AusCERT - Security Bulletins

Subscribe to AusCERT - Security Bulletins hírcsatorna
Latest published security bulletins. See https://www.auscert.org.au/rss/ for feed information.
Frissítve: 2 óra 33 perc
2022. május 17.

ESB-2022.2396 - [SUSE] tiff: CVSS (Max): 7.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2396 Security update for tiff 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: tiff Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1056 CVE-2022-0924 CVE-2022-0909 CVE-2022-0908 CVE-2022-0891 CVE-2022-0865 CVE-2022-0562 CVE-2022-0561 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221667-1 Comment: CVSS (Max): 7.8 CVE-2022-0891 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for tiff ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1667-1 Rating: important References: #1195964 #1195965 #1197066 #1197068 #1197072 #1197073 #1197074 #1197631 Cross-References: CVE-2022-0561 CVE-2022-0562 CVE-2022-0865 CVE-2022-0891 CVE-2022-0908 CVE-2022-0909 CVE-2022-0924 CVE-2022-1056 Affected Products: SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for tiff fixes the following issues: o CVE-2022-0561: Fixed null source pointer passed as an argument to memcpy() within TIFFFetchStripThing() in tif_dirread.c (bsc#1195964). o CVE-2022-0562: Fixed null source pointer passed as an argument to memcpy() within TIFFReadDirectory() in tif_dirread.c (bsc#1195965). o CVE-2022-0865: Fixed assertion failure in TIFFReadAndRealloc (bsc#1197066). o CVE-2022-0909: Fixed divide by zero error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197072). o CVE-2022-0924: Fixed out-of-bounds read error in tiffcp that could have led to a denial-of-service via a crafted tiff file (bsc#1197073). o CVE-2022-0908: Fixed null source pointer passed as an argument to memcpy in TIFFFetchNormalTag() (bsc#1197074). o CVE-2022-1056: Fixed out-of-bounds read error in tiffcrop that could have led to a denial-of-service via a crafted tiff file (bsc#1197631). o CVE-2022-0891: Fixed heap buffer overflow in extractImageSection (bsc# 1197068). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1667=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1667=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): libtiff-devel-4.0.9-44.48.1 tiff-debuginfo-4.0.9-44.48.1 tiff-debugsource-4.0.9-44.48.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): libtiff5-4.0.9-44.48.1 libtiff5-debuginfo-4.0.9-44.48.1 tiff-4.0.9-44.48.1 tiff-debuginfo-4.0.9-44.48.1 tiff-debugsource-4.0.9-44.48.1 o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64): libtiff5-32bit-4.0.9-44.48.1 libtiff5-debuginfo-32bit-4.0.9-44.48.1 References: o https://www.suse.com/security/cve/CVE-2022-0561.html o https://www.suse.com/security/cve/CVE-2022-0562.html o https://www.suse.com/security/cve/CVE-2022-0865.html o https://www.suse.com/security/cve/CVE-2022-0891.html o https://www.suse.com/security/cve/CVE-2022-0908.html o https://www.suse.com/security/cve/CVE-2022-0909.html o https://www.suse.com/security/cve/CVE-2022-0924.html o https://www.suse.com/security/cve/CVE-2022-1056.html o https://bugzilla.suse.com/1195964 o https://bugzilla.suse.com/1195965 o https://bugzilla.suse.com/1197066 o https://bugzilla.suse.com/1197068 o https://bugzilla.suse.com/1197072 o https://bugzilla.suse.com/1197073 o https://bugzilla.suse.com/1197074 o https://bugzilla.suse.com/1197631 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2SskNZI30y1K9AQir4w//eGCuX+UMsteHbRbdfB6GTVRrQ1CFiEbF tY7keHCXI4on8xDCDDZPuy1or5ouAwxuQs9gCKLn53y37UbGKeQWAxtt0nnAaL1n HaXVuNCiCulidF8ZUthuzJCF8XBOvlkrfnVCswkZ8d1NB7rWcDiUyAOBDtTx3URf /oGv1ZCTw3b+xNeYC41Z+hHCNqPlvOm6A7XkFpNNE/ZvLMZ43f2xyG+aHc6xRwF/ kThcek4q4RQJ3iGcx+aWqh6RNqldflEsScQqjOkc5t6giNoQERjb8RpLsD/hXIx3 k5hrmPiF+uNpKt1ZF0b64IACODs1YzPdJjJ+sC7jZnDMuGVwmGrPAI9nI/NFOAY+ QBfKiF+Cc9feeHqH6Y3o/yOGGu/X4fUOocLay4RIdb7Mzgl2psGw6ZZivYD6gcLb EMp/f+e54qoBK57x6/1FxvJ7N+LIUDeWkw2JVGp9QQfQT3UkPG6f4lpNyMjW4k2k 4C3coP0FkbRXLINlKt67IhHEjPAClpcKrC9sTT4mmugTjTjMu81LltJCeMSMbfRd n0yRNR5cmo4/rK1Ucl65P+Rp7fX/KHEBdNrx/mzYC/1E+e/iDqbE0WUpjLkosU54 AVpsvKWIaljDuydS17GIvIWhrV13pNKCq+3lvyuhDMKhrtr/tqj51+OaUWESKIK6 2O/9BAAZ0OM= =u460 -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2395 - [SUSE] Linux Kernel: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2395 Security update for the Linux Kernel 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29156 CVE-2022-28893 CVE-2022-28748 CVE-2022-28356 CVE-2022-1516 CVE-2022-1419 CVE-2022-1353 CVE-2022-1280 CVE-2022-1158 CVE-2022-0812 CVE-2021-38208 CVE-2021-20321 CVE-2021-20292 CVE-2021-4154 CVE-2021-0707 CVE-2020-27835 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221676-1 Comment: CVSS (Max): 8.8 CVE-2021-4154 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1676-1 Rating: important References: #1028340 #1065729 #1071995 #1121726 #1137728 #1152489 #1177028 #1179878 #1182073 #1183723 #1187055 #1191647 #1193556 #1193842 #1195926 #1196018 #1196114 #1196367 #1196514 #1196639 #1196942 #1197157 #1197391 #1197656 #1197660 #1197914 #1197926 #1198217 #1198330 #1198400 #1198413 #1198437 #1198448 #1198484 #1198515 #1198516 #1198660 #1198742 #1198825 #1199012 #1199024 Cross-References: CVE-2020-27835 CVE-2021-0707 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-4154 CVE-2022-0812 CVE-2022-1158 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-28356 CVE-2022-28748 CVE-2022-28893 CVE-2022-29156 Affected Products: SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Module for Public Cloud 15-SP3 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Manager Proxy 4.2 SUSE Manager Server 4.2 openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves 16 vulnerabilities, contains 6 features and has 25 fixes is now available. Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2020-27835: Fixed a use after free vulnerability in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878). o CVE-2021-0707: Fixed a use after free vulnerability in dma_buf_release of dma-buf.c, which may lead to local escalation of privilege with no additional execution privileges needed (bnc#1198437). o CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc# 1183723). o CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc# 1191647). o CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). o CVE-2021-4154: Fixed a use-after-free vulnerability in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c, allowing a local privilege escalation by an attacker with user privileges by exploiting the fsconfig syscall parameter, leading to a container breakout and a denial of service on the system (bnc# 1193842). o CVE-2022-0812: Fixed information leak when a file is read from RDMA (bsc# 1196639) o CVE-2022-1158: Fixed a vulnerability in the kvm module that may lead to a use-after-free write or denial of service (bsc#1197660). o CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). o CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). o CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). o CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). o CVE-2022-28356: Fixed a refcount leak bug in net/llc/af_llc.c (bnc# 1197391). o CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). o CVE-2022-28893: Fixed a use after free vulnerability in inet_put_port where some sockets are not closed before xs_xprt_free() (bsc#1198330). o CVE-2022-29156: Fixed a double free vulnerability related to rtrs_clt_dev_release.ate (jsc#SLE-15176 bsc#1198515). The following non-security bugs were fixed: o ACPI/APEI: Limit printable size of BERT table data (git-fixes). o ACPI: processor idle: Check for architectural support for LPI (git-fixes). o ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes). o ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes). o ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes). o ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes). o ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes). o ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes). o ALSA: pcm: Test for "silence" field in struct "pcm_format_data" (git-fixes). o ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes). o ALSA: usb-audio: Increase max buffer size (git-fixes). o ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes). o ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes). o ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes). o ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes). o ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes). o ASoC: soc-compress: Change the check for codec_dai (git-fixes). o ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes). o ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes). o ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes). o Bluetooth: Fix use after free in hci_send_acl (git-fixes). o Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes). o Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes). o Documentation: add link to stable release candidate tree (git-fixes). o HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes). o IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208). o Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes). o KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes). o NFSv4: fix open failure with O_ACCMODE flag (git-fixes). o PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes). o PCI: aardvark: Fix support for MSI interrupts (git-fixes). o PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes). o PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes). o PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes). o PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes). o RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449). o RDMA/mlx5: Add a missing update of cache->last_add (jsc#SLE-15175). o RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175). o RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc# SLE-15175). o SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes). o SUNRPC: Fix the svc_deferred_event trace class (git-fixes). o SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes). o SUNRPC: Handle low memory situations in call_status() (git-fixes). o SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367). o USB: serial: pl2303: add IBM device IDs (git-fixes). o USB: serial: simple: add Nokia phone driver (git-fixes). o USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes). o USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). o USB: dwc3: omap: fix "unbalanced disables for smps10_out1" on omap5evm (git-fixes). o USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes). o adm8211: fix error return code in adm8211_probe() (git-fixes). o arm64/sve: Use correct size when reinitialising SVE state (git-fixes) o arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes) o arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes) o arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes) o arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes) o arm64: dts: ls1028a: fix memory node (git-fixes) o arm64: dts: ls1028a: fix node name for the sysclk (git-fixes) o arm64: dts: lx2160a: fix scl-gpios property name (git-fixes) o arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes) o arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes) o arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes) o arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes) o arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes) o arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes) o arm64: head: avoid over-mapping in map_memory (git-fixes) o ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes). o ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes). o ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes). o ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes). o ath5k: fix building with LEDS=m (git-fixes). o ath9k: Fix usage of driver-private space in tx_info (git-fixes). o ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes). o ath9k_htc: fix uninit value bugs (git-fixes). o bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172). o bfq: Avoid merging queues with different parents (bsc#1197926). o bfq: Drop pointless unlock-lock pair (bsc#1197926). o bfq: Get rid of __bio_blkcg() usage (bsc#1197926). o bfq: Make sure bfqg for which we are queueing requests is online (bsc# 1197926). o bfq: Remove pointless bfq_init_rq() calls (bsc#1197926). o bfq: Split shared queues on move between cgroups (bsc#1197926). o bfq: Track whether bfq_group is still online (bsc#1197926). o bfq: Update cgroup information before merging bio (bsc#1197926). o block: Drop leftover references to RQF_SORTED (bsc#1182073). o bnx2x: fix napi API usage sequence (bsc#1198217). o bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028). o brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes). o brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes). o brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes). o brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes). o carl9170: fix missing bit-wise or operator for tx_params (git-fixes). o cfg80211: hold bss_lock while updating nontrans_list (git-fixes). o cifs: fix bad fids sent over wire (bsc#1197157). o clk: Enforce that disjoints limits are invalid (git-fixes). o clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes). o direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656). o direct-io: defer alignment check until after the EOF check (bsc#1197656). o direct-io: do not force writeback for reads beyond EOF (bsc#1197656). o dma-debug: fix return value of __setup handlers (git-fixes). o dma: at_xdmac: fix a missing check on list iterator (git-fixes). o dmaengine: Revert "dmaengine: shdma: Fix runtime PM imbalance on error" (git-fixes). o dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes). o dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes). o dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes). o dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes). o drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes). o drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes). o drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes). o drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes). o drm/amd: Add USBC connector ID (git-fixes). o drm/amdgpu: Fix recursive locking warning (git-fixes). o drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes). o drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes). o drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes). o drm/amdkfd: make CRAT table missing message informational only (git-fixes). o drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes). o drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes). o drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes). o drm/edid: Do not clear formats if using deep color (git-fixes). o drm/edid: check basic audio support on CEA extension block (git-fixes). o drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes). o drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes). o drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes). o drm/mediatek: Add AAL output size configuration (git-fixes). o drm/mediatek: Fix aal size config (git-fixes). o drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes). o drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes). o drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes). o drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes). o drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes). o drm: Add orientation quirk for GPD Win Max (git-fixes). o drm: add a locked version of drm_is_current_master (bsc#1197914). o drm: add a locked version of drm_is_current_master (bsc#1197914). o drm: drm_file struct kABI compatibility workaround (bsc#1197914). o drm: drm_file struct kABI compatibility workaround (bsc#1197914). o drm: protect drm_master pointers in drm_lease.c (bsc#1197914). o drm: protect drm_master pointers in drm_lease.c (bsc#1197914). o drm: serialize drm_file.master with a new spinlock (bsc#1197914). o drm: serialize drm_file.master with a new spinlock (bsc#1197914). o drm: use the lookup lock in drm_is_current_master (bsc#1197914). o drm: use the lookup lock in drm_is_current_master (bsc#1197914). o e1000e: Fix possible overflow in LTR decoding (git-fixes). o fibmap: Reject negative block numbers (bsc#1198448). o fibmap: Use bmap instead of ->bmap method in ioctl_fibmap (bsc#1198448). o firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes). o gpiolib: acpi: use correct format characters (git-fixes). o gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes). o hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). o i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes). o ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes). o ipmi: Move remove_work to dedicated workqueue (git-fixes). o ipmi: bail out if init_srcu_struct fails (git-fixes). o iwlwifi: Fix -EIO error code that is never returned (git-fixes). o iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes). o livepatch: Do not block removal of patches that are safe to unload (bsc# 1071995). o lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes). o media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes). o media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes). o memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes). o mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes). o mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes). o mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes). o mmc: mmci: stm32: correctly check all elements of sg list (git-fixes). o mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes). o mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes). o mtd: onenand: Check for error irq (git-fixes). o mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes). o mtd: rawnand: gpmi: fix controller timings setting (git-fixes). o mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes). o net: asix: add proper error handling of usb read errors (git-fixes). o net: mcs7830: handle usb read errors properly (git-fixes). o net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes). o nfc: nci: add flush_workqueue to prevent uaf (git-fixes). o power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes). o power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes). o power: supply: axp20x_battery: properly report current when discharging (git-fixes). o power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes). o power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes). o power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes). o power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes). o powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes). o powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). o ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc# 1198413). o random: check for signal_pending() outside of need_resched() check (git-fixes). o ray_cs: Check ioremap return value (git-fixes). o regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes). o rtc: check if __rtc_read_time was successful (git-fixes). o rtc: wm8350: Handle error for wm8350_register_irq (git-fixes). o scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). o scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes). o scsi: mpt3sas: Page fault in reply q processing (git-fixes). o scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc# 1198825). o spi: Fix erroneous sgs value with min_t() (git-fixes). o spi: Fix invalid sgs value (git-fixes). o spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes). o spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes). o spi: mxic: Fix the transmit path (git-fixes). o spi: tegra20: Use of_device_get_match_data() (git-fixes). o staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes). o vgacon: Propagate console boot parameters before calling `vc_resize' (bsc# 1152489) o video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes). o video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes). o video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes). o video: fbdev: udlfb: properly check endpoint type (bsc#1152489) o video: fbdev: w100fb: Reset global state (git-fixes). o virtio_console: break out of buf poll on remove (git-fixes). o virtio_console: eliminate anonymous module_init & module_exit (git-fixes). o w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes). o x86/pm: Save the MSR validity status at context setup (bsc#1198400). o x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). o x86/speculation: Restore speculation related MSRs during S3 resume (bsc# 1198400). o xen/blkfront: fix comment for need_copy (git-fixes). o xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556). o xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc# 1193556). o xen: fix is_xen_pmu() (git-fixes). o xhci: fix runtime PM imbalance in USB2 resume (git-fixes). o xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1676=1 o SUSE Linux Enterprise Module for Public Cloud 15-SP3: zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2022-1676=1 Package List: o openSUSE Leap 15.3 (noarch): kernel-devel-azure-5.3.18-150300.38.56.1 kernel-source-azure-5.3.18-150300.38.56.1 o openSUSE Leap 15.3 (x86_64): cluster-md-kmp-azure-5.3.18-150300.38.56.1 cluster-md-kmp-azure-debuginfo-5.3.18-150300.38.56.1 dlm-kmp-azure-5.3.18-150300.38.56.1 dlm-kmp-azure-debuginfo-5.3.18-150300.38.56.1 gfs2-kmp-azure-5.3.18-150300.38.56.1 gfs2-kmp-azure-debuginfo-5.3.18-150300.38.56.1 kernel-azure-5.3.18-150300.38.56.1 kernel-azure-debuginfo-5.3.18-150300.38.56.1 kernel-azure-debugsource-5.3.18-150300.38.56.1 kernel-azure-devel-5.3.18-150300.38.56.1 kernel-azure-devel-debuginfo-5.3.18-150300.38.56.1 kernel-azure-extra-5.3.18-150300.38.56.1 kernel-azure-extra-debuginfo-5.3.18-150300.38.56.1 kernel-azure-livepatch-devel-5.3.18-150300.38.56.1 kernel-azure-optional-5.3.18-150300.38.56.1 kernel-azure-optional-debuginfo-5.3.18-150300.38.56.1 kernel-syms-azure-5.3.18-150300.38.56.1 kselftests-kmp-azure-5.3.18-150300.38.56.1 kselftests-kmp-azure-debuginfo-5.3.18-150300.38.56.1 ocfs2-kmp-azure-5.3.18-150300.38.56.1 ocfs2-kmp-azure-debuginfo-5.3.18-150300.38.56.1 reiserfs-kmp-azure-5.3.18-150300.38.56.1 reiserfs-kmp-azure-debuginfo-5.3.18-150300.38.56.1 o SUSE Linux Enterprise Module for Public Cloud 15-SP3 (noarch): kernel-devel-azure-5.3.18-150300.38.56.1 kernel-source-azure-5.3.18-150300.38.56.1 o SUSE Linux Enterprise Module for Public Cloud 15-SP3 (x86_64): kernel-azure-5.3.18-150300.38.56.1 kernel-azure-debuginfo-5.3.18-150300.38.56.1 kernel-azure-debugsource-5.3.18-150300.38.56.1 kernel-azure-devel-5.3.18-150300.38.56.1 kernel-azure-devel-debuginfo-5.3.18-150300.38.56.1 kernel-syms-azure-5.3.18-150300.38.56.1 References: o https://www.suse.com/security/cve/CVE-2020-27835.html o https://www.suse.com/security/cve/CVE-2021-0707.html o https://www.suse.com/security/cve/CVE-2021-20292.html o https://www.suse.com/security/cve/CVE-2021-20321.html o https://www.suse.com/security/cve/CVE-2021-38208.html o https://www.suse.com/security/cve/CVE-2021-4154.html o https://www.suse.com/security/cve/CVE-2022-0812.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://www.suse.com/security/cve/CVE-2022-1280.html o https://www.suse.com/security/cve/CVE-2022-1353.html o https://www.suse.com/security/cve/CVE-2022-1419.html o https://www.suse.com/security/cve/CVE-2022-1516.html o https://www.suse.com/security/cve/CVE-2022-28356.