SUSE Container Update Advisory: caasp/v4/cilium
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:69-1
Container Tags        : caasp/v4/cilium:1.6.6 , caasp/v4/cilium:1.6.6-rev5 , caasp/v4/cilium:1.6.6-rev5-build3.12.271
Container Release     : 3.12.271
Severity              : critical
Type                  : security
References            : 1027496 1029961 1029961 1040589 1047218 1050625 1065729 1067478
                        1078466 1083473 1084671 1096677 1106014 1109367 1112500 1113013
                        1115408 1122417 1125886 1134353 1141190 1141597 1145085 1145276
                        1146705 1148868 1152489 1153687 1154353 1154935 1157818 1158812
                        1158958 1158959 1158960 1159491 1159715 1159847 1159850 1159886
                        1160309 1160438 1160439 1160876 1161268 1162581 1164719 1165780
                        1165780 1167471 1167773 1167939 1169006 1170774 1171479 1171549
                        1171962 1172091 1172115 1172234 1172236 1172240 1172308 1172505
                        1172973 1172974 1173641 1173746 1174016 1174436 1174504 1174942
                        1175448 1175449 1175458 1175514 1175519 1175623 1176201 1176940
                        1176964 1177238 1177275 1177427 1177490 1177533 1177583 1177976
                        1178219 1178236 1178386 1178554 1178561 1178577 1178624 1178675
                        1178775 1178775 1178823 1178825 1178909 1178910 1178966 1179083
                        1179155 1179222 1179326 1179363 1179503 1179691 1179691 1179694
                        1179721 1179738 1179816 1179824 1179847 1179898 1179899 1179900
                        1179901 1179902 1179903 1179909 1180020 1180038 1180064 1180073
                        1180077 1180083 1180138 1180225 1180451 1180454 1180461 1180596
                        1180603 1180603 1180603 1180663 1180721 1180851 1180885 1180995
                        1181011 1181328 1181443 1181452 1181505 1181618 1181622 1181831
                        1181874 1181976 1182016 1182117 1182252 1182279 1182328 1182331
                        1182333 1182362 1182372 1182408 1182411 1182412 1182413 1182415
                        1182416 1182417 1182418 1182419 1182420 1182604 1182629 1182791
                        1182936 1183012 1183064 1183085 1183094 1183268 1183370 1183371
                        1183456 1183457 1183511 1183589 1183628 1183791 1183797 1183909
                        1183933 1184136 1184326 1184358 1184399 1184401 1184435 1184439
                        1184519 1184614 1184614 1184620 1184690 1184761 1184794 1184804
                        1184920 1184967 1184994 1184994 1184997 1184997 1185016 1185046
                        1185163 1185239 1185302 1185325 1185331 1185348 1185408 1185408
                        1185409 1185409 1185410 1185410 1185417 1185438 1185524 1185540
                        1185562 1185677 1185698 1185726 1185762 1185807 1185958 1186015
                        1186049 1186114 1186447 1186489 1186503 1186561 1186602 1186910
                        1187060 1187105 1187153 1187167 1187210 1187212 1187224 1187270
                        1187273 1187292 1187400 1187425 1187466 1187512 1187654 1187738
                        1187760 1187911 1187993 1188018 1188063 1188063 1188067 1188156
                        1188217 1188218 1188219 1188220 1188291 1188344 1188435 1188571
                        1188623 1188651 1188713 1188881 1188921 1188941 1188986 1189031
