Announcement ID: openSUSE-SU-2023:0033-1
Rating: important
References:
Cross-References: CVE-2023-21884 CVE-2023-21885 CVE-2023-21886
CVE-2023-21889 CVE-2023-21898 CVE-2023-21899
CVSS scores:
CVE-2023-21884 (NVD) : 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2023-21885 (NVD) : 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
CVE-2023-21886 (NVD) : 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2023-21889 (NVD) : 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
CVE-2023-21898 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2023-21899 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes 6 vulnerabilities is now available.
Description:
This update for virtualbox fixes the following issues:
VirtualBox 7.0.6 (released January 17 2023)
This is a maintenance release. The following items were fixed and/or
added: [1]
- VMM: Fixed guru running the FreeBSD loader on older Intel CPUs without
unrestricted guest support (bug #21332)
- GUI: Fixed virtual machines grouping when VM was created or modified in
command line (bugs #11500, #20933)
- GUI: Introduced generic changes in settings dialogs
- VirtioNet: Fixed broken network after loading saved state (bug #21172)
- Storage: Added support for increasing the size of the following VMDK
image variants: monolithicFlat, monolithicSparse, twoGbMaxExtentSparse,
twoGbMaxExtentFlat
- VBoxManage: Added missing --directory switch for guestcontrol mktemp
command
- Mouse Integration: Guest was provided with extended host mouse state
(bug #21139)
- DnD: Introduced generic improvements
- Guest Control: Fixed handling creation mode for temporary directories
(bug #21394)
- Linux Host and Guest: Added initial support for building UEK7 kernel on
Oracle Linux 8
- Linux Host and Guest: Added initial support for RHEL 9.1 kernel
- Linux Guest Additions: Added initial support for kernel 6.2 for vboxvideo
- Audio: The "--audio" option in VBoxManage is now marked as deprecated;
please use "--audio-driver" and "--audio-enabled" instead. This will
allow more flexibility when changing the driver and/or controlling the
audio functionality
Additionally, it fixes 6 CVE's: CVE-2023-21886, CVE-2023-21898,
CVE-2023-21899, CVE-2023-21884, CVE-2023-21885, CVE-2023-21889
Links:
[1] https://www.virtualbox.org/wiki/Changelog-7.0#v6 [2]
https://www.oracle.com/security-alerts/cpujan2023.html#AppendixOVIR
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-2023-33=1
Package List:
- openSUSE Leap 15.4 (x86_64):
python3-virtualbox-7.0.6-lp154.2.26.2
python3-virtualbox-debuginfo-7.0.6-lp154.2.26.2
virtualbox-7.0.6-lp154.2.26.2
virtualbox-debuginfo-7.0.6-lp154.2.26.2
virtualbox-debugsource-7.0.6-lp154.2.26.2
virtualbox-devel-7.0.6-lp154.2.26.2
virtualbox-guest-tools-7.0.6-lp154.2.26.2
virtualbox-guest-tools-debuginfo-7.0.6-lp154.2.26.2
virtualbox-kmp-debugsource-7.0.6-lp154.2.26.2
virtualbox-kmp-default-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2
virtualbox-kmp-default-debuginfo-7.0.6_k5.14.21_150400.24.41-lp154.2.26.2
virtualbox-qt-7.0.6-lp154.2.26.2
virtualbox-qt-debuginfo-7.0.6-lp154.2.26.2
virtualbox-vnc-7.0.6-lp154.2.26.2
virtualbox-websrv-7.0.6-lp154.2.26.2
virtualbox-websrv-debuginfo-7.0.6-lp154.2.26.2
- openSUSE Leap 15.4 (noarch):
virtualbox-guest-desktop-icons-7.0.6-lp154.2.26.2
virtualbox-guest-source-7.0.6-lp154.2.26.2
virtualbox-host-source-7.0.6-lp154.2.26.2
References:
https://www.suse.com/security/cve/CVE-2023-21884.htmlhttps://www.suse.com/security/cve/CVE-2023-21885.htmlhttps://www.suse.com/security/cve/CVE-2023-21886.htmlhttps://www.suse.com/security/cve/CVE-2023-21889.htmlhttps://www.suse.com/security/cve/CVE-2023-21898.htmlhttps://www.suse.com/security/cve/CVE-2023-21899.html
SUSE Security Update: Security update for python39-setuptools
______________________________________________________________________________
Announcement ID: SUSE-SU-2023:0202-1
Rating: moderate
References: #1206667
Cross-References: CVE-2022-40897
CVSS scores:
CVE-2022-40897 (NVD) : 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-40897 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected Products:
SUSE Linux Enterprise Realtime Extension 15-SP3
openSUSE Leap 15.4
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for python39-setuptools fixes the following issues:
- CVE-2022-40897: Fixed an excessive CPU usage that could be triggered by
fetching a malicious HTML document (bsc#1206667).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.4:
zypper in -t patch openSUSE-SLE-15.4-2023-202=1
- SUSE Linux Enterprise Realtime Extension 15-SP3:
zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2023-202=1
Package List:
- openSUSE Leap 15.4 (noarch):
python39-setuptools-44.1.1-150300.7.6.1
- SUSE Linux Enterprise Realtime Extension 15-SP3 (noarch):
python39-setuptools-44.1.1-150300.7.6.1
References:
https://www.suse.com/security/cve/CVE-2022-40897.htmlhttps://bugzilla.suse.com/1206667