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://www.suse.com/security/cve/CVE-2022-28893.html o https://www.suse.com/security/cve/CVE-2022-29156.html o https://bugzilla.suse.com/1028340 o https://bugzilla.suse.com/1065729 o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1121726 o https://bugzilla.suse.com/1137728 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1177028 o https://bugzilla.suse.com/1179878 o https://bugzilla.suse.com/1182073 o https://bugzilla.suse.com/1183723 o https://bugzilla.suse.com/1187055 o https://bugzilla.suse.com/1191647 o https://bugzilla.suse.com/1193556 o https://bugzilla.suse.com/1193842 o https://bugzilla.suse.com/1195926 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1196114 o https://bugzilla.suse.com/1196367 o https://bugzilla.suse.com/1196514 o https://bugzilla.suse.com/1196639 o https://bugzilla.suse.com/1196942 o https://bugzilla.suse.com/1197157 o https://bugzilla.suse.com/1197391 o https://bugzilla.suse.com/1197656 o https://bugzilla.suse.com/1197660 o https://bugzilla.suse.com/1197914 o https://bugzilla.suse.com/1197926 o https://bugzilla.suse.com/1198217 o https://bugzilla.suse.com/1198330 o https://bugzilla.suse.com/1198400 o https://bugzilla.suse.com/1198413 o https://bugzilla.suse.com/1198437 o https://bugzilla.suse.com/1198448 o https://bugzilla.suse.com/1198484 o https://bugzilla.suse.com/1198515 o https://bugzilla.suse.com/1198516 o https://bugzilla.suse.com/1198660 o https://bugzilla.suse.com/1198742 o https://bugzilla.suse.com/1198825 o https://bugzilla.suse.com/1199012 o https://bugzilla.suse.com/1199024 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2PskNZI30y1K9AQhfCQ/9Gi81rSygwHKSma5SyUoLYFA3syUEAyD0 o38q/87hyB/Ny75iACHziGzaDPz65B9p8/wbSR0LwZbMk1k9WtvLno1LPS7ZDXaM +3Rrxeasp33gq204pfb1XaJhHCWgLWzw8tiUJo+mbF55R6kYMpTSdMeee5B9hzn/ O3HsGZIkcnQaru5KkqvsfR30zmm0Y7RHK5+2E6pk2FRg+99E91p9qiBn9QleUK0y ap98GkLhvmdYTLjPGTsRx6ggkblyer1QM4OXEBU2qnWRGoi7d8XiFNz0iCXm1dA5 Gw7OTmTV0C/dElCEewUCHO6L3+/34aYLu2y093QRz1vv68eyXyuHreRv/CKviEjE yjkBpYHx4mqUOZ7kCthSXYw+1GgVpGLvYcUk4rChDZDVG8lhJrEU7vJ9BViqzx0R ujKhQwyEI4VOVFtm0zn1x0DWuhIwv+PJEbSvo1Lj+EekrghZzOCviY5Ow6euDsDJ stGJZczwNQjWvr92wg5nNQp29svPkUgXzxaCbSHLWEWGKC1lpsWmE5cN8tVjR31m VC3LwgozWQFjnrLRqbFvdXjs6YloUg7U/XPBqNhiKu8Re1gh+4M9YdfFmhZ0Yv+C rjlpRbizMAUt7q+VomKByWiaGDr31VzmFWhquYKhjlk9KDSaoN56otXh3oDD/MGB BUII7adLW84= =VdGR -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2394 - [SUSE] Linux Kernel: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2394 Security update for the Linux Kernel 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29156 CVE-2022-28893 CVE-2022-28748 CVE-2022-28356 CVE-2022-1516 CVE-2022-1419 CVE-2022-1353 CVE-2022-1280 CVE-2022-1158 CVE-2022-0812 CVE-2021-38208 CVE-2021-20321 CVE-2021-20292 CVE-2021-4154 CVE-2021-0707 CVE-2020-27835 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221687-1 Comment: CVSS (Max): 8.8 CVE-2021-4154 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1687-1 Rating: important References: #1028340 #1071995 #1137728 #1152472 #1152489 #1177028 #1179878 #1182073 #1183723 #1187055 #1191647 #1193556 #1193842 #1194625 #1195651 #1195926 #1196018 #1196114 #1196367 #1196514 #1196639 #1196942 #1197157 #1197391 #1197656 #1197660 #1197677 #1197914 #1197926 #1198077 #1198217 #1198330 #1198400 #1198413 #1198437 #1198448 #1198484 #1198515 #1198516 #1198534 #1198742 #1198825 #1198989 #1199012 #1199024 Cross-References: CVE-2020-27835 CVE-2021-0707 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-4154 CVE-2022-0812 CVE-2022-1158 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-28356 CVE-2022-28748 CVE-2022-28893 CVE-2022-29156 Affected Products: SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise High Availability 15-SP3 SUSE Linux Enterprise High Performance Computing SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Legacy Software 15-SP3 SUSE Linux Enterprise Module for Live Patching 15-SP3 SUSE Linux Enterprise Server SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Workstation Extension 15-SP3 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.2 SUSE Manager Server 4.2 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that solves 16 vulnerabilities, contains 6 features and has 29 fixes is now available. Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-29156: Fixed a double free related to rtrs_clt_dev_release (bnc# 1198515). o CVE-2022-28893: Ensuring that sockets are in the intended state inside the SUNRPC subsystem (bnc#1198330). o CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). o CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc# 1197391). o CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). o CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). o CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). o CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). o CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1197660). o CVE-2022-0812: Fixed random memory leakage inside NFS/RDMA (bsc#1196639). o CVE-2021-4154: Fixed a use-after-free flaw inside cgroup1_parse_param in kernel/cgroup/cgroup-v1.c. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system (bnc# 1193842). o CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). o CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc# 1191647). o CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc# 1183723). o CVE-2021-0707: Fixed possible memory corruption due to a use after free inside dma_buf_releas e of dma-buf.c (bnc#1198437). o CVE-2020-27835: Fixed use after free in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878). The following non-security bugs were fixed: o ACPI: processor idle: Check for architectural support for LPI (git-fixes). o ACPI/APEI: Limit printable size of BERT table data (git-fixes). o ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes). o adm8211: fix error return code in adm8211_probe() (git-fixes). o ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes). o ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes). o ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes). o ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes). o ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes). o ALSA: pcm: Test for "silence" field in struct "pcm_format_data" (git-fixes). o ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes). o ALSA: usb-audio: Increase max buffer size (git-fixes). o ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes). o arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes) o arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes) o arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes) o arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes) o arm64: dts: ls1028a: fix memory node (git-fixes) o arm64: dts: ls1028a: fix node name for the sysclk (git-fixes) o arm64: dts: lx2160a: fix scl-gpios property name (git-fixes) o arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes) o arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes) o arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes) o arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes) o arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes) o arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes) o arm64: head: avoid over-mapping in map_memory (git-fixes) o arm64: Update config files; arm LIBNVDIMM y->m ppc64le ND_BLK ->m (bsc# 1199024). o arm64/sve: Use correct size when reinitialising SVE state (git-fixes) o ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes). o ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes). o ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes). o ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes). o ASoC: soc-compress: Change the check for codec_dai (git-fixes). o ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes). o ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes). o ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes). o ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes). o ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes). o ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes). o ath5k: fix building with LEDS=m (git-fixes). o ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes). o ath9k_htc: fix uninit value bugs (git-fixes). o ath9k: Fix usage of driver-private space in tx_info (git-fixes). o ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes). o backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc# 1152489) o bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172). o bfq: Avoid merging queues with different parents (bsc#1197926). o bfq: Drop pointless unlock-lock pair (bsc#1197926). o bfq: Get rid of __bio_blkcg() usage (bsc#1197926). o bfq: Make sure bfqg for which we are queueing requests is online (bsc# 1197926). o bfq: Remove pointless bfq_init_rq() calls (bsc#1197926). o bfq: Split shared queues on move between cgroups (bsc#1197926). o bfq: Track whether bfq_group is still online (bsc#1197926). o bfq: Update cgroup information before merging bio (bsc#1197926). o block: Drop leftover references to RQF_SORTED (bsc#1182073). o Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes). o Bluetooth: Fix use after free in hci_send_acl (git-fixes). o Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes). o bnx2x: fix napi API usage sequence (bsc#1198217). o bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028). o brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes). o brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes). o brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes). o brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes). o carl9170: fix missing bit-wise or operator for tx_params (git-fixes). o cfg80211: hold bss_lock while updating nontrans_list (git-fixes). o cifs: do not skip link targets when an I/O fails (bsc#1194625). o cifs: fix bad fids sent over wire (bsc#1197157). o clk: Enforce that disjoints limits are invalid (git-fixes). o clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes). o direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656). o direct-io: defer alignment check until after the EOF check (bsc#1197656). o direct-io: do not force writeback for reads beyond EOF (bsc#1197656). o dma-debug: fix return value of __setup handlers (git-fixes). o dma: at_xdmac: fix a missing check on list iterator (git-fixes). o dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes). o dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes). o dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes). o dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes). o dmaengine: Revert "dmaengine: shdma: Fix runtime PM imbalance on error" (git-fixes). o Documentation: add link to stable release candidate tree (git-fixes). o drm: add a locked version of drm_is_current_master (bsc#1197914). o drm: Add orientation quirk for GPD Win Max (git-fixes). o drm: drm_file struct kABI compatibility workaround (bsc#1197914). o drm: protect drm_master pointers in drm_lease.c (bsc#1197914). o drm: serialize drm_file.master with a new spinlock (bsc#1197914). o drm: use the lookup lock in drm_is_current_master (bsc#1197914). o drm/amd: Add USBC connector ID (git-fixes). o drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes). o drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes). o drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes). o drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes). o drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472) o drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489) o drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes). o drm/amdgpu: Fix recursive locking warning (git-fixes). o drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes). o drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes). o drm/amdkfd: make CRAT table missing message informational only (git-fixes). o drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes). o drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes). o drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes). o drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472) o drm/edid: check basic audio support on CEA extension block (git-fixes). o drm/edid: Do not clear formats if using deep color (git-fixes). o drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472) o drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes). o drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489) o drm/i915: Keep gem ctx->vm alive until the final put (bsc#1152489) o drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489) o drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes). o drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes). o drm/mediatek: Add AAL output size configuration (git-fixes). o drm/mediatek: Fix aal size config (git-fixes). o drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes). o drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes). o drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes). o drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472) o drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes). o drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534) o drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes). o drm/vmwgfx: Remove unused compile options (bsc#1152472) o e1000e: Fix possible overflow in LTR decoding (git-fixes). o fibmap: Reject negative block numbers (bsc#1198448). o fibmap: Use bmap instead of ->bmap method in ioctl_fibmap (bsc#1198448). o firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes). o gpiolib: acpi: use correct format characters (git-fixes). o gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes). o HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes). o hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). o i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes). o IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208). o Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes). o ipmi: bail out if init_srcu_struct fails (git-fixes). o ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes). o ipmi: Move remove_work to dedicated workqueue (git-fixes). o iwlwifi: Fix -EIO error code that is never returned (git-fixes). o iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes). o KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes). o livepatch: Do not block removal of patches that are safe to unload (bsc# 1071995). o lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes). o media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes). o media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes). o memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes). o mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes). o mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes). o mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes). o mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes). o mmc: mmci: stm32: correctly check all elements of sg list (git-fixes). o mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes). o mtd: onenand: Check for error irq (git-fixes). o mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes). o mtd: rawnand: gpmi: fix controller timings setting (git-fixes). o mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes). o net: asix: add proper error handling of usb read errors (git-fixes). o net: mana: Add counter for packet dropped by XDP (bsc#1195651). o net: mana: Add counter for XDP_TX (bsc#1195651). o net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). o net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). o net: mana: Reuse XDP dropped page (bsc#1195651). o net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc# 1195651). o net: mcs7830: handle usb read errors properly (git-fixes). o net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes). o nfc: nci: add flush_workqueue to prevent uaf (git-fixes). o NFSv4: fix open failure with O_ACCMODE flag (git-fixes). o PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes). o PCI: aardvark: Fix support for MSI interrupts (git-fixes). o PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes). o PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes). o PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes). o PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes). o power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes). o power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes). o power: supply: axp20x_battery: properly report current when discharging (git-fixes). o power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes). o power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes). o power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes). o power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes). o powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299). o powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes). o powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). o powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc# 1198077 ltc#197299). o ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc# 1198413). o random: check for signal_pending() outside of need_resched() check (git-fixes). o ray_cs: Check ioremap return value (git-fixes). o RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449). o RDMA/mlx5: Add a missing update of cache->last_add (jsc#SLE-15175). o RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175). o RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc# SLE-15175). o regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes). o rpm: Run external scriptlets on uninstall only when available (bsc#1196514 bsc#1196114 bsc#1196942). o rpm: Use bash for %() expansion (jsc#SLE-18234). o rpm/*.spec.in: remove backtick usage o rpm/constraints.in: skip SLOW_DISK workers for kernel-source o rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc# 1198484) o rtc: check if __rtc_read_time was successful (git-fixes). o rtc: wm8350: Handle error for wm8350_register_irq (git-fixes). o s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC# 197378). o scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). o scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes). o scsi: mpt3sas: Page fault in reply q processing (git-fixes). o scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc# 1198825). o spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes). o spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes). o spi: Fix erroneous sgs value with min_t() (git-fixes). o spi: Fix invalid sgs value (git-fixes). o spi: mxic: Fix the transmit path (git-fixes). o spi: tegra20: Use of_device_get_match_data() (git-fixes). o staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes). o SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367). o SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes). o SUNRPC: Fix the svc_deferred_event trace class (git-fixes). o SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes). o SUNRPC: Handle low memory situations in call_status() (git-fixes). o USB: dwc3: core: Fix tx/rx threshold settings (git-fixes). o USB: dwc3: core: Only handle soft-reset in DCTL (git-fixes). o USB: dwc3: gadget: Return proper request status (git-fixes). o USB: dwc3: omap: fix "unbalanced disables for smps10_out1" on omap5evm (git-fixes). o USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes). o USB: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc# 1152489) o USB: serial: pl2303: add IBM device IDs (git-fixes). o USB: serial: simple: add Nokia phone driver (git-fixes). o USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes). o USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). o vgacon: Propagate console boot parameters before calling `vc_resize' (bsc# 1152489) o video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes). o video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes). o video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes). o video: fbdev: udlfb: properly check endpoint type (bsc#1152489) o video: fbdev: w100fb: Reset global state (git-fixes). o virtio_console: break out of buf poll on remove (git-fixes). o virtio_console: eliminate anonymous module_init & module_exit (git-fixes). o w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes). o x86/pm: Save the MSR validity status at context setup (bsc#1198400). o x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). o x86/speculation: Restore speculation related MSRs during S3 resume (bsc# 1198400). o xen: fix is_xen_pmu() (git-fixes). o xen/blkfront: fix comment for need_copy (git-fixes). o xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556). o xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc# 1193556). o xhci: fix runtime PM imbalance in USB2 resume (git-fixes). o xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1687=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1687=1 o SUSE Linux Enterprise Workstation Extension 15-SP3: zypper in -t patch SUSE-SLE-Product-WE-15-SP3-2022-1687=1 o SUSE Linux Enterprise Module for Live Patching 15-SP3: zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2022-1687=1 o SUSE Linux Enterprise Module for Legacy Software 15-SP3: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2022-1687=1 o SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1687=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1687=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1687=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1687=1 o SUSE Linux Enterprise High Availability 15-SP3: zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2022-1687=1 Package List: o openSUSE Leap 15.4 (aarch64 x86_64): cluster-md-kmp-preempt-5.3.18-150300.59.68.1 cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 dlm-kmp-preempt-5.3.18-150300.59.68.1 dlm-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 gfs2-kmp-preempt-5.3.18-150300.59.68.1 gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-5.3.18-150300.59.68.1 kernel-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debugsource-5.3.18-150300.59.68.1 kernel-preempt-devel-5.3.18-150300.59.68.1 kernel-preempt-devel-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-extra-5.3.18-150300.59.68.1 kernel-preempt-extra-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-livepatch-devel-5.3.18-150300.59.68.1 kernel-preempt-optional-5.3.18-150300.59.68.1 kernel-preempt-optional-debuginfo-5.3.18-150300.59.68.1 kselftests-kmp-preempt-5.3.18-150300.59.68.1 kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 ocfs2-kmp-preempt-5.3.18-150300.59.68.1 ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 reiserfs-kmp-preempt-5.3.18-150300.59.68.1 reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 o openSUSE Leap 15.4 (aarch64): dtb-al-5.3.18-150300.59.68.1 dtb-zte-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): cluster-md-kmp-default-5.3.18-150300.59.68.1 cluster-md-kmp-default-debuginfo-5.3.18-150300.59.68.1 dlm-kmp-default-5.3.18-150300.59.68.1 dlm-kmp-default-debuginfo-5.3.18-150300.59.68.1 gfs2-kmp-default-5.3.18-150300.59.68.1 gfs2-kmp-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-5.3.18-150300.59.68.1 kernel-default-base-5.3.18-150300.59.68.1.150300.18.41.3 kernel-default-base-rebuild-5.3.18-150300.59.68.1.150300.18.41.3 kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 kernel-default-devel-5.3.18-150300.59.68.1 kernel-default-devel-debuginfo-5.3.18-150300.59.68.1 kernel-default-extra-5.3.18-150300.59.68.1 kernel-default-extra-debuginfo-5.3.18-150300.59.68.1 kernel-default-livepatch-5.3.18-150300.59.68.1 kernel-default-livepatch-devel-5.3.18-150300.59.68.1 kernel-default-optional-5.3.18-150300.59.68.1 kernel-default-optional-debuginfo-5.3.18-150300.59.68.1 kernel-obs-build-5.3.18-150300.59.68.1 kernel-obs-build-debugsource-5.3.18-150300.59.68.1 kernel-obs-qa-5.3.18-150300.59.68.1 kernel-syms-5.3.18-150300.59.68.1 kselftests-kmp-default-5.3.18-150300.59.68.1 kselftests-kmp-default-debuginfo-5.3.18-150300.59.68.1 ocfs2-kmp-default-5.3.18-150300.59.68.1 ocfs2-kmp-default-debuginfo-5.3.18-150300.59.68.1 reiserfs-kmp-default-5.3.18-150300.59.68.1 reiserfs-kmp-default-debuginfo-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (aarch64 x86_64): cluster-md-kmp-preempt-5.3.18-150300.59.68.1 cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 dlm-kmp-preempt-5.3.18-150300.59.68.1 dlm-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 gfs2-kmp-preempt-5.3.18-150300.59.68.1 gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-5.3.18-150300.59.68.1 kernel-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debugsource-5.3.18-150300.59.68.1 kernel-preempt-devel-5.3.18-150300.59.68.1 kernel-preempt-devel-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-extra-5.3.18-150300.59.68.1 kernel-preempt-extra-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-livepatch-devel-5.3.18-150300.59.68.1 kernel-preempt-optional-5.3.18-150300.59.68.1 kernel-preempt-optional-debuginfo-5.3.18-150300.59.68.1 kselftests-kmp-preempt-5.3.18-150300.59.68.1 kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 ocfs2-kmp-preempt-5.3.18-150300.59.68.1 ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 reiserfs-kmp-preempt-5.3.18-150300.59.68.1 reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (ppc64le x86_64): kernel-debug-5.3.18-150300.59.68.1 kernel-debug-debuginfo-5.3.18-150300.59.68.1 kernel-debug-debugsource-5.3.18-150300.59.68.1 kernel-debug-devel-5.3.18-150300.59.68.1 kernel-debug-devel-debuginfo-5.3.18-150300.59.68.1 kernel-debug-livepatch-devel-5.3.18-150300.59.68.1 kernel-kvmsmall-5.3.18-150300.59.68.1 kernel-kvmsmall-debuginfo-5.3.18-150300.59.68.1 kernel-kvmsmall-debugsource-5.3.18-150300.59.68.1 kernel-kvmsmall-devel-5.3.18-150300.59.68.1 kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.68.1 kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (aarch64): cluster-md-kmp-64kb-5.3.18-150300.59.68.1 cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 dlm-kmp-64kb-5.3.18-150300.59.68.1 dlm-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 dtb-al-5.3.18-150300.59.68.1 dtb-allwinner-5.3.18-150300.59.68.1 dtb-altera-5.3.18-150300.59.68.1 dtb-amd-5.3.18-150300.59.68.1 dtb-amlogic-5.3.18-150300.59.68.1 dtb-apm-5.3.18-150300.59.68.1 dtb-arm-5.3.18-150300.59.68.1 dtb-broadcom-5.3.18-150300.59.68.1 dtb-cavium-5.3.18-150300.59.68.1 dtb-exynos-5.3.18-150300.59.68.1 dtb-freescale-5.3.18-150300.59.68.1 dtb-hisilicon-5.3.18-150300.59.68.1 dtb-lg-5.3.18-150300.59.68.1 dtb-marvell-5.3.18-150300.59.68.1 