                        1189206 1189297 1189465 1189465 1189480 1189521 1189521 1189683
                        1189803 1189841 1189884 1189929 1189996 1190023 1190052 1190059
                        1190062 1190115 1190159 1190199 1190225 1190234 1190325 1190356
                        1190358 1190373 1190374 1190406 1190432 1190440 1190465 1190467
                        1190523 1190534 1190543 1190576 1190595 1190596 1190598 1190620
                        1190626 1190645 1190679 1190705 1190712 1190717 1190739 1190746
                        1190758 1190784 1190785 1190793 1190815 1190915 1190933 1190984
                        1191172 1191193 1191240 1191252 1191286 1191292 1191324 1191370
                        1191473 1191563 1191609 1191690 1191987 1192161 1192248 1192267
                        1192337 1192436 1192688 1192717 1192790 1193480 1193481 1193488
                        1193521 1194251 1194362 1194474 1194476 1194477 1194478 1194479
                        1194480 928700 928701 954813 CVE-2015-3414 CVE-2015-3415 CVE-2016-10228
                        CVE-2017-9271 CVE-2019-19244 CVE-2019-19317 CVE-2019-19603 CVE-2019-19645
                        CVE-2019-19646 CVE-2019-19880 CVE-2019-19923 CVE-2019-19924 CVE-2019-19925
                        CVE-2019-19926 CVE-2019-19959 CVE-2019-20218 CVE-2019-20838 CVE-2019-25013
                        CVE-2020-12049 CVE-2020-12762 CVE-2020-13434 CVE-2020-13435 CVE-2020-13630
                        CVE-2020-13631 CVE-2020-13632 CVE-2020-14155 CVE-2020-15358 CVE-2020-16590
                        CVE-2020-16591 CVE-2020-16592 CVE-2020-16593 CVE-2020-16598 CVE-2020-16599
                        CVE-2020-24370 CVE-2020-24371 CVE-2020-25709 CVE-2020-25710 CVE-2020-27618
                        CVE-2020-29361 CVE-2020-29562 CVE-2020-29573 CVE-2020-35448 CVE-2020-35493
                        CVE-2020-35496 CVE-2020-35507 CVE-2020-35512 CVE-2020-36221 CVE-2020-36222
                        CVE-2020-36223 CVE-2020-36224 CVE-2020-36225 CVE-2020-36226 CVE-2020-36227
                        CVE-2020-36228 CVE-2020-36229 CVE-2020-36230 CVE-2020-3702 CVE-2020-9327
                        CVE-2021-20197 CVE-2021-20231 CVE-2021-20232 CVE-2021-20284 CVE-2021-20294
                        CVE-2021-20305 CVE-2021-22876 CVE-2021-22898 CVE-2021-22922 CVE-2021-22923
                        CVE-2021-22924 CVE-2021-22925 CVE-2021-22946 CVE-2021-22947 CVE-2021-23840
                        CVE-2021-23841 CVE-2021-24031 CVE-2021-24032 CVE-2021-27212 CVE-2021-27218
                        CVE-2021-27219 CVE-2021-3326 CVE-2021-33560 CVE-2021-33574 CVE-2021-33910
                        CVE-2021-33910 CVE-2021-3487 CVE-2021-3516 CVE-2021-3516 CVE-2021-3517
                        CVE-2021-3517 CVE-2021-3518 CVE-2021-3518 CVE-2021-3520 CVE-2021-3537
                        CVE-2021-3541 CVE-2021-3580 CVE-2021-35942 CVE-2021-36222 CVE-2021-3669
                        CVE-2021-3672 CVE-2021-3712 CVE-2021-3712 CVE-2021-3744 CVE-2021-3752
                        CVE-2021-37600 CVE-2021-3764 CVE-2021-37750 CVE-2021-38185 CVE-2021-38185
                        CVE-2021-39537 CVE-2021-40490 CVE-2021-43618 CVE-2021-45960 CVE-2021-46143
                        CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826
                        CVE-2022-22827 
-----------------------------------------------------------------