dtb-mediatek-5.3.18-150300.59.68.1 dtb-nvidia-5.3.18-150300.59.68.1 dtb-qcom-5.3.18-150300.59.68.1 dtb-renesas-5.3.18-150300.59.68.1 dtb-rockchip-5.3.18-150300.59.68.1 dtb-socionext-5.3.18-150300.59.68.1 dtb-sprd-5.3.18-150300.59.68.1 dtb-xilinx-5.3.18-150300.59.68.1 dtb-zte-5.3.18-150300.59.68.1 gfs2-kmp-64kb-5.3.18-150300.59.68.1 gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 kernel-64kb-5.3.18-150300.59.68.1 kernel-64kb-debuginfo-5.3.18-150300.59.68.1 kernel-64kb-debugsource-5.3.18-150300.59.68.1 kernel-64kb-devel-5.3.18-150300.59.68.1 kernel-64kb-devel-debuginfo-5.3.18-150300.59.68.1 kernel-64kb-extra-5.3.18-150300.59.68.1 kernel-64kb-extra-debuginfo-5.3.18-150300.59.68.1 kernel-64kb-livepatch-devel-5.3.18-150300.59.68.1 kernel-64kb-optional-5.3.18-150300.59.68.1 kernel-64kb-optional-debuginfo-5.3.18-150300.59.68.1 kselftests-kmp-64kb-5.3.18-150300.59.68.1 kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 ocfs2-kmp-64kb-5.3.18-150300.59.68.1 ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 reiserfs-kmp-64kb-5.3.18-150300.59.68.1 reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (noarch): kernel-devel-5.3.18-150300.59.68.1 kernel-docs-5.3.18-150300.59.68.1 kernel-docs-html-5.3.18-150300.59.68.1 kernel-macros-5.3.18-150300.59.68.1 kernel-source-5.3.18-150300.59.68.1 kernel-source-vanilla-5.3.18-150300.59.68.1 o openSUSE Leap 15.3 (s390x): kernel-zfcpdump-5.3.18-150300.59.68.1 kernel-zfcpdump-debuginfo-5.3.18-150300.59.68.1 kernel-zfcpdump-debugsource-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Workstation Extension 15-SP3 (x86_64): kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 kernel-default-extra-5.3.18-150300.59.68.1 kernel-default-extra-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debugsource-5.3.18-150300.59.68.1 kernel-preempt-extra-5.3.18-150300.59.68.1 kernel-preempt-extra-debuginfo-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Live Patching 15-SP3 (ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 kernel-default-livepatch-5.3.18-150300.59.68.1 kernel-default-livepatch-devel-5.3.18-150300.59.68.1 kernel-livepatch-5_3_18-150300_59_68-default-1-150300.7.5.1 o SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le s390x x86_64): kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 reiserfs-kmp-default-5.3.18-150300.59.68.1 reiserfs-kmp-default-debuginfo-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 ppc64le s390x x86_64): kernel-obs-build-5.3.18-150300.59.68.1 kernel-obs-build-debugsource-5.3.18-150300.59.68.1 kernel-syms-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (aarch64 x86_64): kernel-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debugsource-5.3.18-150300.59.68.1 kernel-preempt-devel-5.3.18-150300.59.68.1 kernel-preempt-devel-debuginfo-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch): kernel-docs-5.3.18-150300.59.68.1 kernel-source-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): kernel-default-5.3.18-150300.59.68.1 kernel-default-base-5.3.18-150300.59.68.1.150300.18.41.3 kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 kernel-default-devel-5.3.18-150300.59.68.1 kernel-default-devel-debuginfo-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 x86_64): kernel-preempt-5.3.18-150300.59.68.1 kernel-preempt-debuginfo-5.3.18-150300.59.68.1 kernel-preempt-debugsource-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64): kernel-64kb-5.3.18-150300.59.68.1 kernel-64kb-debuginfo-5.3.18-150300.59.68.1 kernel-64kb-debugsource-5.3.18-150300.59.68.1 kernel-64kb-devel-5.3.18-150300.59.68.1 kernel-64kb-devel-debuginfo-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): kernel-devel-5.3.18-150300.59.68.1 kernel-macros-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (s390x): kernel-zfcpdump-5.3.18-150300.59.68.1 kernel-zfcpdump-debuginfo-5.3.18-150300.59.68.1 kernel-zfcpdump-debugsource-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64): kernel-default-5.3.18-150300.59.68.1 kernel-default-base-5.3.18-150300.59.68.1.150300.18.41.3 kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 o SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64): kernel-default-5.3.18-150300.59.68.1 kernel-default-base-5.3.18-150300.59.68.1.150300.18.41.3 kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 o SUSE Linux Enterprise High Availability 15-SP3 (aarch64 ppc64le s390x x86_64): cluster-md-kmp-default-5.3.18-150300.59.68.1 cluster-md-kmp-default-debuginfo-5.3.18-150300.59.68.1 dlm-kmp-default-5.3.18-150300.59.68.1 dlm-kmp-default-debuginfo-5.3.18-150300.59.68.1 gfs2-kmp-default-5.3.18-150300.59.68.1 gfs2-kmp-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debuginfo-5.3.18-150300.59.68.1 kernel-default-debugsource-5.3.18-150300.59.68.1 ocfs2-kmp-default-5.3.18-150300.59.68.1 ocfs2-kmp-default-debuginfo-5.3.18-150300.59.68.1 References: o https://www.suse.com/security/cve/CVE-2020-27835.html o https://www.suse.com/security/cve/CVE-2021-0707.html o https://www.suse.com/security/cve/CVE-2021-20292.html o https://www.suse.com/security/cve/CVE-2021-20321.html o https://www.suse.com/security/cve/CVE-2021-38208.html o https://www.suse.com/security/cve/CVE-2021-4154.html o https://www.suse.com/security/cve/CVE-2022-0812.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://www.suse.com/security/cve/CVE-2022-1280.html o https://www.suse.com/security/cve/CVE-2022-1353.html o https://www.suse.com/security/cve/CVE-2022-1419.html o https://www.suse.com/security/cve/CVE-2022-1516.html o https://www.suse.com/security/cve/CVE-2022-28356.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://www.suse.com/security/cve/CVE-2022-28893.html o https://www.suse.com/security/cve/CVE-2022-29156.html o https://bugzilla.suse.com/1028340 o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1137728 o https://bugzilla.suse.com/1152472 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1177028 o https://bugzilla.suse.com/1179878 o https://bugzilla.suse.com/1182073 o https://bugzilla.suse.com/1183723 o https://bugzilla.suse.com/1187055 o https://bugzilla.suse.com/1191647 o https://bugzilla.suse.com/1193556 o https://bugzilla.suse.com/1193842 o https://bugzilla.suse.com/1194625 o https://bugzilla.suse.com/1195651 o https://bugzilla.suse.com/1195926 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1196114 o https://bugzilla.suse.com/1196367 o https://bugzilla.suse.com/1196514 o https://bugzilla.suse.com/1196639 o https://bugzilla.suse.com/1196942 o https://bugzilla.suse.com/1197157 o https://bugzilla.suse.com/1197391 o https://bugzilla.suse.com/1197656 o https://bugzilla.suse.com/1197660 o https://bugzilla.suse.com/1197677 o https://bugzilla.suse.com/1197914 o https://bugzilla.suse.com/1197926 o https://bugzilla.suse.com/1198077 o https://bugzilla.suse.com/1198217 o https://bugzilla.suse.com/1198330 o https://bugzilla.suse.com/1198400 o https://bugzilla.suse.com/1198413 o https://bugzilla.suse.com/1198437 o https://bugzilla.suse.com/1198448 o https://bugzilla.suse.com/1198484 o https://bugzilla.suse.com/1198515 o https://bugzilla.suse.com/1198516 o https://bugzilla.suse.com/1198534 o https://bugzilla.suse.com/1198742 o https://bugzilla.suse.com/1198825 o https://bugzilla.suse.com/1198989 o https://bugzilla.suse.com/1199012 o https://bugzilla.suse.com/1199024 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2MMkNZI30y1K9AQjQ/Q/+IwDEvpfCNhuIkoigCwEpPEHBFNaIILvu tUKMpta+Y0VzOTJIXYtvcZrG6Qp9xWg/dq3pz3nqBevKpL8Pyzvs2GDL2U8pOxcJ Fk1y70CCTc3zAS0zfhlSyFwWD4IbJZ0bDWWm1/p29VW9geua4CSIf2PntNCxxQmZ GlIJtHfbPosmmWCGSOALLgxKscCmk74YbqQ+Yo0eiZTih/bNf0q0d9YLwhcBriKl oKlhWZLkRlP16YzG5ztBXpg0odSvWq+nGLPxd6eBjDnwRGobMmFZDGmK8Ctwi6pb AAyxJX7YcYdWO3rI8PLezqvB7DyR7A8Y1jt9IJD048fz4FRB8p+GPVQ5q5okaRtx UorR/qiowtSFYlyRwEhuOUHy9IhjhpbWq2juO16Taim58i9Z29ntUpMONjMQnqzO HM/VmHi7VYzYzaYFDrNFlPJVXWDXJ9d0iwNyAkUT8w+Hqnwyd8A5hDQmy76MvHd3 2OjWqs2ff0wN1Dipqv5aqE2GSwzSZT4yOtcPJID3q26jwmbZp+r+wU3FnMBaSvVi OaROKzH0ddx01TJInaviMUJyhQ2IvUrOENun6dFUVcLvGrLNNS0Kz+t1DbG8URxN iNtaXlSObLZ3jc5GXyBp1m1eEz4EaQpO3ztRkC46stz/P+XJ0UWVXqI6k43nMTfF OQ0AZ73klco= =bVSr -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2393 - [SUSE] Linux Kernel: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2393 Security update for the Linux Kernel 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-28748 CVE-2022-28356 CVE-2022-1516 CVE-2022-1419 CVE-2022-1353 CVE-2022-1280 CVE-2022-1011 CVE-2021-43389 CVE-2021-38208 CVE-2021-20321 CVE-2021-20292 CVE-2019-20811 CVE-2018-7755 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221686-1 Comment: CVSS (Max): 7.0 CVE-2022-1280 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1686-1 Rating: important References: #1028340 #1071995 #1084513 #1114648 #1121726 #1129770 #1137728 #1172456 #1183723 #1187055 #1191647 #1191958 #1194625 #1196018 #1196247 #1197075 #1197343 #1197391 #1197663 #1197888 #1197914 #1198217 #1198413 #1198516 #1198687 #1198742 #1198825 #1198989 #1199012 Cross-References: CVE-2018-7755 CVE-2019-20811 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-43389 CVE-2022-1011 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-28356 CVE-2022-28748 Affected Products: SUSE Linux Enterprise Desktop 12-SP5 SUSE Linux Enterprise High Availability 12-SP5 SUSE Linux Enterprise High Performance Computing 12-SP5 SUSE Linux Enterprise Live Patching 12-SP5 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Workstation Extension 12-SP5 ______________________________________________________________________________ An update that solves 13 vulnerabilities and has 16 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). o CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc# 1197391). o CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). o CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). o CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). o CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). o CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343). o CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958). o CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). o CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc# 1191647). o CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc# 1183723). o CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456). o CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/ block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc# 1084513). The following non-security bugs were fixed: o IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes) o NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes). o NFSv4: recover from pre-mature loss of openstateid (bsc#1196247). o NFSv4: Do not try to CLOSE if the stateid 'other' field has changed (bsc# 1196247). o NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247). o NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247). o NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247). o NFSv4: fix open failure with O_ACCMODE flag (git-fixes). o PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes). o PCI: Add device even if driver attach failed (git-fixes). o PCI: Fix overflow in command-line resource alignment requests (git-fixes). o PCI: iproc: Fix out-of-bound array accesses (git-fixes). o PCI: iproc: Set affinity mask on MSI interrupts (git-fixes). o PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes). o PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes). o RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes) o RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes) o RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes) o SUNRPC: Handle low memory situations in call_status() (git-fixes). o USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status (git-fixes). o USB: core: Fix bug in resuming hub's handling of wakeup requests (git-fixes). o USB: serial: cp210x: add NCR Retail IO box id (git-fixes). o USB: serial: pl2303: add IBM device IDs (git-fixes). o USB: serial: simple: add Nokia phone driver (git-fixes). o USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). o arm64: cmpxchg: Use "K" instead of "L" for ll/sc immediate constraint (git-fixes) o arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes) o arm64: drop linker script hack to hide __efistub_ symbols (git-fixes) o arm64: fix for bad_mode() handler to always result in panic (git-fixes) o arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes) o arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes) o arm64: kaslr: ensure randomized quantities are clean also when kaslr (git-fixes) o arm64: kaslr: ensure randomized quantities are clean to the PoC (git-fixes) o arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes) o arm64: only advance singlestep for user instruction traps (git-fixes) o arm64: relocatable: fix inconsistencies in linker script and options (git-fixes) o ath10k: fix max antenna gain unit (git-fixes). o ath6kl: fix control-message timeout (git-fixes). o ath6kl: fix division by zero in send path (git-fixes). o ath9k: Fix potential interrupt storm on queue reset (git-fixes). o b43: fix a lower bounds test (git-fixes). o b43legacy: fix a lower bounds test (git-fixes). o backlight: pwm_bl: Improve bootloader/kernel device handover (bsc#1129770) o bnx2x: fix napi API usage sequence (bsc#1198217). o can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes). o char/mwave: Adjust io port register size (git-fixes). o cifs: do not skip link targets when an I/O fails (bsc#1194625). o crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes) o fbmem: do not allow too huge resolutions (bsc#1129770) o fix parallelism for rpc tasks (bsc#1197663). o fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes). o fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes). o hwrng: atmel - disable trng on failure path (git-fixes). o hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). o i40e: Fix incorrect netdev's real number of RX/TX queues (git-fixes). o i40e: add correct exception tracing for XDP (git-fixes). o i40e: optimize for XDP_REDIRECT in xsk path (git-fixes). o ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes). o io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes). o libertas: Fix possible memory leak in probe and disconnect (git-fixes). o libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes). o livepatch: Do not block removal of patches that are safe to unload (bsc# 1071995). o mac80211: mesh: fix potentially unaligned access (git-fixes). o media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes). o media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes). o media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes). o media: em28xx: fix memory leak in em28xx_init_dev (git-fixes). o media: lmedm04: Fix misuse of comma (git-fixes). o media: rc-loopback: return number of emitters rather than error (git-fixes). o media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes). o media: uvc: do not do DMA on stack (git-fixes). o media: v4l2-ioctl: S_CTRL output the right value (git-fixes). o media: videobuf2-core: dequeue if start_streaming fails (git-fixes). o mt7601u: fix rx buffer refcounting (git-fixes). o mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes). o mwifiex: Send DELBA requests according to spec (git-fixes). o mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes). o net/mlx5e: Reduce tc unsupported key print level (git-fixes). o net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes). o net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops (git-fixes). o net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes). o net: stmicro: handle clk_prepare() failure during init (git-fixes). o net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes). o parisc/sticon: fix reverse colors (bsc#1129770) o powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). o ppp: ensure minimum packet size in ppp_write() (git-fixes). o ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc# 1198413). o random: check for signal_pending() outside of need_resched() check (git-fixes). o random: fix data race on crng_node_pool (git-fixes). o rtl8187: fix control-message timeouts (git-fixes). o scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). o scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc# 1198825). o tcp: Fix potential use-after-free due to double kfree() (bsc#1197075). o tcp: fix race condition when creating child sockets from syncookies (bsc# 1197075). o usb: hub: Fix usb enumeration issue due to address0 race (git-fixes). o usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes). o usb: ulpi: Call of_node_put correctly (git-fixes). o usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes). o video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770) o video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (bsc# 1129770) o video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770) o video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770) o video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (bsc# 1129770) o video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770) o video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (bsc#1129770) o video: fbdev: udlfb: properly check endpoint type (bsc#1129770) o wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes). o wcn36xx: add proper DMA memory barriers in rx path (git-fixes). o x86/pm: Save the MSR validity status at context setup (bsc#1114648). o x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). o x86/speculation: Restore speculation related MSRs during S3 resume (bsc# 1114648). o xen/blkfront: fix comment for need_copy (git-fixes). o xen: detect uninitialized xenbus in xenbus_init (git-fixes). o xen: do not continue xenstore initialization in case of errors (git-fixes). o xen: fix is_xen_pmu() (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2022-1686=1 o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1686=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1686=1 o SUSE Linux Enterprise Live Patching 12-SP5: zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2022-1686=1 o SUSE Linux Enterprise High Availability 12-SP5: zypper in -t patch SUSE-SLE-HA-12-SP5-2022-1686=1 Package List: o SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): kernel-default-debuginfo-4.12.14-122.121.2 kernel-default-debugsource-4.12.14-122.121.2 kernel-default-extra-4.12.14-122.121.2 kernel-default-extra-debuginfo-4.12.14-122.121.2 o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.12.14-122.121.1 kernel-obs-build-debugsource-4.12.14-122.121.1 o SUSE Linux Enterprise Software Development Kit 12-SP5 (noarch): kernel-docs-4.12.14-122.121.2 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): kernel-default-4.12.14-122.121.2 kernel-default-base-4.12.14-122.121.2 kernel-default-base-debuginfo-4.12.14-122.121.2 kernel-default-debuginfo-4.12.14-122.121.2 kernel-default-debugsource-4.12.14-122.121.2 kernel-default-devel-4.12.14-122.121.2 kernel-syms-4.12.14-122.121.2 o SUSE Linux Enterprise Server 12-SP5 (x86_64): kernel-default-devel-debuginfo-4.12.14-122.121.2 o SUSE Linux Enterprise Server 12-SP5 (noarch): kernel-devel-4.12.14-122.121.2 kernel-macros-4.12.14-122.121.2 kernel-source-4.12.14-122.121.2 o SUSE Linux Enterprise Server 12-SP5 (s390x): kernel-default-man-4.12.14-122.121.2 o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64): kernel-default-debuginfo-4.12.14-122.121.2 kernel-default-debugsource-4.12.14-122.121.2 kernel-default-kgraft-4.12.14-122.121.2 kernel-default-kgraft-devel-4.12.14-122.121.2 kgraft-patch-4_12_14-122_121-default-1-8.5.2 o SUSE Linux Enterprise High Availability 12-SP5 (ppc64le s390x x86_64): cluster-md-kmp-default-4.12.14-122.121.2 cluster-md-kmp-default-debuginfo-4.12.14-122.121.2 dlm-kmp-default-4.12.14-122.121.2 dlm-kmp-default-debuginfo-4.12.14-122.121.2 gfs2-kmp-default-4.12.14-122.121.2 gfs2-kmp-default-debuginfo-4.12.14-122.121.2 kernel-default-debuginfo-4.12.14-122.121.2 kernel-default-debugsource-4.12.14-122.121.2 ocfs2-kmp-default-4.12.14-122.121.2 ocfs2-kmp-default-debuginfo-4.12.14-122.121.2 References: o https://www.suse.com/security/cve/CVE-2018-7755.html o https://www.suse.com/security/cve/CVE-2019-20811.html o https://www.suse.com/security/cve/CVE-2021-20292.html o https://www.suse.com/security/cve/CVE-2021-20321.html o https://www.suse.com/security/cve/CVE-2021-38208.html o https://www.suse.com/security/cve/CVE-2021-43389.html o https://www.suse.com/security/cve/CVE-2022-1011.html o https://www.suse.com/security/cve/CVE-2022-1280.html o https://www.suse.com/security/cve/CVE-2022-1353.html o https://www.suse.com/security/cve/CVE-2022-1419.html o https://www.suse.com/security/cve/CVE-2022-1516.html o https://www.suse.com/security/cve/CVE-2022-28356.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://bugzilla.suse.com/1028340 o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1084513 o https://bugzilla.suse.com/1114648 o https://bugzilla.suse.com/1121726 o https://bugzilla.suse.com/1129770 o https://bugzilla.suse.com/1137728 o https://bugzilla.suse.com/1172456 o https://bugzilla.suse.com/1183723 o https://bugzilla.suse.com/1187055 o https://bugzilla.suse.com/1191647 o https://bugzilla.suse.com/1191958 o https://bugzilla.suse.com/1194625 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1196247 o https://bugzilla.suse.com/1197075 o https://bugzilla.suse.com/1197343 o https://bugzilla.suse.com/1197391 o https://bugzilla.suse.com/1197663 o https://bugzilla.suse.com/1197888 o https://bugzilla.suse.com/1197914 o https://bugzilla.suse.com/1198217 o https://bugzilla.suse.com/1198413 o https://bugzilla.suse.com/1198516 o https://bugzilla.suse.com/1198687 o https://bugzilla.suse.com/1198742 o https://bugzilla.suse.com/1198825 o https://bugzilla.suse.com/1198989 o https://bugzilla.suse.com/1199012 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2IckNZI30y1K9AQhXig//TBbYTAxzPxUDfHkRA3DwkjGw/nsFrn1j RCKRYrfByk0IrExi306Cd6Oz9G4P/0v4BBivmIyCuMbSIMPkJ8+5dmn7R7cF1TAN VhX3Ov00uJzA+1aeRf1gOzZRtjgXAQUwzJw4Fxn7F/6f20b06yiG4bzL83A+jGZT Z+nhdYYHlCDievRTOzvh7IrcLnmIjFEeuMSMoJ1vZv6DWfLaKGbXPZnDCliJV/Fk dVIdd7M/6V42RgIZtxu9D5qQ2C5CwFAS+7XPRGakaerhgifkuG3MCqd9GGPQPpe5 E7BfiEfm5i1VoSUWvnREqNmExlSdNFM2Lcr2Udyq2PDjgwOeqSDx8uvIkCsfiUK8 EwHKYf71D/y8TrIvT8AWln6wqhQwA67z8YpBkPvitZi6millgXPK9Bh1pyAf0kjE Bu86nXZBhFIJSiCVzLqBwXjF6ozWMq6cSBcLfuv7dIMvEn4kPrDSTtO9TR8gPyqf UgQJbwpR3QYfF11ECAd7MHuG9iXftuFDpIJLmjLN49dz+cm4fgQS1H7CMtMHQRDE NWxvhX0pIZuqT0hx1JmCRDCFTp7Y0wMYD4FGwlcDu+1PGCakztegycWVkhRTOtlk 97bQ9y0dsVl6zvpu+/SXlg22weHAPIapAT8uHu+2AidKZrOk3D5fvXocpEmKgLYw xScSmu5Y+Dc= =l4FT -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2392 - [SUSE] Linux Kernel: CVSS (Max): 8.8

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2392 Security update for the Linux Kernel 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29156 CVE-2022-28893 CVE-2022-28748 CVE-2022-28356 CVE-2022-1516 CVE-2022-1419 CVE-2022-1353 CVE-2022-1280 CVE-2022-1158 CVE-2022-0812 CVE-2021-38208 CVE-2021-20321 CVE-2021-20292 CVE-2021-4154 CVE-2021-0707 CVE-2020-27835 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221669-1 Comment: CVSS (Max): 8.8 CVE-2021-4154 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1669-1 Rating: important References: #1028340 #1071995 #1137728 #1152472 #1152489 #1177028 #1179878 #1182073 #1183723 #1187055 #1191647 #1193556 #1193842 #1194625 #1195651 #1195926 #1196018 #1196114 #1196367 #1196514 #1196639 #1196942 #1197157 #1197391 #1197656 #1197660 #1197677 #1197914 #1197926 #1198077 #1198217 #1198330 #1198400 #1198413 #1198437 #1198448 #1198484 #1198515 #1198516 #1198534 #1198742 #1198825 #1198989 #1199012 #1199024 Cross-References: CVE-2020-27835 CVE-2021-0707 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-4154 CVE-2022-0812 CVE-2022-1158 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-28356 CVE-2022-28748 CVE-2022-28893 CVE-2022-29156 Affected Products: SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Realtime 15-SP3 SUSE Linux Enterprise Real Time 15-SP3 SUSE Linux Enterprise Realtime Extension 15-SP3 ______________________________________________________________________________ An update that solves 16 vulnerabilities, contains 6 features and has 29 fixes is now available. Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-29156: Fixed a double free related to rtrs_clt_dev_release (bnc# 1198515). o CVE-2022-28893: Ensuring that sockets are in the intended state inside the SUNRPC subsystem (bnc#1198330). o CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). o CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc# 1197391). o CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). o CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). o CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). o CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). o CVE-2022-1158: Fixed KVM x86/mmu compare-and-exchange of gPTE via the user address (bsc#1197660). o CVE-2022-0812: Fixed random memory leakage inside NFS/RDMA (bsc#1196639). o CVE-2021-4154: Fixed a use-after-free flaw inside cgroup1_parse_param in kernel/cgroup/cgroup-v1.c. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system (bnc# 1193842). o CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). o CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc# 1191647). o CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc# 1183723). o CVE-2021-0707: Fixed possible memory corruption due to a use after free inside dma_buf_releas e of dma-buf.c (bnc#1198437). o CVE-2020-27835: Fixed use after free in infiniband hfi1 driver in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878). The following non-security bugs were fixed: o ACPI: processor idle: Check for architectural support for LPI (git-fixes). o ACPI/APEI: Limit printable size of BERT table data (git-fixes). o ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes). o adm8211: fix error return code in adm8211_probe() (git-fixes). o ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes). o ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes). o ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes). o ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes). o ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes). o ALSA: pcm: Test for "silence" field in struct "pcm_format_data" (git-fixes). o ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes). o ALSA: usb-audio: Increase max buffer size (git-fixes). o ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes). o arm64: clear_page() shouldn't use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes) o arm64: dts: allwinner: h5: NanoPI Neo 2: Fix ethernet node (git-fixes) o arm64: dts: allwinner: orangepi-zero-plus: fix PHY mode (git-fixes) o arm64: dts: exynos: correct GIC CPU interfaces address range on (git-fixes) o arm64: dts: ls1028a: fix memory node (git-fixes) o arm64: dts: ls1028a: fix node name for the sysclk (git-fixes) o arm64: dts: lx2160a: fix scl-gpios property name (git-fixes) o arm64: dts: marvell: armada-37xx: Extend PCIe MEM space (git-fixes) o arm64: dts: marvell: armada-37xx: Fix reg for standard variant of (git-fixes) o arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes) o arm64: dts: rockchip: Fix GPU register width for RK3328 (git-fixes) o arm64: dts: rockchip: remove mmc-hs400-enhanced-strobe from (git-fixes) o arm64: dts: zii-ultra: fix 12V_MAIN voltage (git-fixes) o arm64: head: avoid over-mapping in map_memory (git-fixes) o arm64: Update config files; arm LIBNVDIMM y->m ppc64le ND_BLK ->m (bsc# 1199024). o arm64/sve: Use correct size when reinitialising SVE state (git-fixes) o ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes). o ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes). o ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes). o ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes). o ASoC: soc-compress: Change the check for codec_dai (git-fixes). o ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes). o ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes). o ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes). o ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes). o ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes). o ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes). o ath5k: fix building with LEDS=m (git-fixes). o ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes). o ath9k_htc: fix uninit value bugs (git-fixes). o ath9k: Fix usage of driver-private space in tx_info (git-fixes). o ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes). o backlight: qcom-wled: Respect enabled-strings in set_brightness (bsc# 1152489) o bareudp: use ipv6_mod_enabled to check if IPv6 enabled (jsc#SLE-15172). o bfq: Avoid merging queues with different parents (bsc#1197926). o bfq: Drop pointless unlock-lock pair (bsc#1197926). o bfq: Get rid of __bio_blkcg() usage (bsc#1197926). o bfq: Make sure bfqg for which we are queueing requests is online (bsc# 1197926). o bfq: Remove pointless bfq_init_rq() calls (bsc#1197926). o bfq: Split shared queues on move between cgroups (bsc#1197926). o bfq: Track whether bfq_group is still online (bsc#1197926). o bfq: Update cgroup information before merging bio (bsc#1197926). o block: Drop leftover references to RQF_SORTED (bsc#1182073). o Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes). o Bluetooth: Fix use after free in hci_send_acl (git-fixes). o Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes). o bnx2x: fix napi API usage sequence (bsc#1198217). o bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes bsc#1177028). o brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes). o brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes). o brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes). o brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes). o carl9170: fix missing bit-wise or operator for tx_params (git-fixes). o cfg80211: hold bss_lock while updating nontrans_list (git-fixes). o cifs: do not skip link targets when an I/O fails (bsc#1194625). o cifs: fix bad fids sent over wire (bsc#1197157). o clk: Enforce that disjoints limits are invalid (git-fixes). o clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes). o direct-io: clean up error paths of do_blockdev_direct_IO (bsc#1197656). o direct-io: defer alignment check until after the EOF check (bsc#1197656). o direct-io: do not force writeback for reads beyond EOF (bsc#1197656). o dma-debug: fix return value of __setup handlers (git-fixes). o dma: at_xdmac: fix a missing check on list iterator (git-fixes). o dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes). o dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes). o dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes). o dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes). o dmaengine: Revert "dmaengine: shdma: Fix runtime PM imbalance on error" (git-fixes). o Documentation: add link to stable release candidate tree (git-fixes). o drm: add a locked version of drm_is_current_master (bsc#1197914). o drm: Add orientation quirk for GPD Win Max (git-fixes). o drm: drm_file struct kABI compatibility workaround (bsc#1197914). o drm: protect drm_master pointers in drm_lease.c (bsc#1197914). o drm: serialize drm_file.master with a new spinlock (bsc#1197914). o drm: use the lookup lock in drm_is_current_master (bsc#1197914). o drm/amd: Add USBC connector ID (git-fixes). o drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes). o drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes). o drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes). o drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes). o drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1152472) o drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1152489) o drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes). o drm/amdgpu: Fix recursive locking warning (git-fixes). o drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes). o drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes). o drm/amdkfd: make CRAT table missing message informational only (git-fixes). o drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes). o drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes). o drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes). o drm/cma-helper: Set VM_DONTEXPAND for mmap (bsc#1152472) o drm/edid: check basic audio support on CEA extension block (git-fixes). o drm/edid: Do not clear formats if using deep color (git-fixes). o drm/fb-helper: Mark screen buffers in system memory with (bsc#1152472) o drm/i915: Call i915_globals_exit() if pci_register_device() fails (git-fixes). o drm/i915: Drop all references to DRM IRQ midlayer (bsc#1152489) o drm/i915: Keep gem ctx->vm alive until the final put (bsc#1152489) o drm/i915: s/JSP2/ICP2/ PCH (bsc#1152489) o drm/i915/gem: Flush coherency domains on first set-domain-ioctl (git-fixes). o drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes). o drm/mediatek: Add AAL output size configuration (git-fixes). o drm/mediatek: Fix aal size config (git-fixes). o drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes). o drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes). o drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes). o drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap (bsc#1152472) o drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes). o drm/vc4: crtc: Lookup the encoder from the register at boot (bsc#1198534) o drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes). o drm/vmwgfx: Remove unused compile options (bsc#1152472) o e1000e: Fix possible overflow in LTR decoding (git-fixes). o fibmap: Reject negative block numbers (bsc#1198448). o fibmap: Use bmap instead of ->bmap method in ioctl_fibmap (bsc#1198448). o firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes). o gpiolib: acpi: use correct format characters (git-fixes). o gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes). o HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes). o hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). o i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes). o IB/hfi1: Allow larger MTU without AIP (jsc#SLE-13208). o Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes). o ipmi: bail out if init_srcu_struct fails (git-fixes). o ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes). o ipmi: Move remove_work to dedicated workqueue (git-fixes). o iwlwifi: Fix -EIO error code that is never returned (git-fixes). o iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes). o KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes). o livepatch: Do not block removal of patches that are safe to unload (bsc# 1071995). o lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes). o media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes). o media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes). o memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes). o mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes). o mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes). o mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes). o mmc: mmci_sdmmc: Replace sg_dma_xxx macros (git-fixes). o mmc: mmci: stm32: correctly check all elements of sg list (git-fixes). o mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes). o mtd: onenand: Check for error irq (git-fixes). o mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes). o mtd: rawnand: gpmi: fix controller timings setting (git-fixes). o mwl8k: Fix a double Free in mwl8k_probe_hw (git-fixes). o net: asix: add proper error handling of usb read errors (git-fixes). o net: mana: Add counter for packet dropped by XDP (bsc#1195651). o net: mana: Add counter for XDP_TX (bsc#1195651). o net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). o net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). o net: mana: Reuse XDP dropped page (bsc#1195651). o net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc# 1195651). o net: mcs7830: handle usb read errors properly (git-fixes). o net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes). o nfc: nci: add flush_workqueue to prevent uaf (git-fixes). o NFSv4: fix open failure with O_ACCMODE flag (git-fixes). o PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes). o PCI: aardvark: Fix support for MSI interrupts (git-fixes). o PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes). o PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes). o PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes). o PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes). o power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes). o power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes). o power: supply: axp20x_battery: properly report current when discharging (git-fixes). o power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes). o power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes). o power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes). o power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes). o powerpc/perf: Expose Performance Monitor Counter SPR's as part of extended regs (bsc#1198077 ltc#197299). o powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes). o powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). o powerpc/perf: Include PMCs as part of per-cpu cpuhw_events struct (bsc# 1198077 ltc#197299). o ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc# 1198413). o random: check for signal_pending() outside of need_resched() check (git-fixes). o ray_cs: Check ioremap return value (git-fixes). o RDMA/core: Set MR type in ib_reg_user_mr (jsc#SLE-8449). o RDMA/mlx5: Add a missing update of cache->last_add (jsc#SLE-15175). o RDMA/mlx5: Do not remove cache MRs when a delay is needed (jsc#SLE-15175). o RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (jsc# SLE-15175). o regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes). o rpm: Run external scriptlets on uninstall only when available (bsc#1196514 bsc#1196114 bsc#1196942). o rpm: Use bash for %() expansion (jsc#SLE-18234). o rpm/*.spec.in: remove backtick usage o rpm/constraints.in: skip SLOW_DISK workers for kernel-source o rpm/kernel-obs-build.spec.in: use default dracut modules (bsc#1195926, bsc# 1198484) o rtc: check if __rtc_read_time was successful (git-fixes). o rtc: wm8350: Handle error for wm8350_register_irq (git-fixes). o s390/tape: fix timer initialization in tape_std_assign() (bsc#1197677 LTC# 197378). o scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). o scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes). o scsi: mpt3sas: Page fault in reply q processing (git-fixes). o scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc# 1198825). o spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes). o spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes). o spi: Fix erroneous sgs value with min_t() (git-fixes). o spi: Fix invalid sgs value (git-fixes). o spi: mxic: Fix the transmit path (git-fixes). o spi: tegra20: Use of_device_get_match_data() (git-fixes). o staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes). o SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367). o SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() (git-fixes). o SUNRPC: Fix the svc_deferred_event trace class (git-fixes). o SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes). o SUNRPC: Handle low memory situations in call_status() (git-fixes). o USB: dwc3: core: Fix tx/rx threshold settings (git-fixes). o USB: dwc3: core: Only handle soft-reset in DCTL (git-fixes). o USB: dwc3: gadget: Return proper request status (git-fixes). o USB: dwc3: omap: fix "unbalanced disables for smps10_out1" on omap5evm (git-fixes). o USB: gadget: uvc: Fix crash when encoding data for usb request (git-fixes). o USB: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (bsc# 1152489) o USB: serial: pl2303: add IBM device IDs (git-fixes). o USB: serial: simple: add Nokia phone driver (git-fixes). o USB: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes). o USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). o vgacon: Propagate console boot parameters before calling `vc_resize' (bsc# 1152489) o video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes). o video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes). o video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes). o video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes). o video: fbdev: udlfb: properly check endpoint type (bsc#1152489) o video: fbdev: w100fb: Reset global state (git-fixes). o virtio_console: break out of buf poll on remove (git-fixes). o virtio_console: eliminate anonymous module_init & module_exit (git-fixes). o w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes). o x86/pm: Save the MSR validity status at context setup (bsc#1198400). o x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). o x86/speculation: Restore speculation related MSRs during S3 resume (bsc# 1198400). o xen: fix is_xen_pmu() (git-fixes). o xen/blkfront: fix comment for need_copy (git-fixes). o xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556). o xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc# 1193556). o xhci: fix runtime PM imbalance in USB2 resume (git-fixes). o xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Realtime Extension 15-SP3: zypper in -t patch SUSE-SLE-Product-RT-15-SP3-2022-1669=1 o SUSE Linux Enterprise Module for Realtime 15-SP3: zypper in -t patch SUSE-SLE-Module-RT-15-SP3-2022-1669=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1669=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1669=1 Package List: o SUSE Linux Enterprise Realtime Extension 15-SP3 (noarch): release-notes-sle_rt-15.3.20220422-150300.3.3.2 o SUSE Linux Enterprise Module for Realtime 15-SP3 (x86_64): cluster-md-kmp-rt-5.3.18-150300.88.2 cluster-md-kmp-rt-debuginfo-5.3.18-150300.88.2 dlm-kmp-rt-5.3.18-150300.88.2 dlm-kmp-rt-debuginfo-5.3.18-150300.88.2 gfs2-kmp-rt-5.3.18-150300.88.2 gfs2-kmp-rt-debuginfo-5.3.18-150300.88.2 kernel-rt-5.3.18-150300.88.2 kernel-rt-debuginfo-5.3.18-150300.88.2 kernel-rt-debugsource-5.3.18-150300.88.2 kernel-rt-devel-5.3.18-150300.88.2 kernel-rt-devel-debuginfo-5.3.18-150300.88.2 kernel-rt_debug-debuginfo-5.3.18-150300.88.2 kernel-rt_debug-debugsource-5.3.18-150300.88.2 kernel-rt_debug-devel-5.3.18-150300.88.2 kernel-rt_debug-devel-debuginfo-5.3.18-150300.88.2 kernel-syms-rt-5.3.18-150300.88.1 ocfs2-kmp-rt-5.3.18-150300.88.2 ocfs2-kmp-rt-debuginfo-5.3.18-150300.88.2 o SUSE Linux Enterprise Module for Realtime 15-SP3 (noarch): kernel-devel-rt-5.3.18-150300.88.2 kernel-source-rt-5.3.18-150300.88.2 release-notes-sle_rt-15.3.20220422-150300.3.3.2 o SUSE Linux Enterprise Micro 5.2 (x86_64): kernel-rt-5.3.18-150300.88.2 kernel-rt-debuginfo-5.3.18-150300.88.2 kernel-rt-debugsource-5.3.18-150300.88.2 o SUSE Linux Enterprise Micro 5.1 (x86_64): kernel-rt-5.3.18-150300.88.2 kernel-rt-debuginfo-5.3.18-150300.88.2 kernel-rt-debugsource-5.3.18-150300.88.2 References: o https://www.suse.com/security/cve/CVE-2020-27835.html o https://www.suse.com/security/cve/CVE-2021-0707.html o https://www.suse.com/security/cve/CVE-2021-20292.html o https://www.suse.com/security/cve/CVE-2021-20321.html o https://www.suse.com/security/cve/CVE-2021-38208.html o https://www.suse.com/security/cve/CVE-2021-4154.html o https://www.suse.com/security/cve/CVE-2022-0812.html o https://www.suse.com/security/cve/CVE-2022-1158.html o https://www.suse.com/security/cve/CVE-2022-1280.html o https://www.suse.com/security/cve/CVE-2022-1353.html o https://www.suse.com/security/cve/CVE-2022-1419.html o https://www.suse.com/security/cve/CVE-2022-1516.html o https://www.suse.com/security/cve/CVE-2022-28356.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://www.suse.com/security/cve/CVE-2022-28893.html o https://www.suse.com/security/cve/CVE-2022-29156.html o https://bugzilla.suse.com/1028340 o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1137728 o https://bugzilla.suse.com/1152472 o https://bugzilla.suse.com/1152489 o https://bugzilla.suse.com/1177028 o https://bugzilla.suse.com/1179878 o https://bugzilla.suse.com/1182073 o https://bugzilla.suse.com/1183723 o https://bugzilla.suse.com/1187055 o https://bugzilla.suse.com/1191647 o https://bugzilla.suse.com/1193556 o https://bugzilla.suse.com/1193842 o https://bugzilla.suse.com/1194625 o https://bugzilla.suse.com/1195651 o https://bugzilla.suse.com/1195926 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1196114 o https://bugzilla.suse.com/1196367 o https://bugzilla.suse.com/1196514 o https://bugzilla.suse.com/1196639 o https://bugzilla.suse.com/1196942 o https://bugzilla.suse.com/1197157 o https://bugzilla.suse.com/1197391 o https://bugzilla.suse.com/1197656 o https://bugzilla.suse.com/1197660 o https://bugzilla.suse.com/1197677 o https://bugzilla.suse.com/1197914 o https://bugzilla.suse.com/1197926 o https://bugzilla.suse.com/1198077 o https://bugzilla.suse.com/1198217 o https://bugzilla.suse.com/1198330 o https://bugzilla.suse.com/1198400 o https://bugzilla.suse.com/1198413 o https://bugzilla.suse.com/1198437 o https://bugzilla.suse.com/1198448 o https://bugzilla.suse.com/1198484 o https://bugzilla.suse.com/1198515 o https://bugzilla.suse.com/1198516 o https://bugzilla.suse.com/1198534 o https://bugzilla.suse.com/1198742 o https://bugzilla.suse.com/1198825 o https://bugzilla.suse.com/1198989 o https://bugzilla.suse.com/1199012 o https://bugzilla.suse.com/1199024 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2E8kNZI30y1K9AQgLfw/7BYQq8IgIWhTOfOjAwJape2Yja9pJW5r/ vqxkSIiMYbyaUtO/l8Pj/+1oJdsV3P05G5CjxlzEYEva2wNNlcREAG1yj1nAqiDf Hlx2mCYWnQo5ns/FnY5xRMNnAAEuFImDno060kRlKgz5AJdPpPpxUQOlGACPMHJ9 gW08Mzli3ElRTkffZpcLZW5uIXqfnyeqhr0+PaJW0WH3xFQH7ElIJZXnDuuHXoE6 HXBC4ly5NkiTvzYuBOXHtDqxpjmY3rGld6aipHC/SK2WOFP33dC8GQlOlQxfbrK1 wDbAzaS7BN66IV2Brv+uugAHMFl8G5jfqtSoe9KvKDL+3ZHrGgpe1xLqgV1f/p9i 33S3mNbBCj2Nn+w58ddc5Wa8nMZMT3iXFDQHQ61iwk1quwUfp4PUh4jIptAjVgxW BMqm+SYnPfhDIFxLuIDf+tHqty9I6J8rsp4atn89QMYZOD/bj5/x5/OyAbyXyag5 Y15To/jIq+eDqfeCMiuYoIwA1maXdIEyaaNHME1wfJhuzNeE48Ma84iVMnShjxTb n6XUiKVirFUaPMTgOosLdBIGr+qxMc9ERFoNjMUdWajYRqvqj//d8B2VCUrzxWF8 AeFNuUXyJwP2YDy+KQVwqkoseeCu+RpbTrysLs2Tqp66jieaaA6InFnIDYgGS6Ox ckppvW2saZk= =Mx2P -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2391 - [SUSE] Linux Kernel: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2391 Security update for the Linux Kernel 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-28748 CVE-2022-28356 CVE-2022-1516 CVE-2022-1419 CVE-2022-1353 CVE-2022-1280 CVE-2022-1011 CVE-2021-43389 CVE-2021-38208 CVE-2021-20321 CVE-2021-20292 CVE-2019-20811 CVE-2018-7755 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221668-1 Comment: CVSS (Max): 7.0 CVE-2022-1280 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1668-1 Rating: important References: #1028340 #1071995 #1084513 #1114648 #1121726 #1129770 #1137728 #1172456 #1183723 #1187055 #1191647 #1191958 #1194625 #1195651 #1196018 #1196247 #1197075 #1197343 #1197391 #1197663 #1197888 #1197914 #1198217 #1198413 #1198516 #1198687 #1198742 #1198825 #1198989 #1199012 Cross-References: CVE-2018-7755 CVE-2019-20811 CVE-2021-20292 CVE-2021-20321 CVE-2021-38208 CVE-2021-43389 CVE-2022-1011 CVE-2022-1280 CVE-2022-1353 CVE-2022-1419 CVE-2022-1516 CVE-2022-28356 CVE-2022-28748 Affected Products: SUSE Linux Enterprise Real Time Extension 12-SP5 ______________________________________________________________________________ An update that solves 13 vulnerabilities and has 17 fixes is now available. Description: The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes. The following security bugs were fixed: o CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018). o CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc# 1197391). o CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012). o CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742). o CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516). o CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914). o CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343). o CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958). o CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055). o CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc# 1191647). o CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc# 1183723). o CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456). o CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/ block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc# 1084513). The following non-security bugs were fixed: o IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes) o NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes). o NFSv4: Do not try to CLOSE if the stateid 'other' field has changed (bsc# 1196247). o NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247). o NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247). o NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247). o NFSv4: fix open failure with O_ACCMODE flag (git-fixes). o NFSv4: recover from pre-mature loss of openstateid (bsc#1196247). o PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes). o PCI: Add device even if driver attach failed (git-fixes). o PCI: Do not enable AtomicOps on VFs (bsc#1129770) o PCI: Fix overflow in command-line resource alignment requests (git-fixes). o PCI: iproc: Fix out-of-bound array accesses (git-fixes). o PCI: iproc: Set affinity mask on MSI interrupts (git-fixes). o PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes). o PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes). o RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes) o RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes) o RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes) o SUNRPC: Handle low memory situations in call_status() (git-fixes). o USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status (git-fixes). o USB: core: Fix bug in resuming hub's handling of wakeup requests (git-fixes). o USB: serial: cp210x: add NCR Retail IO box id (git-fixes). o USB: serial: pl2303: add IBM device IDs (git-fixes). o USB: serial: simple: add Nokia phone driver (git-fixes). o USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes). o arm64/iommu: handle non-remapped addresses in ->mmap and (git-fixes) o arm64/mm: Inhibit huge-vmap with ptdump (git-fixes). o arm64: Clear OSDLR_EL1 on CPU boot (git-fixes) o arm64: Fix HCR.TGE status for NMI contexts (git-fixes) o arm64: Fix size of __early_cpu_boot_status (git-fixes) o arm64: Relax GIC version check during early boot (git-fixes) o arm64: Save and restore OSDLR_EL1 across suspend/resume (git-fixes) o arm64: cmpxchg: Use "K" instead of "L" for ll/sc immediate constraint (git-fixes) o arm64: compat: Allow single-byte watchpoints on all addresses (git-fixes) o arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes) o arm64: compat: Reduce address limit (git-fixes) o arm64: cpufeature: Fix feature comparison for CTR_EL0.