The container caasp/v4/cilium was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3792-1
Released:    Mon Dec 14 17:39:24 2020
Summary:     Recommended update for gzip
Type:        recommended
Severity:    moderate
References:  1145276
This update for gzip fixes the following issues:

Update from version 1.9 to version 1.10 (jsc#ECO-2217, jsc#SLE-12974)

- Enable `DFLTCC` (Deflate Conversion Call) compression for s390x for levels 1-6 to `CFLAGS`. (jsc#SLE-13775) 

  Enable by adding `-DDFLTCC_LEVEL_MASK=0x7e` to `CFLAGS`.
- Fix three data corruption issues. (bsc#1145276, jsc#SLE-5818, jsc#SLE-8914)
- Add support for `DFLTCC` (hardware-accelerated deflation) for s390x arch. (jsc#SLE-5818, jsc#SLE-8914)

  Enable it using the `--enable-dfltcc` option.
- Compressed gzip output no longer contains the current time as a timestamp when the input is not a regular file.  
  Instead, the output contains a `null` (zero) timestamp. This makes gzip's behavior more reproducible when 
  used as part of a pipeline.
- A use of uninitialized memory on some malformed inputs has been fixed.
- A few theoretical race conditions in signal handlers have been fixed.
- Update gnulib for `libio.h` removal.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3840-1
Released:    Wed Dec 16 10:32:03 2020
Summary:     Recommended update for llvm7
Type:        recommended
Severity:    moderate
References:  1176964,1179155
This update for llvm7 fixes the following issues:

- Fix dsymutil crash on ELF file. (bsc#1176964)
- Add Conflicts: clang-tools to clang7 and llvm7 packages to properly handle newer llvm versions. (bsc#1179155)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3853-1
Released:    Wed Dec 16 12:27:27 2020
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    moderate
References:  1084671,1169006,1174942,1175514,1175623,1178554,1178825
This update for util-linux fixes the following issue:

- Do not trigger the automatic close of CDROM. (bsc#1084671)
- Try to automatically configure broken serial lines. (bsc#1175514)
- Avoid `sulogin` failing on not existing or not functional console devices. (bsc#1175514)
- Build with `libudev` support to support non-root users. (bsc#1169006)
- Avoid memory errors on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)
- Fix warning on mounts to `CIFS` with mount –a. (bsc#1174942)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3942-1
Released:    Tue Dec 29 12:22:01 2020
Summary:     Recommended update for libidn2
Type:        recommended
Severity:    moderate
References:  1180138
This update for libidn2 fixes the following issues:

- The library is actually dual licensed, GPL-2.0-or-later or LGPL-3.0-or-later,
  adjusted the RPM license tags (bsc#1180138)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3943-1
Released:    Tue Dec 29 12:24:45 2020
Summary:     Recommended update for libxml2
Type:        recommended
Severity:    moderate
References:  1178823
This update for libxml2 fixes the following issues:

Avoid quadratic checking of identity-constraints, speeding up XML validation (bsc#1178823)
* key/unique/keyref schema attributes currently use quadratic loops
  to check their various constraints (that keys are unique and that
  keyrefs refer to existing keys).
* This fix uses a hash table to avoid the quadratic behaviour.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:79-1
Released:    Tue Jan 12 10:49:34 2021
Summary:     Recommended update for gcc7
Type:        recommended
Severity:    moderate
References:  1167939
This update for gcc7 fixes the following issues:

- Amend the gcc7 aarch64 atomics for glibc namespace violation with getauxval.  [bsc#1167939]

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:129-1
Released:    Thu Jan 14 12:26:15 2021
Summary:     Security update for openldap2
Type:        security
Severity:    moderate
References:  1178909,1179503,CVE-2020-25709,CVE-2020-25710
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

Non-security issue fixed:

- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:220-1
Released:    Tue Jan 26 14:00:51 2021
Summary:     Recommended update for keyutils
Type:        recommended
Severity:    moderate
References:  1180603
This update for keyutils fixes the following issues:

- Adjust the library license to be LPGL-2.1+ only (the tools are GPL2+, the library is just LGPL-2.1+) (bsc#1180603)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:233-1
Released:    Wed Jan 27 12:15:33 2021
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1141597,1174436,1175458,1177490,1179363,1179824,1180225
This update for systemd fixes the following issues:

- Added a timestamp to the output of the busctl monitor command (bsc#1180225)
- Fixed a NULL pointer dereference bug when attempting to close the journal file handle (bsc#1179824)
- Improved the caching of cgroups member mask (bsc#1175458)
- Fixed the dependency definition of sound.target (bsc#1179363)
- Fixed a bug that could lead to a potential error, when daemon-reload is called between
  StartTransientUnit and scope_start() (bsc#1174436)
- time-util: treat /etc/localtime missing as UTC (bsc#1141597)
- Removed mq-deadline selection from 60-io-scheduler.rules (bsc#1177490)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:265-1
Released:    Mon Feb  1 15:06:45 2021
Summary:     Recommended update for systemd
Type:        recommended
Severity:    important
References:  1178775,1180885
This update for systemd fixes the following issues:

- Fix for udev creating '/dev/disk/by-label' symlink for 'LUKS2' to avoid mount issues. (bsc#1180885, #8998))
- Fix for an issue when container start causes interference in other containers. (bsc#1178775)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:266-1
Released:    Mon Feb  1 21:02:37 2021
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    moderate
References:  1177533,1179326,1179691,1179738
This update for lvm2 fixes the following issue:

- Fixes an issue when boot logical volume gets unmounted during patching. (bsc#1177533)
- Fix for lvm2 to use 'external_device_info_source='udev'' by default. (bsc#1179691)
- Fixed an issue in configuration for an item that is commented out by default. (bsc#1179738)
- Fixed an issue when after storage migration major performance issues occurred on the system. (bsc#1179326)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:293-1
Released:    Wed Feb  3 12:52:34 2021
Summary:     Recommended update for gmp
Type:        recommended
Severity:    moderate
References:  1180603
This update for gmp fixes the following issues:

- correct license statements of packages (library itself is no GPL-3.0) (bsc#1180603)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:304-1
Released:    Thu Feb  4 13:19:43 2021
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    important
References:  1179691
This update for lvm2 fixes the following issues:

- lvm2 will no longer use external_device_info_source='udev' as default because it introduced a
  regression (bsc#1179691).

  If this behavior is still wanted, please change this manually in the lvm.conf

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:305-1
Released:    Thu Feb  4 15:00:37 2021
Summary:     Recommended update for libprotobuf
Type:        recommended
Severity:    moderate
References:  

libprotobuf was updated to fix:

- ship the libprotobuf-lite15 on the base products. (jsc#ECO-2911)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:307-1
Released:    Fri Feb  5 05:30:34 2021
Summary:     Recommended update for libselinux
Type:        recommended
Severity:    low
References:  1180603
This update for libselinux fixes the following issues:

- Corrected the license to public domain (bsc#1180603)

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2021:339-1
Released:    Mon Feb  8 13:16:07 2021
Summary:     Optional update for pam
Type:        optional
Severity:    low
References:  
This update for pam fixes the following issues:

- Added rpm macros for this package, so that other packages can make use of it

This patch is optional to be installed - it doesn't fix any bugs.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:596-1
Released:    Thu Feb 25 10:26:30 2021
Summary:     Recommended update for gcc7
Type:        recommended
Severity:    moderate
References:  1181618
This update for gcc7 fixes the following issues:

- Fixed webkit2gtk3 build (bsc#1181618)
- Change GCC exception licenses to SPDX format
- Remove include-fixed/pthread.h

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:653-1
Released:    Fri Feb 26 19:53:43 2021
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1178386,1179694,1179721,1180038,1181505,1182117,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2020-29573,CVE-2021-3326
This update for glibc fixes the following issues:

- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:723-1
Released:    Mon Mar  8 16:45:27 2021
Summary:     Security update for openldap2
Type:        security
Severity:    important
References:  1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420,CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch->bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:753-1
Released:    Tue Mar  9 17:09:57 2021
Summary:     Security update for openssl-1_1
Type:        security
Severity:    moderate
References:  1182331,1182333,CVE-2021-23840,CVE-2021-23841
This update for openssl-1_1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:786-1
Released:    Mon Mar 15 11:19:23 2021
Summary:     Recommended update for zlib
Type:        recommended
Severity:    moderate
References:  1176201
This update for zlib fixes the following issues:

- Fixed hw compression on z15 (bsc#1176201)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:890-1
Released:    Fri Mar 19 15:51:41 2021
Summary:     Security update for glib2
Type:        security
Severity:    important
References:  1182328,1182362,CVE-2021-27218,CVE-2021-27219
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)

- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:924-1
Released:    Tue Mar 23 10:00:49 2021
Summary:     Recommended update for filesystem
Type:        recommended
Severity:    moderate
References:  1078466,1146705,1175519,1178775,1180020,1180083,1180596,1181011,1181831,1183094
This update for filesystem the following issues:

- Remove duplicate line due to merge error
- Add fix for 'mesa' creating cache with perm 0700. (bsc#1181011) 
- Fixed an issue causing failure during installation/upgrade a failure. (rh#1548403) (bsc#1146705)
- Allows to override config to add cleanup options of '/var/tmp'. (bsc#1078466)
- Create config to cleanup '/tmp' regular required with 'tmpfs'. (bsc#1175519)