{CWG,ERG} (git-fixes) o arm64: debug: Don't propagate UNKNOWN FAR into si_code for debug (git-fixes) o arm64: debug: Ensure debug handlers check triggering exception level (git-fixes) o arm64: drop linker script hack to hide __efistub_ symbols (git-fixes) o arm64: dts: marvell: Fix A37xx UART0 register size (git-fixes) o arm64: entry: SP Alignment Fault doesn't write to FAR_EL1 (git-fixes) o arm64: fix for bad_mode() handler to always result in panic (git-fixes) o arm64: futex: Avoid copying out uninitialised stack in failed (git-fixes) o arm64: futex: Bound number of LDXR/STXR loops in FUTEX_WAKE_OP (git-fixes) o arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (git-fixes) o arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes) o arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes) o arm64: kaslr: ensure randomized quantities are clean also when kaslr (git-fixes) o arm64: kaslr: ensure randomized quantities are clean to the PoC (git-fixes) o arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes) o arm64: kprobes: Recover pstate.D in single-step exception handler (git-fixes) o arm64: only advance singlestep for user instruction traps (git-fixes) o arm64: relocatable: fix inconsistencies in linker script and options (git-fixes) o arm: 9110/1: oabi-compat: fix oabi epoll sparse warning (bsc#1129770) o ath10k: fix max antenna gain unit (git-fixes). o ath6kl: fix control-message timeout (git-fixes). o ath6kl: fix division by zero in send path (git-fixes). o ath9k: Fix potential interrupt storm on queue reset (git-fixes). o b43: fix a lower bounds test (git-fixes). o b43legacy: fix a lower bounds test (git-fixes). o backlight: pwm_bl: Improve bootloader/kernel device handover (bsc#1129770) o bnx2x: fix napi API usage sequence (bsc#1198217). o bonding: pair enable_port with slave_arr_updates (git-fixes). o can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes). o char/mwave: Adjust io port register size (git-fixes). o cifs: do not skip link targets when an I/O fails (bsc#1194625). o crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes) o crypto: arm64/aes-neonbs - don't access already-freed walk.iv (git-fixes) o drivers: net: xgene: Fix regression in CRC stripping o drm/fb-helper: Mark screen buffers in system memory with (bsc#1129770) o fbmem: do not allow too huge resolutions (bsc#1129770) o fix parallelism for rpc tasks (bsc#1197663). o fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes). o fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes). o hwrng: atmel - disable trng on failure path (git-fixes). o hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes). o i40e: Fix incorrect netdev's real number of RX/TX queues (git-fixes). o i40e: add correct exception tracing for XDP (git-fixes). o i40e: optimize for XDP_REDIRECT in xsk path (git-fixes). o ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes). o io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes). o libertas: Fix possible memory leak in probe and disconnect (git-fixes). o libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes). o livepatch: Do not block removal of patches that are safe to unload (bsc# 1071995). o lpfc: Revert driver update to 14.2.0.1 (bsc#1198989) o mac80211: mesh: fix potentially unaligned access (git-fixes). o media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes). o media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes). o media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes). o media: em28xx: fix memory leak in em28xx_init_dev (git-fixes). o media: lmedm04: Fix misuse of comma (git-fixes). o media: rc-loopback: return number of emitters rather than error (git-fixes). o media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes). o media: uvc: do not do DMA on stack (git-fixes). o media: v4l2-ioctl: S_CTRL output the right value (git-fixes). o media: videobuf2-core: dequeue if start_streaming fails (git-fixes). o mt7601u: fix rx buffer refcounting (git-fixes). o mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes). o mwifiex: Send DELBA requests according to spec (git-fixes). o mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes). o net/mlx5e: Reduce tc unsupported key print level (git-fixes). o net: bcmgenet: Don't claim WOL when its not available o net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes). o net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops (git-fixes). o net: mana: Add counter for XDP_TX (bsc#1195651). o net: mana: Add counter for packet dropped by XDP (bsc#1195651). o net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651). o net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651). o net: mana: Reuse XDP dropped page (bsc#1195651). o net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc# 1195651). o net: qlogic: check the return value of dma_alloc_coherent() o net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes). o net: stmicro: handle clk_prepare() failure during init (git-fixes). o net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes). o parisc/sticon: fix reverse colors (bsc#1129770) o powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes). o ppp: ensure minimum packet size in ppp_write() (git-fixes). o ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc# 1198413). o qed: display VF trust config (git-fixes). o qed: return status of qed_iov_get_link (git-fixes). o qed: validate and restrict untrusted VFs vlan promisc mode o random: check for signal_pending() outside of need_resched() check (git-fixes). o random: fix data race on crng_node_pool (git-fixes). o rtl8187: fix control-message timeouts (git-fixes). o scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes). o scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc# 1198825). o tcp: Fix potential use-after-free due to double kfree() (bsc#1197075). o tcp: fix race condition when creating child sockets from syncookies (bsc# 1197075). o usb: hub: Fix usb enumeration issue due to address0 race (git-fixes). o usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes). o usb: ulpi: Call of_node_put correctly (git-fixes). o usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes). o veth: Ensure eth header is in skb's linear part (git-fixes). o video: backlight: Drop maximum brightness override for brightness (bsc# 1129770) o video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770) o video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (bsc# 1129770) o video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770) o video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770) o video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (bsc# 1129770) o video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770) o video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (bsc#1129770) o video: fbdev: udlfb: properly check endpoint type (bsc#1129770) o video: hyperv_fb: Fix validation of screen resolution (bsc#1129770) o wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes). o wcn36xx: add proper DMA memory barriers in rx path (git-fixes). o x86/pm: Save the MSR validity status at context setup (bsc#1114648). o x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes). o x86/speculation: Restore speculation related MSRs during S3 resume (bsc# 1114648). o xen/blkfront: fix comment for need_copy (git-fixes). o xen: detect uninitialized xenbus in xenbus_init (git-fixes). o xen: do not continue xenstore initialization in case of errors (git-fixes). o xen: fix is_xen_pmu() (git-fixes). Special Instructions and Notes: Please reboot the system after installing this update. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Real Time Extension 12-SP5: zypper in -t patch SUSE-SLE-RT-12-SP5-2022-1668=1 Package List: o SUSE Linux Enterprise Real Time Extension 12-SP5 (noarch): kernel-devel-rt-4.12.14-10.89.1 kernel-source-rt-4.12.14-10.89.1 o SUSE Linux Enterprise Real Time Extension 12-SP5 (x86_64): cluster-md-kmp-rt-4.12.14-10.89.1 cluster-md-kmp-rt-debuginfo-4.12.14-10.89.1 dlm-kmp-rt-4.12.14-10.89.1 dlm-kmp-rt-debuginfo-4.12.14-10.89.1 gfs2-kmp-rt-4.12.14-10.89.1 gfs2-kmp-rt-debuginfo-4.12.14-10.89.1 kernel-rt-4.12.14-10.89.1 kernel-rt-base-4.12.14-10.89.1 kernel-rt-base-debuginfo-4.12.14-10.89.1 kernel-rt-debuginfo-4.12.14-10.89.1 kernel-rt-debugsource-4.12.14-10.89.1 kernel-rt-devel-4.12.14-10.89.1 kernel-rt-devel-debuginfo-4.12.14-10.89.1 kernel-rt_debug-4.12.14-10.89.1 kernel-rt_debug-debuginfo-4.12.14-10.89.1 kernel-rt_debug-debugsource-4.12.14-10.89.1 kernel-rt_debug-devel-4.12.14-10.89.1 kernel-rt_debug-devel-debuginfo-4.12.14-10.89.1 kernel-syms-rt-4.12.14-10.89.1 ocfs2-kmp-rt-4.12.14-10.89.1 ocfs2-kmp-rt-debuginfo-4.12.14-10.89.1 References: o https://www.suse.com/security/cve/CVE-2018-7755.html o https://www.suse.com/security/cve/CVE-2019-20811.html o https://www.suse.com/security/cve/CVE-2021-20292.html o https://www.suse.com/security/cve/CVE-2021-20321.html o https://www.suse.com/security/cve/CVE-2021-38208.html o https://www.suse.com/security/cve/CVE-2021-43389.html o https://www.suse.com/security/cve/CVE-2022-1011.html o https://www.suse.com/security/cve/CVE-2022-1280.html o https://www.suse.com/security/cve/CVE-2022-1353.html o https://www.suse.com/security/cve/CVE-2022-1419.html o https://www.suse.com/security/cve/CVE-2022-1516.html o https://www.suse.com/security/cve/CVE-2022-28356.html o https://www.suse.com/security/cve/CVE-2022-28748.html o https://bugzilla.suse.com/1028340 o https://bugzilla.suse.com/1071995 o https://bugzilla.suse.com/1084513 o https://bugzilla.suse.com/1114648 o https://bugzilla.suse.com/1121726 o https://bugzilla.suse.com/1129770 o https://bugzilla.suse.com/1137728 o https://bugzilla.suse.com/1172456 o https://bugzilla.suse.com/1183723 o https://bugzilla.suse.com/1187055 o https://bugzilla.suse.com/1191647 o https://bugzilla.suse.com/1191958 o https://bugzilla.suse.com/1194625 o https://bugzilla.suse.com/1195651 o https://bugzilla.suse.com/1196018 o https://bugzilla.suse.com/1196247 o https://bugzilla.suse.com/1197075 o https://bugzilla.suse.com/1197343 o https://bugzilla.suse.com/1197391 o https://bugzilla.suse.com/1197663 o https://bugzilla.suse.com/1197888 o https://bugzilla.suse.com/1197914 o https://bugzilla.suse.com/1198217 o https://bugzilla.suse.com/1198413 o https://bugzilla.suse.com/1198516 o https://bugzilla.suse.com/1198687 o https://bugzilla.suse.com/1198742 o https://bugzilla.suse.com/1198825 o https://bugzilla.suse.com/1198989 o https://bugzilla.suse.com/1199012 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL2A8kNZI30y1K9AQhu5xAApBYFNFPLLde8ZUvuoPMRh2Rz1Y/pLOTt OKGbQE1GpPq3wlU1pKemjAllRc2iYtzf8lT1HB4rMEliDOH1Jyo9FKvdAI2GUdvL wLqLqiFI+2x6RkYAmN0QlZPmMHXMZ+IfdX1oEeAkPITsKtjkSecv1JCnqOBZ7M1G 8jhf+fwNBJn99oqnH2y06kcvn/N7ywUx3MF2dMlBVm06nbSyplNKndS29x4e6HG9 u4xV9ZRbT0+PJwMULheaIaLLYNKitUP3UFhMGM/y5dA9Ln9mqzlx4D6FO/W4flrs EJYUKpDLcLIm6La6Tuv3oG0JHf9cu2XJh89kzkU3bKMRbw0a0vnJOCV3e2wDBRVB KqDYjkmDPmfLN3YFw0G3eYXwCXVx6wZlUQRT9+MxwI5F3J6Cr7QAutWU6nUDZ8m0 lAzkMpvpZwwEjBncHAIRTb/u+uIIwK68Nl7kSWW/SExYnesBKCo9Kc9DwykyNhA1 NWuPEWCDMiRJ7okEW1N8TiKOvp3inAB5nIdk6YOqrrvCC7CYfwHGJ0CXkdlDPmHB BHalVqDveMCv4X+JvyX62VeUvo0OuKO6d56wdJugB6DATOQmEXfnaCDIqo9p8LFi 6OFgFBtBrF2Y/EyWusrHgeCmxMSJGXFe3B0T2Zb3ZrVnoThn1jK6pFrYlB+6seEu FMGby6ABZz8= =U5zR -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2390 - [SUSE] slurm: CVSS (Max): 9.9

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2390 Security update for slurm 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: slurm Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29501 CVE-2022-29500 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221666-1 Comment: CVSS (Max): 9.9 CVE-2022-29500 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for slurm ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1666-1 Rating: important References: #1199278 #1199279 Cross-References: CVE-2022-29500 CVE-2022-29501 Affected Products: SUSE Linux Enterprise Module for HPC 15-SP3 SUSE Linux Enterprise Module for HPC 15-SP4 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for slurm fixes the following issues: o CVE-2022-29500: Fixed architectural flaw that could have been exploited to allow an unprivileged user to execute arbitrary processes as root (bsc# 1199278). o CVE-2022-29501: Fixed a problem that an unprivileged user could have sent data to arbitrary unix socket as root (bsc#1199279). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1666=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1666=1 o SUSE Linux Enterprise Module for HPC 15-SP4: zypper in -t patch SUSE-SLE-Module-HPC-15-SP4-2022-1666=1 o SUSE Linux Enterprise Module for HPC 15-SP3: zypper in -t patch SUSE-SLE-Module-HPC-15-SP3-2022-1666=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): libnss_slurm2-20.11.9-150300.4.6.1 libnss_slurm2-debuginfo-20.11.9-150300.4.6.1 libpmi0-20.11.9-150300.4.6.1 libpmi0-debuginfo-20.11.9-150300.4.6.1 libslurm36-20.11.9-150300.4.6.1 libslurm36-debuginfo-20.11.9-150300.4.6.1 perl-slurm-20.11.9-150300.4.6.1 perl-slurm-debuginfo-20.11.9-150300.4.6.1 slurm-20.11.9-150300.4.6.1 slurm-auth-none-20.11.9-150300.4.6.1 slurm-auth-none-debuginfo-20.11.9-150300.4.6.1 slurm-config-20.11.9-150300.4.6.1 slurm-config-man-20.11.9-150300.4.6.1 slurm-cray-20.11.9-150300.4.6.1 slurm-cray-debuginfo-20.11.9-150300.4.6.1 slurm-debuginfo-20.11.9-150300.4.6.1 slurm-debugsource-20.11.9-150300.4.6.1 slurm-devel-20.11.9-150300.4.6.1 slurm-doc-20.11.9-150300.4.6.1 slurm-hdf5-20.11.9-150300.4.6.1 slurm-hdf5-debuginfo-20.11.9-150300.4.6.1 slurm-lua-20.11.9-150300.4.6.1 slurm-lua-debuginfo-20.11.9-150300.4.6.1 slurm-munge-20.11.9-150300.4.6.1 slurm-munge-debuginfo-20.11.9-150300.4.6.1 slurm-node-20.11.9-150300.4.6.1 slurm-node-debuginfo-20.11.9-150300.4.6.1 slurm-openlava-20.11.9-150300.4.6.1 slurm-pam_slurm-20.11.9-150300.4.6.1 slurm-pam_slurm-debuginfo-20.11.9-150300.4.6.1 slurm-plugins-20.11.9-150300.4.6.1 slurm-plugins-debuginfo-20.11.9-150300.4.6.1 slurm-rest-20.11.9-150300.4.6.1 slurm-rest-debuginfo-20.11.9-150300.4.6.1 slurm-seff-20.11.9-150300.4.6.1 slurm-sjstat-20.11.9-150300.4.6.1 slurm-slurmdbd-20.11.9-150300.4.6.1 slurm-slurmdbd-debuginfo-20.11.9-150300.4.6.1 slurm-sql-20.11.9-150300.4.6.1 slurm-sql-debuginfo-20.11.9-150300.4.6.1 slurm-sview-20.11.9-150300.4.6.1 slurm-sview-debuginfo-20.11.9-150300.4.6.1 slurm-torque-20.11.9-150300.4.6.1 slurm-torque-debuginfo-20.11.9-150300.4.6.1 slurm-webdoc-20.11.9-150300.4.6.1 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libnss_slurm2-20.11.9-150300.4.6.1 libnss_slurm2-debuginfo-20.11.9-150300.4.6.1 libpmi0-20.11.9-150300.4.6.1 libpmi0-debuginfo-20.11.9-150300.4.6.1 libslurm36-20.11.9-150300.4.6.1 libslurm36-debuginfo-20.11.9-150300.4.6.1 perl-slurm-20.11.9-150300.4.6.1 perl-slurm-debuginfo-20.11.9-150300.4.6.1 slurm-20.11.9-150300.4.6.1 slurm-auth-none-20.11.9-150300.4.6.1 slurm-auth-none-debuginfo-20.11.9-150300.4.6.1 slurm-config-20.11.9-150300.4.6.1 slurm-config-man-20.11.9-150300.4.6.1 slurm-cray-20.11.9-150300.4.6.1 slurm-cray-debuginfo-20.11.9-150300.4.6.1 slurm-debuginfo-20.11.9-150300.4.6.1 slurm-debugsource-20.11.9-150300.4.6.1 slurm-devel-20.11.9-150300.4.6.1 slurm-doc-20.11.9-150300.4.6.1 slurm-hdf5-20.11.9-150300.4.6.1 slurm-hdf5-debuginfo-20.11.9-150300.4.6.1 slurm-lua-20.11.9-150300.4.6.1 slurm-lua-debuginfo-20.11.9-150300.4.6.1 slurm-munge-20.11.9-150300.4.6.1 slurm-munge-debuginfo-20.11.9-150300.4.6.1 slurm-node-20.11.9-150300.4.6.1 slurm-node-debuginfo-20.11.9-150300.4.6.1 slurm-openlava-20.11.9-150300.4.6.1 slurm-pam_slurm-20.11.9-150300.4.6.1 slurm-pam_slurm-debuginfo-20.11.9-150300.4.6.1 slurm-plugins-20.11.9-150300.4.6.1 slurm-plugins-debuginfo-20.11.9-150300.4.6.1 slurm-rest-20.11.9-150300.4.6.1 slurm-rest-debuginfo-20.11.9-150300.4.6.1 slurm-seff-20.11.9-150300.4.6.1 slurm-sjstat-20.11.9-150300.4.6.1 slurm-slurmdbd-20.11.9-150300.4.6.1 slurm-slurmdbd-debuginfo-20.11.9-150300.4.6.1 slurm-sql-20.11.9-150300.4.6.1 slurm-sql-debuginfo-20.11.9-150300.4.6.1 slurm-sview-20.11.9-150300.4.6.1 slurm-sview-debuginfo-20.11.9-150300.4.6.1 slurm-torque-20.11.9-150300.4.6.1 slurm-torque-debuginfo-20.11.9-150300.4.6.1 slurm-webdoc-20.11.9-150300.4.6.1 o SUSE Linux Enterprise Module for HPC 15-SP4 (aarch64 x86_64): libnss_slurm2-20.11.9-150300.4.6.1 libnss_slurm2-debuginfo-20.11.9-150300.4.6.1 libpmi0-20.11.9-150300.4.6.1 libpmi0-debuginfo-20.11.9-150300.4.6.1 libslurm36-20.11.9-150300.4.6.1 libslurm36-debuginfo-20.11.9-150300.4.6.1 perl-slurm-20.11.9-150300.4.6.1 perl-slurm-debuginfo-20.11.9-150300.4.6.1 slurm-20.11.9-150300.4.6.1 slurm-auth-none-20.11.9-150300.4.6.1 slurm-auth-none-debuginfo-20.11.9-150300.4.6.1 slurm-config-20.11.9-150300.4.6.1 slurm-config-man-20.11.9-150300.4.6.1 slurm-cray-20.11.9-150300.4.6.1 slurm-cray-debuginfo-20.11.9-150300.4.6.1 slurm-debuginfo-20.11.9-150300.4.6.1 slurm-debugsource-20.11.9-150300.4.6.1 slurm-devel-20.11.9-150300.4.6.1 slurm-doc-20.11.9-150300.4.6.1 slurm-lua-20.11.9-150300.4.6.1 slurm-lua-debuginfo-20.11.9-150300.4.6.1 slurm-munge-20.11.9-150300.4.6.1 slurm-munge-debuginfo-20.11.9-150300.4.6.1 slurm-node-20.11.9-150300.4.6.1 slurm-node-debuginfo-20.11.9-150300.4.6.1 slurm-pam_slurm-20.11.9-150300.4.6.1 slurm-pam_slurm-debuginfo-20.11.9-150300.4.6.1 slurm-plugins-20.11.9-150300.4.6.1 slurm-plugins-debuginfo-20.11.9-150300.4.6.1 slurm-rest-20.11.9-150300.4.6.1 slurm-rest-debuginfo-20.11.9-150300.4.6.1 slurm-slurmdbd-20.11.9-150300.4.6.1 slurm-slurmdbd-debuginfo-20.11.9-150300.4.6.1 slurm-sql-20.11.9-150300.4.6.1 slurm-sql-debuginfo-20.11.9-150300.4.6.1 slurm-sview-20.11.9-150300.4.6.1 slurm-sview-debuginfo-20.11.9-150300.4.6.1 slurm-torque-20.11.9-150300.4.6.1 slurm-torque-debuginfo-20.11.9-150300.4.6.1 slurm-webdoc-20.11.9-150300.4.6.1 o SUSE Linux Enterprise Module for HPC 15-SP3 (aarch64 x86_64): libnss_slurm2-20.11.9-150300.4.6.1 libnss_slurm2-debuginfo-20.11.9-150300.4.6.1 libpmi0-20.11.9-150300.4.6.1 libpmi0-debuginfo-20.11.9-150300.4.6.1 libslurm36-20.11.9-150300.4.6.1 libslurm36-debuginfo-20.11.9-150300.4.6.1 perl-slurm-20.11.9-150300.4.6.1 perl-slurm-debuginfo-20.11.9-150300.4.6.1 slurm-20.11.9-150300.4.6.1 slurm-auth-none-20.11.9-150300.4.6.1 slurm-auth-none-debuginfo-20.11.9-150300.4.6.1 slurm-config-20.11.9-150300.4.6.1 slurm-config-man-20.11.9-150300.4.6.1 slurm-debuginfo-20.11.9-150300.4.6.1 slurm-debugsource-20.11.9-150300.4.6.1 slurm-devel-20.11.9-150300.4.6.1 slurm-doc-20.11.9-150300.4.6.1 slurm-lua-20.11.9-150300.4.6.1 slurm-lua-debuginfo-20.11.9-150300.4.6.1 slurm-munge-20.11.9-150300.4.6.1 slurm-munge-debuginfo-20.11.9-150300.4.6.1 slurm-node-20.11.9-150300.4.6.1 slurm-node-debuginfo-20.11.9-150300.4.6.1 slurm-pam_slurm-20.11.9-150300.4.6.1 slurm-pam_slurm-debuginfo-20.11.9-150300.4.6.1 slurm-plugins-20.11.9-150300.4.6.1 slurm-plugins-debuginfo-20.11.9-150300.4.6.1 slurm-rest-20.11.9-150300.4.6.1 slurm-rest-debuginfo-20.11.9-150300.4.6.1 slurm-slurmdbd-20.11.9-150300.4.6.1 slurm-slurmdbd-debuginfo-20.11.9-150300.4.6.1 slurm-sql-20.11.9-150300.4.6.1 slurm-sql-debuginfo-20.11.9-150300.4.6.1 slurm-sview-20.11.9-150300.4.6.1 slurm-sview-debuginfo-20.11.9-150300.4.6.1 slurm-torque-20.11.9-150300.4.6.1 slurm-torque-debuginfo-20.11.9-150300.4.6.1 slurm-webdoc-20.11.9-150300.4.6.1 References: o https://www.suse.com/security/cve/CVE-2022-29500.html o https://www.suse.com/security/cve/CVE-2022-29501.html o https://bugzilla.suse.com/1199278 o https://bugzilla.suse.com/1199279 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL17ckNZI30y1K9AQj0lA/+NarnmekvPIsGBoBF0+wX31uH3u6I/gom oE4r7AMxvjGHCO3lZeJSEe+7VaO/VOYLGf9jm42Y0xQNYQNbQDeWSpgZUGJZOqci atpSE7BL7YbRLd9QUEY0EDagq/Yx8c3dhwu4GAy7qMFJwVngIf4rO+iw1Yi5en6J 65q3hEOn5Xfk99tmy5F5/qZXv45OwBvDOUl9ZMVKeKpMUxwwS1eJ/ExEIIj9EEtw lFzdbgGtDBlmbiGJ8M3lb19dwkZmmooVb2e+pReTxBMic/isrKjd/RAL2X6hMrVE 4JAVTfhhcJp0sKFPUdJgI/H7p4EwoJE45lvn91GT/FpBOc3O6IATIKg0N02b8uLU wZieLcD+uSirm7FQIe9Ra9tlXnG0YiS8kYqYmjibIy/caKL3/eG4Y6EQGXTtWtch qzxHpRbBTnPXw69Fn6d9jvmTH42C6uNkL3r3fkf+MhnCifL10pboxbs4jn/oEAXv S3Lh+9LUay8J9jiqpzXol8BO/dcfUnopz2hHo9cDZrdVU18XzPu7A5nl7SESrK/a b2/w3tL29VanLJl3V1f6DKlL9LOy8TiwExa8k10Sj6u08Kkl4XsCkLEvw91yjD2X h1yqd8DmLLY9q7hNtS5N9v/RJBYvwCZT6SDc27RvCN06qP+BPOReHUB+mShMQKEZ JfcYvHvcaFE= =bZGh -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2389 - [SUSE] podofo: CVSS (Max): 5.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2389 Security update for podofo 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: podofo Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2019-20093 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221690-1 Comment: CVSS (Max): 5.5 CVE-2019-20093 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for podofo ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1690-1 Rating: moderate References: #1159921 Cross-References: CVE-2019-20093 Affected Products: SUSE Linux Enterprise Desktop 12-SP5 SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Workstation Extension 12-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for podofo fixes the following issues: o CVE-2019-20093: Fixed an invalid memory access that could cause an application crash (bsc#1159921). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2022-1690=1 o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1690=1 Package List: o SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): libpodofo0_9_2-0.9.2-3.12.1 libpodofo0_9_2-debuginfo-0.9.2-3.12.1 podofo-debuginfo-0.9.2-3.12.1 podofo-debugsource-0.9.2-3.12.1 o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): libpodofo-devel-0.9.2-3.12.1 podofo-debuginfo-0.9.2-3.12.1 podofo-debugsource-0.9.2-3.12.1 References: o https://www.suse.com/security/cve/CVE-2019-20093.html o https://bugzilla.suse.com/1159921 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL118kNZI30y1K9AQiKqhAAkYDf5iY4TB/ezqzEm9qdEYMHwjouV2Ta 9YdmrYrb9+a2tfFJOkohL4te0QWP50JM1Fc09zhch6e/KaotWaRkazxpeH3PGj9U 7/wc5CRkz8iic7c4UDxyR/kwOZ37nkbI8y5eHX522GGmKM192moYnuqzMsNOPN+S LVSZU7peP28hUChWdYCffhzgk3C7PXws4h2gJbWSwjsuLJYsoVVSENZ64uaP7wgd 1Yj7mqpkRlJtFlcr+BVKdZRQwlsXjFVWY2TcP47tzL2a/4rifGLt6rfBRq9cFAzg wOsGMGiEPifDP+w4Yk44cWaprfKACDjqJN9pTYzI7VYTUpwO+VcOMTOb90Ix9YO2 WjuqiWgPgEhdGGCfmCByr0s8hECiT7xq02aBSX6i39O6TqGZsh1HAqdRN1ehyvvK 14WBjbSEeDshzxP1o0nUqJKNk+gwY+YT9Y8AZUyTHlIiHH6v63NaU7VZxVDHj8fK RlqiXLoYGiNEscdPgzhjNo/ghL+SdN7uTNCFeH5ktdXrTeB95N/BCRBM9XU0Z7ki Mtqua7Q4cC9tjmZvUa8J9w4JocJKjHZStDv23YY2Bevs04NoAJ1Q+R+cvFaOWm+H yYUc3zWWEdlAPBZCcvRXcToKeyy/bzmYGwVB7wDKdS20IzWSbPzbwN2sGXtWAZgJ vx1/bQtsVx4= =geVU -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2388 - [SUSE] openldap2: CVSS (Max): 9.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2388 Security update for openldap2 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openldap2 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29155 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221671-1 Comment: CVSS (Max): 9.4 CVE-2022-29155 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1671-1 Rating: important References: #1198383 #1199240 Cross-References: CVE-2022-29155 Affected Products: HPE Helion Openstack 8 SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server for SAP 12-SP3 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud Crowbar 8 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for openldap2 fixes the following issues: o CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240). o Fixed issue with SASL init that crashed slapd at startup under certain conditions (bsc#1198383). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud Crowbar 8: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-1671=1 o SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2022-1671=1 o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1671=1 o SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1671=1 o SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-1671=1 o SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1671=1 o HPE Helion Openstack 8: zypper in -t patch HPE-Helion-OpenStack-8-2022-1671=1 Package List: o SUSE OpenStack Cloud Crowbar 8 (noarch): openldap2-doc-2.4.41-18.89.1 o SUSE OpenStack Cloud Crowbar 8 (x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o SUSE OpenStack Cloud 8 (noarch): openldap2-doc-2.4.41-18.89.1 o SUSE OpenStack Cloud 8 (x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (x86_64): libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch): openldap2-doc-2.4.41-18.89.