This update for systemd fixes the following issues:

- Fix for a possible memory leak. (bsc#1180020)
- Fix for a case when to a bind mounted directory results inactive mount units. (#7811) (bsc#1180596)
- Fixed an issue when starting a container conflicts with another one. (bsc#1178775)
- Drop most of the tmpfiles that deal with generic paths and avoid warnings. (bsc#1078466, bsc#1181831)
- Don't use shell redirections when calling a rpm macro. (bsc#1183094)
- 'systemd' requires 'aaa_base' >= 13.2. (bsc#1180083)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:926-1
Released:    Tue Mar 23 13:20:24 2021
Summary:     Recommended update for systemd-presets-common-SUSE
Type:        recommended
Severity:    moderate
References:  1083473,1112500,1115408,1165780,1183012
This update for systemd-presets-common-SUSE fixes the following issues:

- Add default user preset containing:
  - enable `pulseaudio.socket` (bsc#1083473)
  - enable `pipewire.socket` (bsc#1183012)
  - enable `pipewire-pulse.socket` (bsc#1183012)
  - enable `pipewire-media-session.service` (used with pipewire >= 0.3.23)
- Changes to the default preset:
  - enable `btrfsmaintenance-refresh.path`.
  - disable `btrfsmaintenance-refresh.service`.
  - enable `dnf-makecache.timer`.
  - enable `ignition-firstboot-complete.service`.
  - enable logwatch.timer and avoid to have logwatch out of sync with logrotate. (bsc#1112500)
  - enable `mlocate.timer`. Recent versions of mlocate don't use `updatedb.timer` any more. (bsc#1115408)
  - remove enable `updatedb.timer` 
- Avoid needless refresh on boot. (bsc#1165780)
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:934-1
Released:    Wed Mar 24 12:18:21 2021
Summary:     Security update for gnutls
Type:        security
Severity:    important
References:  1183456,1183457,CVE-2021-20231,CVE-2021-20232
This update for gnutls fixes the following issues:

- CVE-2021-20232: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183456).
- CVE-2021-20231: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183457).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:948-1
Released:    Wed Mar 24 14:31:34 2021
Summary:     Security update for zstd
Type:        security
Severity:    moderate
References:  1183370,1183371,CVE-2021-24031,CVE-2021-24032
This update for zstd fixes the following issues:

- CVE-2021-24031: Added read permissions to files while being compressed or uncompressed (bsc#1183371).
- CVE-2021-24032: Fixed a race condition which could have allowed an attacker to access world-readable destination file (bsc#1183370).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:952-1
Released:    Thu Mar 25 14:36:56 2021
Summary:     Recommended update for libunwind
Type:        recommended
Severity:    moderate
References:  1160876,1171549
This update for libunwind fixes the following issues:

- Update to version 1.5.0. (jsc#ECO-3395)
- Enable s390x for building. (jsc#ECO-3395)
- Fix compilation with 'fno-common'. (bsc#1171549)
- Fix build with 'GCC-10'. (bsc#1160876)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:956-1
Released:    Thu Mar 25 19:19:02 2021
Summary:     Security update for libzypp, zypper
Type:        security
Severity:    moderate
References:  1050625,1174016,1177238,1177275,1177427,1177583,1178910,1178966,1179083,1179222,1179816,1179847,1179909,1180077,1180663,1180721,1181328,1181622,1182629,CVE-2017-9271
This update for libzypp, zypper fixes the following issues:

Update zypper to version 1.14.43:

- doc: give more details about creating versioned package locks
  (bsc#1181622)
- man: Document synonymously used patch categories (bsc#1179847)
- Fix source-download commands help (bsc#1180663)
- man: Recommend to use the --non-interactive global option rather than the command option -y (bsc#1179816)
- Extend apt packagemap (fixes #366)
- --quiet: Fix install summary to write nothing if there's nothing todo (bsc#1180077)
- Prefer /run over /var/run.