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x x86_64): libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch): openldap2-doc-2.4.41-18.89.1 o SUSE Linux Enterprise Server 12-SP3-BCL (noarch): openldap2-doc-2.4.41-18.89.1 o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 o SUSE Linux Enterprise Server 12-SP2-BCL (noarch): openldap2-doc-2.4.41-18.89.1 o HPE Helion Openstack 8 (x86_64): libldap-2_4-2-2.4.41-18.89.1 libldap-2_4-2-32bit-2.4.41-18.89.1 libldap-2_4-2-debuginfo-2.4.41-18.89.1 libldap-2_4-2-debuginfo-32bit-2.4.41-18.89.1 openldap2-2.4.41-18.89.1 openldap2-back-meta-2.4.41-18.89.1 openldap2-back-meta-debuginfo-2.4.41-18.89.1 openldap2-client-2.4.41-18.89.1 openldap2-client-debuginfo-2.4.41-18.89.1 openldap2-debuginfo-2.4.41-18.89.1 openldap2-debugsource-2.4.41-18.89.1 openldap2-ppolicy-check-password-1.2-18.89.1 openldap2-ppolicy-check-password-debuginfo-1.2-18.89.1 o HPE Helion Openstack 8 (noarch): openldap2-doc-2.4.41-18.89.1 References: o https://www.suse.com/security/cve/CVE-2022-29155.html o https://bugzilla.suse.com/1198383 o https://bugzilla.suse.com/1199240 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1yMkNZI30y1K9AQgddw/7BaBqwThNEVVsSsrY68kgEsuVHzrcYySM Sy3scCPX66/Tri6sqiFLs8NcMIxYVzCtPLpTNCxPklKWQq3DAXCfvW7zKjVe92VP ncHWwmijBufhadBaWmQgeYDob8s6h1QCeMmRvjZSPP5k8qI55koj90BJX9RyEmwm g9iZIxHdCKO7VWU4Bhz/IDiaxdCgZJyGQgN30zQfdhToeB690oWsMDBOQQR54Um9 a9eeNbx7TX+IX4Wdt9GBKWUSO2c4om53fleajRfF+xOgJiKRIcjC9tl1RvwAvVNH O5nqojp8lNTJeyxM9XH5qPpzuIkVhGnWbj5UMcMcW+9kioaKaRoY1KdgUzl6GKwD xm8Dt3jNwb0b5Alx2Mhyg7NoMwryj5bW0u7pg1OZ0a41JSo6t8dcvCU+28E3ZYlg QFD6kzaKGosceYI0yGwBoR4HAVq6jQJ5S1OMZPVs3lv8QRSP+DBlkQXsGA+3rWOe k8lVJUwCNSWy9lLiSCYMHopGxsEKkslglnvbzjf6Ekov5CHuwl7m84jlCeYxoVBZ RIoOt05WLgf+j9YTLJ9/ExsqITWIyFHI3tNfVARRY/DIAPxpV0fDSSpmbhD8c1ag w3ElcMQmh/WZewsvcMwsslsHQ1gHWnM0CvdYC1AUUE3v8KYHe9dBi9qdZX8ETQhb AmOxhTuqpv0= =YAG/ -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2387 - [SUSE] openldap2: CVSS (Max): 9.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2387 Security update for openldap2 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openldap2 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29155 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221685-1 Comment: CVSS (Max): 9.4 CVE-2022-29155 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1685-1 Rating: important References: #1199240 Cross-References: CVE-2022-29155 Affected Products: SUSE Linux Enterprise High Performance Computing SUSE Linux Enterprise Module for Legacy Software 12 SUSE Linux Enterprise Server SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE Linux Enterprise Server for SAP 12-SP5 SUSE Linux Enterprise Server for SAP Applications ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for openldap2 fixes the following issues: o CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 12-SP5: zypper in -t patch SUSE-SLE-SAP-12-SP5-2022-1685=1 o SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-1685=1 o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1685=1 o SUSE Linux Enterprise Module for Legacy Software 12: zypper in -t patch SUSE-SLE-Module-Legacy-12-2022-1685=1 Package List: o SUSE Linux Enterprise Server for SAP 12-SP5 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-42.1 compat-libldap-2_3-0-debuginfo-2.3.37-42.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-42.1 compat-libldap-2_3-0-debuginfo-2.3.37-42.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): compat-libldap-2_3-0-2.3.37-42.1 compat-libldap-2_3-0-debuginfo-2.3.37-42.1 o SUSE Linux Enterprise Module for Legacy Software 12 (aarch64 ppc64le s390x x86_64): compat-libldap-2_3-0-2.3.37-42.1 compat-libldap-2_3-0-debuginfo-2.3.37-42.1 References: o https://www.suse.com/security/cve/CVE-2022-29155.html o https://bugzilla.suse.com/1199240 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1uMkNZI30y1K9AQjvlw/9ET4V6gn8b7G18WP/u281pcseO6W1BVMQ 4wukPBZ59Ijkg3Vsp6Go0Y/9JuepDnveqWZ6ZI5eKiDs8YgjBvTAS8D235QhD1Kt aZX1AaOAvxn0VwtDeAT1D12PNLBhHxzqgYT9LPlE7F8MngiOB+4JJuBRh+t8EHLN wTZpngkzUvwEL8buCcWg2H3dWs75Q3uu0DWRZNanNQaEOhBi5Vy16/JbuwJjF96U AXE/kB7T3cim5r/c26wmYL9cAvSjVcJRh5v03XjQkbytNddPveMsFcWENeSGuQma Y0NJVcowM5ebpPvrVX4XExCw84YPmgBHk1WV8BaJBQ2A2BczOXzeYUoyaPgXDRDE LA2k5GF4x5/R4wmPqEPZ0+/rwNtlNgzs5FKkViRoNuGAvpjZOPbJ2WUUEEK+J2+Z v+h1S3+AoEIuToG5xPcgTm/zCJ3bdOI+Ym/wPYRcveInCFuA9lW0vl/SBVeLfZXk OmPTn55FtL4EV1MpF1J/hThL6Ins6jMTEGym8v04H90AaEi7QdSPxNtnZJdNr91C LawaHgSEQ2kkOl7i62gL9SzPXj75Fpxv+PWdC4KD7kEF/yDKNOmTJvuDf/4ZmdYI yD0YaiZmK6KpOXNLgDQDYiyWMhuhN2TIfDw6QDaii9PUCxYtA0qpTnEyAOyENrnR XUuQilQU2J4= =11gl -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2386 - [SUSE] openldap2: CVSS (Max): 9.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2386 Security update for openldap2 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: openldap2 Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-29155 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221670-1 Comment: CVSS (Max): 9.4 CVE-2022-29155 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for openldap2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1670-1 Rating: important References: #1199240 Cross-References: CVE-2022-29155 Affected Products: SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP4 SUSE Linux Enterprise Module for Legacy Software 15-SP3 SUSE Linux Enterprise Server SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for openldap2 fixes the following issues: o CVE-2022-29155: Fixed SQL injection in back-sql (bsc#1199240). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1670=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1670=1 o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1670=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1670=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1670=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1670=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1670=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1670=1 o SUSE Linux Enterprise Module for Legacy Software 15-SP3: zypper in -t patch SUSE-SLE-Module-Legacy-15-SP3-2022-1670=1 o SUSE Linux Enterprise Module for Development Tools 15-SP4: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1670=1 o SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1670=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1670=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1670=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1670=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1670=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1670=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1670=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-1670=1 Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-back-sock-2.4.46-150200.14.8.1 openldap2-back-sock-debuginfo-2.4.46-150200.14.8.1 openldap2-back-sql-2.4.46-150200.14.8.1 openldap2-back-sql-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o openSUSE Leap 15.4 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o openSUSE Leap 15.4 (noarch): libldap-data-2.4.46-150200.14.8.1 openldap2-doc-2.4.46-150200.14.8.1 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-back-sock-2.4.46-150200.14.8.1 openldap2-back-sock-debuginfo-2.4.46-150200.14.8.1 openldap2-back-sql-2.4.46-150200.14.8.1 openldap2-back-sql-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o openSUSE Leap 15.3 (noarch): libldap-data-2.4.46-150200.14.8.1 openldap2-doc-2.4.46-150200.14.8.1 o openSUSE Leap 15.3 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Manager Server 4.1 (ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Manager Server 4.1 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Manager Server 4.1 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Manager Retail Branch Server 4.1 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Manager Proxy 4.1 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Manager Proxy 4.1 (x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Server 15-SP2-BCL (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Legacy Software 15-SP3 (aarch64 ppc64le s390x x86_64): openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Linux Enterprise Module for Development Tools 15-SP4 (x86_64): openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (x86_64): openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Micro 5.2 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 o SUSE Linux Enterprise Micro 5.1 (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch): libldap-data-2.4.46-150200.14.8.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): libldap-2_4-2-2.4.46-150200.14.8.1 libldap-2_4-2-debuginfo-2.4.46-150200.14.8.1 openldap2-2.4.46-150200.14.8.1 openldap2-back-meta-2.4.46-150200.14.8.1 openldap2-back-meta-debuginfo-2.4.46-150200.14.8.1 openldap2-back-perl-2.4.46-150200.14.8.1 openldap2-back-perl-debuginfo-2.4.46-150200.14.8.1 openldap2-client-2.4.46-150200.14.8.1 openldap2-client-debuginfo-2.4.46-150200.14.8.1 openldap2-contrib-2.4.46-150200.14.8.1 openldap2-contrib-debuginfo-2.4.46-150200.14.8.1 openldap2-debuginfo-2.4.46-150200.14.8.1 openldap2-debugsource-2.4.46-150200.14.8.1 openldap2-devel-2.4.46-150200.14.8.1 openldap2-devel-static-2.4.46-150200.14.8.1 openldap2-ppolicy-check-password-1.2-150200.14.8.1 openldap2-ppolicy-check-password-debuginfo-1.2-150200.14.8.1 o SUSE Enterprise Storage 7 (x86_64): libldap-2_4-2-32bit-2.4.46-150200.14.8.1 libldap-2_4-2-32bit-debuginfo-2.4.46-150200.14.8.1 openldap2-devel-32bit-2.4.46-150200.14.8.1 o SUSE Enterprise Storage 7 (noarch): libldap-data-2.4.46-150200.14.8.1 References: o https://www.suse.com/security/cve/CVE-2022-29155.html o https://bugzilla.suse.com/1199240 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1oskNZI30y1K9AQivqQ//WfftGffDsDPOIc6ir/ne4QtuR3PQGl76 sSrlmdJnjac2LdRSRuk96vV6MmoPbSELfF/+qqAzUTLVcZg5l9tx84juKQWDzXcH n5pp4OeOIsGr8VfsjO++4tMvwu68S3XFSxEq3/HA2yCFCQP9Ws5uGWYduozRFbLQ mGG7ODUtPfrH5HcI12H7pNsfjigypJsd1ZJauTZILuy8uV/IRJYszD9OeQ+kMouo CWl/zLwZKOqpYUaj2jJOKKD6aGrN4RQC5ik8dyIe5R8W6cwTkcptVnIx9bL6k0G9 LPhndVdv3gKDpBfZz3vA6gb/pNnVv4TS1v1PN4I3qEZIL/BkxRj7whInbS6NWg23 MgSg/7/lARjEM3bmslhB67xX5weE/YnZ9UkiuSu/L+jr91TAIT/l3j+iw5ntejKd XiEdnVkVZY8ISzxzouuDOKfTrQt55C9vUPVucYp9vXgYAU+1/+i0sweRl3/jbMRR lw6FS/MvYqhlKmMjbT9XXMhfOPjG5ckRnWUcCsotZ1bDEWpxIUHeuCYyYNftjeUa Kt4uZ5u+Fsk/AGzImPKeSMswxkK6Kyf3BEfNxvaAKvq3j/984Px5mTzHP+JXkJaN KglDLSwn+kOP5we91yE0obZzULJJ8mutPTnQV7K2w3h/FJXHcxlX6q2p/GaJZmpI 6ExlJmq4TAA= =VYcS -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2385 - [SUSE] jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2385 Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2020-36518 CVE-2020-28491 CVE-2020-25649 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221678-1 Comment: CVSS (Max): 7.5 CVE-2020-36518 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1678-1 Rating: important References: #1177616 #1182481 #1197132 Cross-References: CVE-2020-25649 CVE-2020-28491 CVE-2020-36518 Affected Products: SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise Desktop 15-SP4 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Module for Basesystem 15-SP4 SUSE Linux Enterprise Module for Development Tools 15-SP3 SUSE Linux Enterprise Module for Development Tools 15-SP4 SUSE Linux Enterprise Module for SUSE Manager Server 4.3 SUSE Linux Enterprise Realtime Extension 15-SP2 SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 SUSE Manager Server 4.3 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues: Security issues fixed: o CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132) o CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616) o CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481) Non security fixes: jackson-annotations - update from version 2.10.2 to version 2.13.0: + Build with source/target levels 8 + Add 'mvnw' wrapper + 'JsonSubType.Type' should accept array of names + Jackson version alignment with Gradle 6 + Add '@JsonIncludeProperties' + Add '@JsonTypeInfo(use=DEDUCTION)' + Ability to use '@JsonAnyGetter' on fields + Add '@JsonKey' annotation + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping + Add 'namespace' property for '@JsonProperty' (for XML module) + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue' + 'JsonPattern.Value.pattern' retained as "", never (accidentally) exposed as 'null' + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven jackson-bom - update from version 2.10.2 to version 2.13.0: + Configure moditect plugin with ' 11 ' + jackson-bom manages the version of 'junit:junit' + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes) + Removed "jakarta" classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers) + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2) + Add (beta) version for 'jackson-dataformat-toml' + Jakarta 9 artifact versions are missing from jackson-bom + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata) + Add default settings for 'build-helper-maven-plugin' + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later) + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+ + Add missing version for jackson-datatype-eclipse-collections jackson-core - update from version 2.10.2 to version 2.13.0: + Build with source and target levels 8 + Misleading exception for input source when processing byte buffer with start offset + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()' + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException' + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/ 'currentTokenLocation()' in 'JsonParser' + Replace 'JsonGenerator.writeObject() ' (and related) with 'writePOJO()' + Replace 'getCurrentValue()'/ 'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 'JsonParser'/'JsonGenerator + Introduce O(n^1.5) BigDecimal parser implementation + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null + UTF32Reader ArrayIndexOutOfBoundsException + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset + Fix an issue with the TokenFilter unable to ignore properties when deserializing. + Optimize array allocation by 'JsonStringEncoder' + Add 'mvnw' wrapper + (partial) Optimize array allocation by 'JsonStringEncoder' + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' (like 'getJsonStringEncoder()') + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)' + Allow "optional-padding" for 'Base64Variant' + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion') + Publish Gradle Module Metadata + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements + Add 'JsonParser.isExpectedNumberIntToken()' convenience method + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering + Limit initial allocated block size by 'ByteArrayBuilder' to max block size + Add 'JacksonException' as parent class of 'JsonProcessingException' + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead) + Full "LICENSE" included in jar for easier access by compliancy tools + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator' + Add a String Array write method in the Streaming API + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber' + Add JsonGenerator#writeNumber(char[], int, int) method + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)' + Optionally allow leading decimal in float tokens + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens + Handle case when system property access is restricted + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)' + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads jackson-databind - update from version 2.10.5.1 to version 2.13.0: + '@JsonValue' with integer for enum does not deserialize correctly + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message + Add 'DatabindException' as intermediate subtype of 'JsonMappingException' + Jackson does not support deserializing new Java 9 unmodifiable collections + Allocate TokenBuffer instance via context objects (to allow format-specific buffer types) + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper' + Add 'DeserializationContext.readTreeAsValue()' methods for more convenient conversions for deserializers to use + Clean up support of typed "unmodifiable", "singleton" Maps/Sets/Collections + Extend internal bitfield of 'MapperFeature' to be 'long' + Add 'removeMixIn()' method in 'MapperBuilder' + Backport 'MapperBuilder' lambda-taking methods: 'withConfigOverride()', 'withCoercionConfig()', 'withCoercionConfigDefaults()' + configOverrides(boolean.class) silently ignored, whereas .configOverride (Boolean.class) works for both primitives and boxed boolean values + Dont track unknown props in buffer if 'ignoreAllUnknown' is true + Should allow deserialization of java.time types via opaque 'JsonToken.VALUE_EMBEDDED_OBJECT' + Optimize "AnnotatedConstructor.call()" case by passing explicit null + Add AnnotationIntrospector.XmlExtensions interface for decoupling javax dependencies + Custom SimpleModule not included in list returned by ObjectMapper.getRegisteredModuleIds() after registration + Use more limiting default visibility settings for JDK types (java.*, javax.*) + Deep merge for 'JsonNode' using 'ObjectReader.readTree()' + IllegalArgumentException: Conflicting setter definitions for property with more than 2 setters + Serializing java.lang.Thread fails on JDK 11 and above + String-based 'Map' key deserializer is not deterministic when there is no single arg constructor + Add ArrayNode#set(int index, primitive_type value) + JsonStreamContext "currentValue" wrongly references to '@JsonTypeInfo' annotated object + DOM 'Node' serialization omits the default namespace declaration + Support 'suppressed' property when deserializing 'Throwable' + 'AnnotatedMember.equals ()' does not work reliably + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module + For an absent property Jackson injects 'NullNode' instead of 'null' to a JsonNode-typed constructor argument of a '@ConstructorProperties'-annotated constructor + 'XMLGregorianCalendar' doesn't work with default typing + Content 'null' handling not working for root values + StdDeserializer rejects blank (all-whitespace) strings for ints + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with 'DefaultTypeResolverBuilder' + Add PropertyNamingStrategies.UpperSnakeCaseStrategy (and UPPER_SNAKE_CASE constant) + StackOverflowError when serializing JsonProcessingException + Support for BCP 47 'java.util.Locale' serialization/deserialization + String property deserializes null as "null" for JsonTypeInfo.As.EXISTING_PROPERTY + Can not deserialize json to enum value with Object-/Array-valued input, '@JsonCreator' + Fix to avoid problem with 'BigDecimalNode', scale of 'Integer.MIN_VALUE' + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover coercion from (Empty) String via 'AsNull' + Add 'mvnw' wrapper + (regression) Factory method generic type resolution does not use Class-bound type parameter + Deserialization of "empty" subtype with DEDUCTION failed + Merge findInjectableValues() results in AnnotationIntrospectorPair + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't work with empty strings + 'TypeFactory' cannot convert 'Collection' sub-type without type parameters to canonical form and back + Fix for [modules-java8#207]: prevent fail on secondary Java 8 date/time types + EXTERNAL_PROPERTY does not work well with '@JsonCreator' and 'FAIL_ON_UNKNOWN_PROPERTIES' + String property deserializes null as "null" for 'JsonTypeInfo.As.EXTERNAL_PROPERTY' + Property ignorals cause 'BeanDeserializer 'to forget how to read from arrays (not copying '_arrayDelegateDeserializer') + UntypedObjectDeserializer' mixes multiple unwrapped collections (related to #2733) + Two cases of incorrect error reporting about DeserializationFeature + Bug in polymorphic deserialization with '@JsonCreator', '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY' + Polymorphic subtype deduction ignores 'defaultImpl' attribute + MismatchedInputException: Cannot deserialize instance of 'com.fasterxml.jackson.databind.node.ObjectNode' out of VALUE_NULL token + Missing override for 'hasAsKey()' in 'AnnotationIntrospectorPair' + Creator lookup fails with 'InvalidDefinitionException' for conflict between single-double/single-Double arg constructor + 'MapDeserializer' forcing 'JsonMappingException' wrapping even if WRAP_EXCEPTIONS set to false + Auto-detection of constructor-based creator method skipped if there is an annotated factory-based creator method (regression from 2.11) + 'ObjectMapper.treeToValue()' no longer invokes 'JsonDeserializer.getNullValue() ' + DeserializationProblemHandler is not invoked when trying to deserialize String + Fix failing 'double' JsonCreators in jackson 2.12.0 + Conflicting in POJOPropertiesCollector when having namingStrategy + Breaking API change in 'BasicClassIntrospector' (2.12.0) + 'JsonNode.requiredAt()' does NOT fail on some path expressions + Exception thrown when 'Collections.synchronizedList()' is serialized with type info, deserialized + Add option to resolve type from multiple existing properties, '@JsonTypeInfo(use=DEDUCTION)' + '@JsonIgnoreProperties' does not prevent Exception Conflicting getter/setter definitions for property + Deserialization Not Working Right with Generic Types and Builders + Add '@JsonIncludeProperties(propertyNames)' (reverse of '@JsonIgnoreProperties') + '@JsonAnyGetter' should be allowed on a field + Allow handling of single-arg constructor as property based by default + Allow case insensitive deserialization of String value into 'boolean'/'Boolean' (esp for Excel) + Allow use of '@JsonFormat(with=JsonFormat.Feature .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class + Abstract class included as part of known type ids for error message when using JsonSubTypes + Distinguish null from empty string for UUID deserialization + 'ReferenceType' does not expose valid containedType + Add 'CoercionConfig[s]' mechanism for configuring allowed coercions + 'JsonProperty.Access.READ_ONLY' does not work with "getter-as-setter" 'Collection's + Support 'BigInteger' and 'BigDecimal' creators in 'StdValueInstantiator' + 'JsonProperty.Access.READ_ONLY' fails with collections when a property name is specified + 'BigDecimal' precision not retained for polymorphic deserialization + Support use of 'Void' valued properties ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES') + Explicitly fail (de)serialization of 'java.time.*' types in absence of registered custom (de) serializers + Improve description included in by 'DeserializationContext.handleUnexpectedToken()' + Support for JDK 14 record types ('java.lang.Record') + 'PropertyNamingStrategy' class initialization depends on its subclass, this can lead to class loading deadlock + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on 'READONLY' properties with an explicit name + Add Gradle Module Metadata for version alignment with Gradle 6 + Allow 'JsonNode' auto-convert into 'ArrayNode' if duplicates found (for XML) + Allow values of "untyped" auto-convert into 'List' if duplicates found (for XML) + Add 'ValueInstantiator.createContextual(...) + Support multiple names in 'JsonSubType.Type' + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic deserialization of Enums + Explicitly fail (de)serialization of 'org.joda.time.*' types in absence of registered custom (de)serializers + Trailing zeros are stripped when deserializing BigDecimal values inside a @JsonUnwrapped property + Extract getter/setter/field name mangling from 'BeanUtil' into pluggable 'AccessorNamingStrategy' + Throw 'InvalidFormatException' instead of 'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion failures + Add '@JsonKey' annotation (similar to '@JsonValue') for customizable serialization of Map keys + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should work for enum as keys + Add support for disabling special handling of "Creator properties" wrt alphabetic property ordering + Add 'JsonNode.canConvertToExactIntegral()' to indicate whether floating-point/BigDecimal values could be converted to integers losslessly + Improve static factory method generic type resolution logic + Allow preventing "Enum from integer" coercion using new 'CoercionConfig' system + '@JsonValue' not considered when evaluating inclusion + Make some java platform modules optional + Add support for serializing 'java.sql.Blob' + 'AnnotatedCreatorCollector' should avoid processing synthetic static (factory) methods + Add errorprone static analysis profile to detect bugs at build time + Problem with implicit creator name detection for constructor detection + Add 'BeanDeserializerBase.isCaseInsensitive()' + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues + Full "LICENSE" included in jar for easier access by compliancy tools + Fix type resolution for static methods (regression in 2.11.3) + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 'PropertyGenerator' + Add debug improvements about 'ClassUtil.getClassMethods()' + Cannot detect creator arguments of mixins for JDK types + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer') + Json serialization fails or a specific case that contains generics and static methods with generic parameters (2.11.1 -> 2.11.2 regression) + 'ObjectMapper.activateDefaultTypingAsProperty()' is not using parameter 'PolymorphicTypeValidator' + Problem deserialization "raw generic" fields (like 'Map') in 2.11.2 + Fix issues with 'MapLikeType.isTrueMapType()', 'CollectionLikeType.isTrueCollectionType()' + Parser/Generator features not set when using 'ObjectMapper.createParser()', 'createGenerator()' + Polymorphic subtypes not registering on copied ObjectMapper (2.11.1) + Failure to read AnnotatedField value in Jackson 2.11 + 'TypeFactory.constructType()' does not take 'TypeBindings' correctly + Builder Deserialization with JsonCreator Value vs Array + JsonCreator on static method in Enum and Enum used as key in map fails randomly + 'StdSubtypeResolver' is not thread safe (possibly due to copy not being made with 'ObjectMapper.copy() ') + "Conflicting setter definitions for property" exception for 'Map' subtype during deserialization + Fail to deserialize local Records + Rearranging of props when property-based generator is in use leads to incorrect output + Jackson doesn't respect 'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer properties + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS' don't support 'Map' type field + JsonParser from MismatchedInputException cannot getText() for floating-point value + i-I case conversion problem in Turkish locale with case-insensitive deserialization + '@JsonInject' fails on trying to find deserializer even if inject-only + Polymorphic deserialization should handle case-insensitive Type Id property name if 'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled + TreeTraversingParser and UTF8StreamJsonParser create contexts differently + Support use of '@JsonAlias' for enum values + 'declaringClass' of "enum-as-POJO" not removed for 'ObjectMapper' with a naming strategy + Fix 'JavaType.isEnumType()' to support sub-classes + BeanDeserializerBuilder Protected Factory Method for Extension + Support '@JsonSerialize(keyUsing)' and '@JsonDeserialize(keyUsing)' on Key class + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL' + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't allow registering same POJO for two different type ids + 'DeserializationContext.handleMissingInstantiator()' throws 'MismatchedInputException' for non-static inner classes + Incorrect 'JsonStreamContext' for 'TokenBuffer' and 'TreeTraversingParser' + Add 'AnnotationIntrospector.findRenameByField()' to support Kotlin's "is-getter" naming convention + Use '@JsonProperty(index)' for sorting properties on serialization + Java 8 'Optional' not working with '@JsonUnwrapped' on unwrappable type + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES' to allow blocking use of unsafe base type for polymorphic deserialization + 'ObjectMapper.setSerializationInclusion()' is ignored for 'JsonAnyGetter' + 'ValueInstantiationException' when deserializing using a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS' + JsonIgnoreProperties(ignoreUnknown = true) does not work on field and method level + Failure to resolve generic type parameters on serialization + JsonParser cannot getText() for input stream on MismatchedInputException + ObjectReader readValue lacks Class argument + Change default textual serialization of 'java.util.Date'/'Calendar' to include colon in timezone offset + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods + Allow serialization of 'Properties' with non-String values + Add new factory method for creating custom 'EnumValues' to pass to 'EnumDeserializer + 'IllegalArgumentException' thrown for mismatched subclass deserialization + Add convenience methods for creating 'List', 'Map' valued 'ObjectReader's (ObjectMapper.readerForListOf()) + 'SerializerProvider.findContentValueSerializer()' methods jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0: + (cbor) Should validate UTF-8 multi-byte validity for short decode path too + (ion) Deprecate 'CloseSafeUTF8Writer', remove use + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES' + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES' + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer) + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer) + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient handling of broken Unicode surrogate pairs on writing + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule' for native ser/deser + Support base64 strings in 'getBinaryValue()' for CBOR and Smile + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name + (avro) Generate logicalType switch + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name + (ion) 'jackson-dataformat-ion' does not handle null.struct deserialization correctly + 'Ion-java' dep 1.4.0 -> 1.8.0 + Minor change to Ion module registration names (fully-qualified) + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer) + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer) + (smile) Uncaught validation problem wrt Smile "BigDecimal" type + (smile) ArrayIndexOutOfBoundsException for malformed Smile header + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE + (smile) Allocate byte[] lazily for longer Smile binary data payloads + (cbor) CBORParser need to validate zero-length byte[] for BigInteger + (smile) Handle invalid chunked-binary-format length gracefully + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded) + (smile) ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue() + (smile) Handle sequence of Smile header markers without recursion + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary) + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids when upgrading from 2.8 + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array) + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer' + (ion) Add support for generating IonSexps + (ion) Add support for deserializing IonTimestamps and IonBlobs + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' / '.builderforTextualWriters()' convenience methods + (ion) Enabling pretty-printing fails Ion serialization + (ion) Allow disabling native type ids in IonMapper + (smile) Small bug in byte-alignment for long field names in Smile, symbol table reuse + (ion) Add 'IonFactory.getIonSystem()' accessor + (ion) Optimize 'IonParser.getNumberType ()' using 'IonReader.getIntegerSize()' + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING' for lenient handling of Unicode surrogate pairs on writing + (cbor) Add support for decoding unassigned "simple values" (type 7) + Add Gradle Module Metadata (https://blog.gradle.org/ alignment-with-gradle-module-metadata) + (avro) Cache record names to avoid hitting class loader + (avro) Avro null deserialization + (ion) Add 'IonFactory.getIonSystem()' accessor + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to support binary writes, fix 'java.util.UUID' representation + (ion) Allow 'IonObjectMapper' with class name annotation introspector to deserialize generic subtypes + Remove dependencies upon Jackson 1.X and Avro's JacksonUtils + 'jackson-databind' should not be full dependency for (cbor, protobuf, smile) modules + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not write most compact form for all integers + 'AvroGenerator' overrides 'getOutputContext()' properly + (ion) Add 'IonFactory.getIonSystem()' accessor + (avro) Fix schema evolution involving maps of non-scalar + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily + ion-java dependency 1.4.0 -> 1.5.1 Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1678=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1678=1 o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1678=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1678=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1678=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1678=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1678=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1678=1 o SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1678=1 o SUSE Linux Enterprise Module for SUSE Manager Server 4.3: zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2022-1678=1 o SUSE Linux Enterprise Module for Development Tools 15-SP4: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP4-2022-1678=1 o SUSE Linux Enterprise Module for Development Tools 15-SP3: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP3-2022-1678=1 o SUSE Linux Enterprise Module for Basesystem 15-SP4: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-1678=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1678=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1678=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1678=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-1678=1 Package List: o openSUSE Leap 15.4 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-annotations-javadoc-2.13.0-150200.3.6.1 jackson-bom-2.13.0-150200.3.3.1 jackson-core-2.13.0-150200.3.6.1 jackson-core-javadoc-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-databind-javadoc-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 jackson-dataformat-smile-2.13.0-150200.3.3.3 jackson-dataformats-binary-2.13.0-150200.3.3.3 jackson-dataformats-binary-javadoc-2.13.0-150200.3.3.3 o openSUSE Leap 15.3 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-annotations-javadoc-2.13.0-150200.3.6.1 jackson-bom-2.13.0-150200.3.3.1 jackson-core-2.13.0-150200.3.6.1 jackson-core-javadoc-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-databind-javadoc-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 jackson-dataformat-smile-2.13.0-150200.3.3.3 jackson-dataformats-binary-2.13.0-150200.3.3.3 jackson-dataformats-binary-javadoc-2.13.0-150200.3.3.3 o SUSE Manager Server 4.1 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Manager Retail Branch Server 4.1 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Manager Proxy 4.1 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Server for SAP 15-SP2 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Server 15-SP2-LTSS (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Server 15-SP2-BCL (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Realtime Extension 15-SP2 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Module for SUSE Manager Server 4.3 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 o SUSE Linux Enterprise Module for Development Tools 15-SP4 (noarch): jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Module for Development Tools 15-SP3 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-annotations-javadoc-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-core-javadoc-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-databind-javadoc-2.13.0-150200.3.9.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 o SUSE Enterprise Storage 7 (noarch): jackson-annotations-2.13.0-150200.3.6.1 jackson-core-2.13.0-150200.3.6.1 jackson-databind-2.13.0-150200.3.9.1 jackson-dataformat-cbor-2.13.0-150200.3.3.3 References: o https://www.suse.com/security/cve/CVE-2020-25649.html o https://www.suse.com/security/cve/CVE-2020-28491.html o https://www.suse.com/security/cve/CVE-2020-36518.html o https://bugzilla.suse.com/1177616 o https://bugzilla.suse.com/1182481 o https://bugzilla.suse.com/1197132 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1jckNZI30y1K9AQiQLxAAmcOjBkZk7HtZxy+J9oD3oRVwQ4ZriEFd MrUXZAq5ObJixfGxFpa7apHMtv7T1FQrLfYU9PL1kdIy/qamC0z9HKU5OhDDcncQ 6yUPpyK6tiuRCtpvY4iU0wKeSnXdjRMLPkuq/TirPvmXGoWKuAJdlI/ioI6D5HzP A2p6qEDXdorSero1BC+oNx91brDSl9WdskuUwQqJ5qGFqULPeNkMZiLmYQZvl0Fz acY684yffNOjxMXMXIArGTgecAgVIxijet47IM2OImbIBRAhQRWhLe0t7b8Of54N dEVQUViwVi9YY2n1vO3usjAbus9LEjLW+mrVDIIqxnYK1rjLPckhE4JxlDkS2jRI A3jb1moRTRhyqKMgK3dS8eM9c8ZYnkXPTLFndrzyeyif0yOA88zZ5mI/hgq5ACzI REiW51ST1bID69xr4Dao0ALllLWKiWrRkDvDLT8MV5mciUaR55K23LUDJVxko+o7 0L9EemPdXOCLYlixhmAW19hAbj46yarp9W4bwEVL9AFE6cJJn9sISijHp9lHbbA2 rZepGNq72nA42+BzzMlA62bIE7Q9ukhSDRG0Tjm4eElnAn3pNQy8qzVY2ENQZPh2 /pU277ZZrK3X+jj2dsH53Q27eiZe1Ca4xNR4+QCFs9fZphlXBL9ptfHsbahGbtLU eTOyfH2+O50= =lTt9 -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2384 - [SUSE] gzip: CVSS (Max): 8.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2384 Security update for gzip 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gzip Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1271 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221673-1 Comment: CVSS (Max): 8.4 CVE-2022-1271 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for gzip ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1673-1 Rating: important References: Affected Products: HPE Helion Openstack 8 SUSE Linux Enterprise Server 12-SP2-BCL SUSE Linux Enterprise Server 12-SP3-BCL SUSE Linux Enterprise Server 12-SP3-LTSS SUSE Linux Enterprise Server 12-SP4-LTSS SUSE Linux Enterprise Server for SAP 12-SP3 SUSE Linux Enterprise Server for SAP 12-SP4 SUSE OpenStack Cloud 8 SUSE OpenStack Cloud 9 SUSE OpenStack Cloud Crowbar 8 SUSE OpenStack Cloud Crowbar 9 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for gzip fixes the following issues: o CVE-2022-1271: Add hardening for zgrep. (bsc#1198062) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-1673=1 o SUSE OpenStack Cloud Crowbar 8: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2022-1673=1 o SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-1673=1 o SUSE OpenStack Cloud 8: zypper in -t patch SUSE-OpenStack-Cloud-8-2022-1673=1 o SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-1673=1 o SUSE Linux Enterprise Server for SAP 12-SP3: zypper in -t patch SUSE-SLE-SAP-12-SP3-2022-1673=1 o SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-1673=1 o SUSE Linux Enterprise Server 12-SP3-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2022-1673=1 o SUSE Linux Enterprise Server 12-SP3-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-1673=1 o SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-1673=1 o HPE Helion Openstack 8: zypper in -t patch HPE-Helion-OpenStack-8-2022-1673=1 Package List: o SUSE OpenStack Cloud Crowbar 9 (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE OpenStack Cloud Crowbar 8 (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE OpenStack Cloud 9 (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE OpenStack Cloud 8 (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 o HPE Helion Openstack 8 (x86_64): gzip-1.6-9.9.1 gzip-debuginfo-1.6-9.9.1 gzip-debugsource-1.6-9.9.1 References: - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1fMkNZI30y1K9AQjOdRAAivlcQ93Hop1aUi5yasWuoc3rzSov7I6Q aV4m38OJX1cqA+25JzRQhG5JjN5qZXYxVXx1njIFwfkqiOPtwmW/YswkYxS5/win jN4IUlWbBcmnnKi7SxNw90qEqqo2AkksPlFyUchdCj8eIlQf9QFmH5zfWMHn/WnA D1JgWzblm4F4HFDyBWQYmQEfVSJ3of4WRM1XEQVzq5fPLsvhYMQsxXrlMJSqUYqg nHxCtLypZYKX3OSDzKiLsMUdb34ueEXR9wKAeNCB0fxMhwVSQ6QGbIc1G7sx3z9R IDhlapwYswzB3tOmDB2QgtKdDMomDqzqPCjwWOt6yRMmghNt4VTl8EHsaeq0CiK3 Nol7EztPMr4JoUeSDf8vtMtjjhYQ/ZqR0k50FrZJrSvsM2Za4JyRN7nkOibrK2nr RBzXigS7WIy3ny8qyG2Nrudypjio2yEkSA2RDS4tt0Xwis8/wBwHui9SKVjIKmBy BzivnNDK/j4rKlDgE2cc/7BkNBdWPqKebihamIG587rOBf7jpRaZCYvmd6zyxBHL uxACBeqR+2qk5KI4zdNkLhhC3o846J5WPboslxjugBqlAEEA8Lh5rXdyfu4chE5M ne0ex5+OJjhP8MW1Lo68OPFOcm+xd6DggZSJ03x0v2Oj8q1Uv9g+cGDnMz3q8hyG qa61Uzlzxck= =e7tF -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2383 - [SUSE] gzip: CVSS (Max): 8.4

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2383 Security update for gzip 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gzip Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1271 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221674-1 Comment: CVSS (Max): 8.4 CVE-2022-1271 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for gzip ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1674-1 Rating: important References: Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 ______________________________________________________________________________ An update that contains security fixes can now be installed. Description: This update for gzip fixes the following issues: o CVE-2022-1271: Add hardening for zgrep. (bsc#1198062) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1674=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1674=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1674=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1674=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1674=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1674=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1674=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1674=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1674=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-1674=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 o SUSE CaaS Platform 4.0 (x86_64): gzip-1.10-150000.4.15.1 gzip-debuginfo-1.10-150000.4.15.1 gzip-debugsource-1.10-150000.4.15.1 References: - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1Q8kNZI30y1K9AQjt5xAApJrVFzcy/oazq1nujUcdUzHetqpKzMBf YYIQ6qEjV6QaQtusneLGqQ1jvMSXki3arbcIl8QGV5+84Pr/4qLvJUSLL4jQ1GIb K/XuQ6uigHSiXKV+5BLBlxst7zdjrVM+bq2CsxksPpt962oyaBdWkYOgRymDLg8n DTjzdlBFrHCeNXcMnGzdG7x4Mui0rGz/siRDmnN9OtPjprEG1OwMjOXaNcusUUEA Z/5s9tGdGp6DNVGYPNV/X/x0TAC1y3l3BtE34EUY8nCMruueKPaI++5AVK7iqe5K V4poMXg2lwmO/vzka5AH872DXgqzfxomAMdex/As6gBg3jNUSPI9vJ6OBw7bzpB9 YthRikFnTiJRcvGEj+jPe+QBkp1M/UfUPB/DMufFGWSMOjXVtCigtuQCB+SNVKhI Ur2q29rXF+CaQWTe6QMNn7I/6v1g4L9VjT5QC/XriirWHnL9XDAB+Yn5g3DuG+jz sXAf5VFl12IUZGeRLpVPNTiM9oRaV+ATARKNOs/hoNQmZM4R3kCYaoJKh54HmBn0 Bbe1mldlFSRYeL48NuKAcTNWCKyW7Cca65A3MZ4p3bipI+vk46CKZwrQPsTACNPy sQbIMUTlgiqxfAystHbCSxWJXUqI1j8jCvytO7H/xi08PkzkQbeVAOUIf0ncrO7G Y27uFCwdzxU= =hbjG -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2382 - [SUSE] e2fsprogs: CVSS (Max): 7.0

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2382 Security update for e2fsprogs 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: e2fsprogs Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-1304 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221688-1 Comment: CVSS (Max): 7.0 CVE-2022-1304 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for e2fsprogs ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1688-1 Rating: important References: #1198446 Cross-References: CVE-2022-1304 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Enterprise Storage 7 SUSE Linux Enterprise Desktop 15-SP3 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Micro 5.0 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Basesystem 15-SP3 SUSE Linux Enterprise Realtime Extension 15-SP2 SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 openSUSE Leap 15.3 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for e2fsprogs fixes the following issues: o CVE-2022-1304: Fixed out-of-bounds read/write leading to segmentation fault and possibly arbitrary code execution. (bsc#1198446) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1688=1 o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1688=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1688=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1688=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1688=1 o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1688=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1688=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1688=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1688=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1688=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1688=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1688=1 o SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-1688=1 o SUSE Linux Enterprise Module for Basesystem 15-SP3: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-1688=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1688=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1688=1 o SUSE Linux Enterprise Micro 5.0: zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1688=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1688=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-1688=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-1688=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o openSUSE Leap 15.3 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err-devel-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-32bit-1.43.8-150000.4.33.1 libext2fs2-32bit-1.43.8-150000.4.33.1 libext2fs2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Manager Server 4.1 (ppc64le s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Manager Server 4.1 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Manager Proxy 4.1 (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server for SAP 15 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Enterprise Storage 7 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 o SUSE Enterprise Storage 6 (x86_64): e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 o SUSE CaaS Platform 4.0 (x86_64): e2fsprogs-1.43.8-150000.4.33.1 e2fsprogs-32bit-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debuginfo-1.43.8-150000.4.33.1 e2fsprogs-debugsource-1.43.8-150000.4.33.1 e2fsprogs-devel-1.43.8-150000.4.33.1 libcom_err-devel-1.43.8-150000.4.33.1 libcom_err-devel-static-1.43.8-150000.4.33.1 libcom_err2-1.43.8-150000.4.33.1 libcom_err2-32bit-1.43.8-150000.4.33.1 libcom_err2-32bit-debuginfo-1.43.8-150000.4.33.1 libcom_err2-debuginfo-1.43.8-150000.4.33.1 libext2fs-devel-1.43.8-150000.4.33.1 libext2fs-devel-static-1.43.8-150000.4.33.1 libext2fs2-1.43.8-150000.4.33.1 libext2fs2-debuginfo-1.43.8-150000.4.33.1 References: o https://www.suse.com/security/cve/CVE-2022-1304.html o https://bugzilla.suse.com/1198446 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1MskNZI30y1K9AQi2TQ/9HaxxYDh3BFUD34Peu2+lEUVXPYFplIAS GwnIxT1oQdp5dDODjFwPaic1iI7iezvS65xE22vJb417gwF2XElx3QIklfR/DvIb K8UXG2CL0Nb2rKj32bqD16is5guZ1svrvnoDbMiD8iUvzsfRUiVL4oDqFqaLJe8N VI2Yq/2KZk1O1zgozHkZkCw1r3DWTcG53rP/g7rNZYZeJQLA251kF6SatR6tWK79 hai5cbxdEBPh7AtpwfCdsFdr4vsEFrKamiJB64SjMaVyJ8/uhmr1t6+1hSiraycz KnZ33MCbyuljUhNyVxaMTYpaXmUvxe82XMuWbeQNRu19siwr3szidpSm2jk32Dv8 WGE/4gaVUYvgUmXw+dw1gSUZ8HQR3Sr/2QEE8yO0lqNokBivDY13wGkq+ZVKJVhm CQ6WCgGjNhCAki+Lb7kPpYSWetCvfaajhvCQ3wgRtvQznXd+6bfFFg7Kv3gA3k1u ZmN64eY0sRUnzRdpWfsi7zo2kmnHRO7c9XPymyrCNdEP05BeFOeYF2ns34K4G9J2 MVp6fNoDxhiUO8fAvEcjRtcMN7mX+zE3mcQN299PoiwY+DVOSDwkDG/vZevf2Mgh F0g9u9ndB9PyWo5ZTL3DAg/9oi4haJf/0h+4Gf+pq9XPHDZ19x+W20q3vXfrXH5h lgYNvG/0JoY= =rYrw -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2381 - [SUSE] curl: CVSS (Max): 5.3

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2381 Security update for curl 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: curl Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-27776 CVE-2022-22576 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221680-1 Comment: CVSS (Max): 5.3 CVE-2022-27776 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1680-1 Rating: moderate References: #1198614 #1198766 Cross-References: CVE-2022-22576 CVE-2022-27776 Affected Products: SUSE Linux Enterprise Server 12-SP5 SUSE Linux Enterprise Server for SAP Applications 12-SP5 SUSE Linux Enterprise Software Development Kit 12-SP5 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for curl fixes the following issues: o CVE-2022-27776: Fixed Auth/cookie leak on redirect (bsc#1198766) o CVE-2022-22576: Fixed OAUTH2 bearer bypass in connection re-use (bsc# 1198614) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-1680=1 o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-1680=1 Package List: o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): curl-debuginfo-7.60.0-11.37.1 curl-debugsource-7.60.0-11.37.1 libcurl-devel-7.60.0-11.37.1 o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): curl-7.60.0-11.37.1 curl-debuginfo-7.60.0-11.37.1 curl-debugsource-7.60.0-11.37.1 libcurl4-7.60.0-11.37.1 libcurl4-debuginfo-7.60.0-11.37.1 o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64): libcurl4-32bit-7.60.0-11.37.1 libcurl4-debuginfo-32bit-7.60.0-11.37.1 References: o https://www.suse.com/security/cve/CVE-2022-22576.html o https://www.suse.com/security/cve/CVE-2022-27776.html o https://bugzilla.suse.com/1198614 o https://bugzilla.suse.com/1198766 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1IckNZI30y1K9AQi9mg//bduRmtMoPUDQAG5WHJlJvV2GyuEFsx75 hmEbK48uVKuLE6YEwaTpYHGpLK7YKNvdNhla6Hv3Xb+Yi6RgnzJ4zPeSs8nRmlk+ daJ0Z+9bPCVgjpVrlNsHeRTzYtRSKvNck9Jl+ro68th+HA0oUHuM1nzRQyxiMvLu KvRcz9747bVzhQn7OaqETeQc0iszm7+S7O2cAQkIU0a8altvqXjl3iNio9uBkiV6 xq4jvaIDAflhDpRuBw8dc4jdkQGWTjzU+Yj/lFxtWXAOi6yfkF0qHyO3fzDKilPU mGQ/m847F2A47hXKZCNIgryUW31SZLOPgH7gg0Hq8L7tHY8LvxKBI5O7IWdflHAA hFeBNlhpt21MsVEZoiGyhWVG//zlvfMj3PQPuSQ9+EO41lG+sg6eWgnUQyAC5JRX 5BC0u6p1Joys4H34cZJ9GW/YzDbm9hoDyvkx+8BX2qdzm1tSRe1mgpui6rZeAWWp uykyebDFuYdEvHQT4wYphK6uL2kLF7l4RzjNhpbkVJ3PFtLFN2b0DF5Eus7IUavk fAvdr9hkewgnAq7p3a26gn4++tNeE99qnUNyzBE+SMhs5uLoJDdnqcpjPcOgVk5B yjGEHsbBeY5xzLPAfsnhkiTPlwS9/RPWIiNYV1jGFwx0YcRZ3rbayf+uZANQ+ztZ njN9bmgZDro= =aNho -----END PGP SIGNATURE-----
2022. május 17.

ESB-2022.2380 - [SUSE] containerd, docker: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2380 Security update for containerd, docker 17 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: containerd, docker Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2022-27191 CVE-2022-24769 CVE-2022-23648 CVE-2021-43565 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-su-20221689-1 Comment: CVSS (Max): 7.5 CVE-2022-27191 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for containerd, docker ______________________________________________________________________________ Announcement ID: SUSE-SU-2022:1689-1 Rating: important References: #1193930 #1196441 #1197284 #1197517 Cross-References: CVE-2021-43565 CVE-2022-23648 CVE-2022-24769 CVE-2022-27191 Affected Products: SUSE CaaS Platform 4.0 SUSE Enterprise Storage 6 SUSE Enterprise Storage 7 SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise High Performance Computing 15-SP4 SUSE Linux Enterprise Micro 5.0 SUSE Linux Enterprise Micro 5.1 SUSE Linux Enterprise Micro 5.2 SUSE Linux Enterprise Module for Containers 15-SP3 SUSE Linux Enterprise Module for Containers 15-SP4 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server 15-SP1-BCL SUSE Linux Enterprise Server 15-SP1-LTSS SUSE Linux Enterprise Server 15-SP2-BCL SUSE Linux Enterprise Server 15-SP2-LTSS SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server 15-SP4 SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server for SAP 15-SP1 SUSE Linux Enterprise Server for SAP 15-SP2 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP4 SUSE Manager Proxy 4.1 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.1 SUSE Manager Server 4.1 SUSE Manager Server 4.2 openSUSE Leap 15.3 openSUSE Leap 15.4 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for containerd, docker fixes the following issues: o CVE-2022-24769: Fixed incorrect default inheritable capabilities (bsc# 1197517). o CVE-2022-23648: Fixed directory traversal issue (bsc#1196441). o CVE-2022-27191: Fixed a crash in a golang.org/x/crypto/ssh server (bsc# 1197284). o CVE-2021-43565: Fixed a panic in golang.org/x/crypto by empty plaintext packet (bsc#1193930). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-1689=1 o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-1689=1 o SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-1689=1 o SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-1689=1 o SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-1689=1 o SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-1689=1 o SUSE Linux Enterprise Server for SAP 15-SP1: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-1689=1 o SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-1689=1 o SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-1689=1 o SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-1689=1 o SUSE Linux Enterprise Server 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-1689=1 o SUSE Linux Enterprise Server 15-SP1-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-1689=1 o SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2022-1689=1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2022-1689= 1 o SUSE Linux Enterprise Module for Containers 15-SP4: zypper in -t patch SUSE-SLE-Module-Containers-15-SP4-2022-1689=1 o SUSE Linux Enterprise Module for Containers 15-SP3: zypper in -t patch SUSE-SLE-Module-Containers-15-SP3-2022-1689=1 o SUSE Linux Enterprise Micro 5.2: zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-1689=1 o SUSE Linux Enterprise Micro 5.1: zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-1689=1 o SUSE Linux Enterprise Micro 5.0: zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1689=1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2022-1689=1 o SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-1689=1 o SUSE Enterprise Storage 6: zypper in -t patch SUSE-Storage-6-2022-1689=1 o SUSE CaaS Platform 4.0: To install this update, use the SUSE CaaS Platform 'skuba' tool. I will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way. Package List: o openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 docker-kubic-20.10.14_ce-150000.163.1 docker-kubic-debuginfo-20.10.14_ce-150000.163.1 docker-kubic-kubeadm-criconfig-20.10.14_ce-150000.163.1 o openSUSE Leap 15.4 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 docker-fish-completion-20.10.14_ce-150000.163.1 docker-kubic-bash-completion-20.10.14_ce-150000.163.1 docker-kubic-fish-completion-20.10.14_ce-150000.163.1 docker-kubic-zsh-completion-20.10.14_ce-150000.163.1 docker-zsh-completion-20.10.14_ce-150000.163.1 o openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 docker-kubic-20.10.14_ce-150000.163.1 docker-kubic-debuginfo-20.10.14_ce-150000.163.1 docker-kubic-kubeadm-criconfig-20.10.14_ce-150000.163.1 o openSUSE Leap 15.3 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 docker-fish-completion-20.10.14_ce-150000.163.1 docker-kubic-bash-completion-20.10.14_ce-150000.163.1 docker-kubic-fish-completion-20.10.14_ce-150000.163.1 docker-kubic-zsh-completion-20.10.14_ce-150000.163.1 docker-zsh-completion-20.10.14_ce-150000.163.1 o SUSE Manager Server 4.1 (ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Manager Server 4.1 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Manager Retail Branch Server 4.1 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Manager Retail Branch Server 4.1 (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Manager Proxy 4.1 (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Manager Proxy 4.1 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15-SP2 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15-SP1 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server for SAP 15 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP2-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP2-BCL (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP1-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-SP1-BCL (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Server 15-LTSS (s390x): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (aarch64 ppc64le s390x x86_64): containerd-ctr-1.5.11-150000.68.1 o SUSE Linux Enterprise Module for Containers 15-SP4 (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Module for Containers 15-SP4 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Module for Containers 15-SP3 (aarch64 ppc64le s390x x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Module for Containers 15-SP3 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 docker-fish-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64): containerd-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64): containerd-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64): containerd-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Enterprise Storage 7 (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Enterprise Storage 7 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE Enterprise Storage 6 (aarch64 x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE Enterprise Storage 6 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 o SUSE CaaS Platform 4.0 (x86_64): containerd-1.5.11-150000.68.1 containerd-ctr-1.5.11-150000.68.1 docker-20.10.14_ce-150000.163.1 docker-debuginfo-20.10.14_ce-150000.163.1 o SUSE CaaS Platform 4.0 (noarch): docker-bash-completion-20.10.14_ce-150000.163.1 References: o https://www.suse.com/security/cve/CVE-2021-43565.html o https://www.suse.com/security/cve/CVE-2022-23648.html o https://www.suse.com/security/cve/CVE-2022-24769.html o https://www.suse.com/security/cve/CVE-2022-27191.html o https://bugzilla.suse.com/1193930 o https://bugzilla.suse.com/1196441 o https://bugzilla.suse.com/1197284 o https://bugzilla.suse.com/1197517 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoL1DskNZI30y1K9AQhfWw/+OmkPfe3Hak6lzLrN9l5/jk2MbhQcJnut XiiFCuYGoO6mc9MAQ19ZtLbeYwt2rXp8fz4FqoWAIhp6VV/I7xNzAUkMJI/CpjcX H3QxB3Q7TyATZTpmZaA9RuDLF6O7IO+a6BVGN8uFOkP1O2++E0J5vYlKQ6Nk8CQV jqDsufyFytyFayyTUrGHn3GQmCLONCLOaOQ1c4jFqAmyPYRogh+CseaYqvKdpfvX QuvxvRbje1OjBYA2NuM1SA37zP9X9AlmGd6JY1zKzlct+ZjtSaI0G3NW9vtruYYk UEo5P+cZCIomtMpSqxO6UZ6cJsd2gzftlseQeZ2G0MvqVEfM21gB1ihqFLOnkJdm cHjMJaJzU/XGwXdpsRCHJ0pSoScF49Q3CT0pw1Kcsnl04MrdVyzaSgXEg1GGRW8t FRZH/RO1AdDEcuIC+6zXsLcRDzDblXb7zWTppkIQSx8+wKRXycAl/IUo9G0j+7tI SPHadMPIBFdXu7PKKxQnPDbSRAJ+xkgRMrQF9KnJpqtV5BvDMCFSIJuGF5+Vwr+e D2MOEWnf6edB4wMQ3gUSUk4r52m6mL6cpK9AqkS6yQa8tzdeSgzb40cafZZLw6oH sxYgWd7zbQipG7vCkxzkEJnmVtqEUbW7iVpkIj7k/axGMVBX/769WiLnu75VPxwi JEp67JMtvYM= =dmlr -----END PGP SIGNATURE-----
2022. május 16.

ESB-2022.2379 - [Win][UNIX/Linux] Apache Tomcat: CVSS (Max): 8.6

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2379 CVE-2022-25762 Apache Tomcat - Request Mix-up 16 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apache Tomcat Publisher: Apache Software Foundation Operating System: Windows UNIX variants (UNIX, Linux, OSX) Resolution: Patch/Upgrade CVE Names: CVE-2022-25762 Original Bulletin: https://lists.apache.org/thread/6ckmjfb1k61dyzkto9vm2k5jvt4o7w7c Comment: CVSS (Max): 8.6 CVE-2022-25762 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L - --------------------------BEGIN INCLUDED TEXT-------------------- CVE-2022-25762 Apache Tomcat - Request Mix-up Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.20 Apache Tomcat 8.5.0 to 8.5.75 Description: If a web application sends a WebSocket message concurrently with the WebSocket connection closing, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case could cause the a pooled object to be placed in the pool twice. This could result in subsequent connections using the same object concurrently which could result in data being returned to the wrong use and/or other errors. Mitigation: Users of the affected versions should apply one of the following mitigations: - - Upgrade to Apache Tomcat 9.0.21 or later - - Upgrade to Apache Tomcat 8.5.76 or later History: 2022-05-12 Original advisory Credit: This issue was identified by the Apache Tomcat security team. References: [1] https://tomcat.apache.org/security-9.html [2] https://tomcat.apache.org/security-8.html - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoHiK8kNZI30y1K9AQhKnQ/8D1jwSZrjurUfBJhe1Zx/k5/FOgwQep+Y kl8TbII37PZMRWRuNJFctlBgNWuylyRMgOYHgKciDwOeCc+UPCkVFLqpnEGojcne KpooctAstXLlhcLrzBOiO8uZeuO5F43/jONK3Y+Th99nD4eyFj2as1q+w85fg8xL XgAHQw+ilGSbyz2FRUe88REdgFcZUegyZHlHQJlkjbyvWRt4w28DkjCwea8PWjZA PdnONKrCo2DKWjF3p1K3Nm7Ji3UxlA9uYuQMiAevK/hZfpProRDF8vae0j9I6vta SLvv7uPKbF8ohim53qSD4ui77UoHJGUXfzljpFCSOQVkaTYDpOFNVenb48ifQH4/ W7RbhmuTRc68Zaymubx7nulymY2+G7D2YFFG3H3iU3oIgmx6thpWoF911M09HxKK 7m/uCfpwiUmKsp5wJUksQtU7XjbwIOPJpGnC483m54ZrAoDBbVnHyIxSTGM3CPXs TOjUwe5CTHe0nBCmrRDNW9EEWx3arKHg3n2YSyvjrJMQbL/R/GtXrmK4qmduLuhQ +JobbKBVktoXwwYeSil2nptr2bj2nPme5ThoLJDqQ64LQs8yjmUq+3iRCorcQHft wogyMZ2OTj4Ds1JpxjXNFZBDpR7139SdsWTmHjw5qULqLL5AXzPxT6j5QlOrBOhX 8IjXlxYfEjM= =KEis -----END PGP SIGNATURE-----
2022. május 16.

ESB-2022.2378 - [Win][Linux][IBM i][HP-UX][Solaris][AIX][Mac] WebSphere Application Server: CVSS (Max): 3.1

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2378 Security Bulletin: IBM WebSphere Application Server Liberty is vulnerable to an Information Disclosure (CVE-2022-22393) 16 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WebSphere Application Server Publisher: IBM Operating System: Windows Linux variants HP-UX AIX IBM i Solaris macOS z/OS Resolution: Patch/Upgrade CVE Names: CVE-2022-22393 Original Bulletin: https://www.ibm.com/support/pages/node/6585704 Comment: CVSS (Max): 3.1 CVE-2022-22393 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) CVSS Source: IBM Calculator: https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N - --------------------------BEGIN INCLUDED TEXT-------------------- IBM WebSphere Application Server Liberty is vulnerable to an Information Disclosure (CVE-2022-22393) Document Information Document number : 6585704 Modified date : 12 May 2022 Product : WebSphere Application Server Component : Liberty Software version : Liberty Operating system(s): AIX HP-UX IBM i Linux Solaris Windows z/OS Mac OS Edition : Liberty Summary IBM WebSphere Application Server Liberty is vulnerable to an information disclosure with the adminCenter-1.0 feature enabled. This has been addressed. Vulnerability Details CVEID: CVE-2022-22393 DESCRIPTION: IBM WebSphere Application Server Liberty, with the adminCenter-1.0 feature configured, could allow an authenticated user to issue a request to obtain the status of HTTP/HTTPS ports which are accessible by the application server. CVSS Base score: 3.1 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 222078 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N) Affected Products and Versions +----------------------------------------+-----------------+ |Affected Product(s) |Version(s) | +----------------------------------------+-----------------+ |IBM WebSphere Application Server Liberty|17.0.0.3-22.0.0.5| +----------------------------------------+-----------------+ Remediation/Fixes IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the APAR PH45086 . To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . For IBM WebSphere Application Server Liberty 17.0.0.3 - 22.0.0.5 using the adminCenter-1.0 feature: . Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH45086 - --OR-- . Apply Liberty Fix Pack 22.0.0.6 or later (targeted availability 2Q2022). Additional interim fixes may be available and linked off the interim fix download page. Workarounds and Mitigations None To determine if a feature is enabled for IBM WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . Change History 12 May 2022: Initial Publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoHKfckNZI30y1K9AQhgEg/9G0okGjpyHC7udOSyTXm6uN0JlrRJiX0/ JTSKibcU7tsf+RGrY5v7ja9Vv9YFMh/x4vTHJrPxepRCzny120M1G7LPMZ6UpKT/ lo0Iote8rCf5zu5wISC6hJ8JrZKSg1dSBwCKgCBXKJgBGFoQGzqiaHttwQ4O24ht jm44EmdIeVYpUNIZrxfTufkMLXe3rAeNtfgJryTSyzUi1BL6Lno6HdThKbszl2fu Iert65mJOCJWP1J8BBQdvXgOdQKB9FVl/EHA91SheAbD50xmLqEynW7ozwTfXlua l9zIOLgAdadIbYZZ3v5b9n0yNzPS5/IyErF3NUf8xOiuNX3UlhSY2vzpu+Yx1fXY Ol2v6M+ZHXyC0Y+PL4cGCZPikly2LcVJI5C3ik3Bpcre9TOxPbXq5qqrgR/85pw+ ZMS8zAb7vLxPjR7CP3OGAi9MrzGezB+U3a60Hm6fHtvQeCTSMNkife3UHkEvNzaz KmSBydln0UtK3Qlb+W3wQmpY1IKPw9AHgzXEWFUA6frH21n6h5BUa4Tb7NqUy/+m 7LadheLECLk1GIUb6YkThoM1o5q8Pz+TpYmYfZxUaRRylrUXR1bTVVtjoHRTuEuY jZvn7LWTROtPG3ApnTUzs69PUPnDG/TOHwRjwD2ED4gpGZNx6LFrb3hkZzi0qqty sr0yMBrTWiA= =Sup+ -----END PGP SIGNATURE-----
2022. május 16.

ESB-2022.2377 - [RedHat] subversion:1.10: CVSS (Max): 7.5

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2377 subversion:1.10 security update 16 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: subversion:1.10 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-24070 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2236 Comment: CVSS (Max): 7.5 CVE-2022-24070 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: subversion:1.10 security update Advisory ID: RHSA-2022:2236-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2236 Issue date: 2022-05-12 CVE Names: CVE-2022-24070 ===================================================================== 1. Summary: An update for the subversion:1.10 module is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Subversion (SVN) is a concurrent version control system which enables one or more users to collaborate in developing and maintaining a hierarchy of files and directories while keeping a history of all changes. Security Fix(es): * subversion: Subversion's mod_dav_svn is vulnerable to memory corruption (CVE-2022-24070) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the updated packages, for the update to take effect, you must restart the httpd daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are serving Subversion repositories via the svn:// protocol. 5. Bugs fixed (https://bugzilla.redhat.com/): 2074772 - CVE-2022-24070 subversion: Subversion's mod_dav_svn is vulnerable to memory corruption 6. Package List: Red Hat Enterprise Linux AppStream EUS (v. 8.2): Source: libserf-1.3.9-9.module+el8.2.0+9887+08558108.src.rpm subversion-1.10.2-3.module+el8.2.0+15168+f36597c9.src.rpm utf8proc-2.1.1-5.module+el8.2.0+9887+08558108.src.rpm aarch64: libserf-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm libserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm libserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.aarch64.rpm mod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm mod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm subversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.aarch64.rpm utf8proc-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm utf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm utf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.aarch64.rpm noarch: subversion-javahl-1.10.2-3.module+el8.2.0+15168+f36597c9.noarch.rpm ppc64le: libserf-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm libserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm libserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.ppc64le.rpm mod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm mod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm subversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.ppc64le.rpm utf8proc-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm utf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm utf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.ppc64le.rpm s390x: libserf-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm libserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm libserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.s390x.rpm mod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm mod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm subversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.s390x.rpm utf8proc-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm utf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm utf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.s390x.rpm x86_64: libserf-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm libserf-debuginfo-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm libserf-debugsource-1.3.9-9.module+el8.2.0+9887+08558108.x86_64.rpm mod_dav_svn-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm mod_dav_svn-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-debugsource-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-devel-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-devel-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-gnome-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-gnome-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-libs-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-libs-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-perl-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-perl-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-tools-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm subversion-tools-debuginfo-1.10.2-3.module+el8.2.0+15168+f36597c9.x86_64.rpm utf8proc-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm utf8proc-debuginfo-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm utf8proc-debugsource-2.1.1-5.module+el8.2.0+9887+08558108.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-24070 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYn3iatzjgjWX9erEAQhybhAAnCLwKUV8Qd0P8bMoriwLdUGnpK41vAmm fOGrmwAd09DNs/HW/8eum8jjjuEVUx/n+Vp0A8BMa2hDqJ+Zm+dSq++A0pGSgr2/ CGBn3BsyM+uyGapkKLYrHCqnD6arvck2CaEtDNyl0/FmI6ZyOLB0g9gkADTit4me qMKrZs303c2udoP5JriRdQ1yFJKVLkt32ssmljsJBUzbIMmt3zZAH0r640wMq5vZ AVdRxrIgmKkToAUD5frD7WzF60hvQ5bBGkXXdjWBDnDTOscWXksiTuucTxTzEfh5 qNlb5I09oPgIZsp563Ry+BYzd8VqVCFXOu90L7UyBVJZbn6/Y/WO9jZ8SmXza+0Z tPeR2mUPeNKQ8NOFxFuzCnN+reOfyKzCeRfUR/7FvQ5FxcrymgWpeOUkUIfjUaCR fymyByBdfxfn3YalL/WD2V0i6VEHlbfKdrn6/Wk1gP0jtsf11Avz94ydkZxo0Cv6 IAZfQmkcAKdYjQ/93dDEFalqqADOD+bOjaBizWfRcLHo+h+SL1MjxSo9l8cL2Y0i ly1o4XnyxMk+SyZbe4v2coVLKuDGpUUxT0YwSplyvedX1ULVYRWvi/Q86Mh9rPmf 39fsdM62D/mLOTiNy3JIn2gS0ir3yRDr1Y1GkZE6SLMJxFOY9+RSVvYhTLCLSLv3 Q5krjcKXb3o= =C+KB - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYoHKdckNZI30y1K9AQgFYQ//Vez98AdiU3NQR4sImzVk0JoQsPCFquq5 98fc7c85DVlNq5U7nGsxDOnsiZ3JVDfsQICXRPGEvkUpRe/yV2FID0QrBjV5SpST T8v/rvgyf/CyI1LBiT2KtAuSy5hYEECeyrOWTZBG9BehOoCM1tBnOpAEwmij6XR+ av64bW+y1yqFXjmEgtsfNniEuv4vk6g59PRbyabmRhb5hMr5hItOUcwmgjKxofw6 8Gi5HP1egvKuPCod++09aLXlGJJA+S3aa2huwwpZzAXADR0arXtLbBMjISkuXIQQ mRdS8z90kmez8eUWPjkyITKpJqYQGB1QXXDLtz1LZMgEUfQK2N4xsh47uzlt0qPL Na0/vB3a6Wx84vrKdlaQvLBcAq1FpaF4rqd884OjpdOGMSE/PL1jS8Z8Tgc5zT42 rA7MtpUjG24nnLiwYr4mOFC9klPHQsLs6xq08z+2K/DL4KW5pu8gHHfpM+T77TtB SmmK8U/zJW5Afe7WtPBfJqGlDboOTMLeg6qaxVVFaah0wRur/PJAmD4RDn52218w NYo9CxlOa+9DzccNEidUoWnoBwYu3x2jYz7BTYuJXBqwMAxnvV33qN4B6BkoCap5 KdDQpab57oqR6frAJgE1D6fO9TThbTt2XIPmASn+wrUDC/+VahA7MFaa8ItZ/KS4 Mm1ClX7NppQ= =Z5hQ -----END PGP SIGNATURE-----