Update libzypp to 17.25.8:

- Try to provide a mounted /proc in --root installs (bsc#1181328)
  Some systemd tools require /proc to be mounted and fail if it's
  not there.
- Enable release packages to request a releaxed suse/opensuse
  vendorcheck in dup when migrating. (bsc#1182629)
- Patch: Identify well-known category names (bsc#1179847)
  This allows to use the RH and SUSE patch categrory names
  synonymously:
  (recommended = bugfix) and (optional = feature = enhancement).
- Add missing includes for GCC 11 compatibility.
- Fix %posttrans script execution (fixes #265)
  The scripts are execuable. No need to call them through 'sh -c'.
- Commit: Fix rpmdb compat symlink in case rpm got removed.
- Repo: Allow multiple baseurls specified on one line (fixes #285)
- Regex: Fix memory leak and undefined behavior.
- Add rpm buildrequires for test suite (fixes #279)
- Use rpmdb2solv new -D switch to tell the location ob the
  rpmdatabase to use.
- CVE-2017-9271: Fixed information leak in the log file (bsc#1050625 bsc#1177583)
- RepoManager: Force refresh if repo url has changed (bsc#1174016)
- RepoManager: Carefully tidy up the caches. Remove non-directory entries. (bsc#1178966)
- RepoInfo: ignore legacy type= in a .repo file and let RepoManager probe (bsc#1177427).
- RpmDb: If no database exists use the _dbpath configured in rpm.  Still makes sure a compat
  symlink at /var/lib/rpm exists in case the configures _dbpath is elsewhere. (bsc#1178910)
- Fixed update of gpg keys with elongated expire date (bsc#1179222)
- needreboot: remove udev from the list (bsc#1179083)
- Fix lsof monitoring (bsc#1179909)
- Rephrase solver problem descriptions (jsc#SLE-8482)
- Adapt to changed gpg2/libgpgme behavior (bsc#1180721)
- Multicurl backend breaks with with unknown filesize (fixes #277)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1004-1
Released:    Thu Apr  1 15:07:09 2021
Summary:     Recommended update for libcap
Type:        recommended
Severity:    moderate
References:  1180073
This update for libcap fixes the following issues:

- Added support for the ambient capabilities (jsc#SLE-17092, jsc#ECO-3460)
- Changed the license tag from 'BSD-3-Clause and GPL-2.0' to 'BSD-3-Clause OR GPL-2.0-only' (bsc#1180073)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1141-1
Released:    Mon Apr 12 13:13:36 2021
Summary:     Recommended update for openldap2
Type:        recommended
Severity:    low
References:  1182791
This update for openldap2 fixes the following issues:

- Improved the proxy connection timeout options to prune connections properly (bsc#1182791)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1169-1
Released:    Tue Apr 13 15:01:42 2021
Summary:     Recommended update for procps
Type:        recommended
Severity:    low
References:  1181976
This update for procps fixes the following issues:

- Corrected a statement in the man page about processor pinning via taskset (bsc#1181976)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1291-1
Released:    Wed Apr 21 14:04:06 2021
Summary:     Recommended update for mpfr
Type:        recommended
Severity:    moderate
References:  1141190
This update for mpfr fixes the following issues:

- Fixed an issue when building for ppc64le (bsc#1141190)

Technical library fixes:

- A subtraction of two numbers of the same sign or addition of two numbers of different signs
  can be rounded incorrectly (and the ternary value can be incorrect) when one of the two
  inputs is reused as the output (destination) and all these MPFR numbers have exactly
  GMP_NUMB_BITS bits of precision (typically, 32 bits on 32-bit machines, 64 bits on 64-bit
  machines).
- The mpfr_fma and mpfr_fms functions can behave incorrectly in case of internal overflow or
  underflow.
- The result of the mpfr_sqr function can be rounded incorrectly in a rare case near underflow
  when the destination has exactly GMP_NUMB_BITS bits of precision (typically, 32 bits on
  32-bit machines, 64 bits on 64-bit machines) and the input has at most GMP_NUMB_BITS bits
  of precision.
- The behavior and documentation of the mpfr_get_str function are inconsistent concerning the
  minimum precision (this is related to the change of the minimum precision from 2 to 1 in
  MPFR 4.0.0). The get_str patch fixes this issue in the following way: the value 1 can now be
  provided for n (4th argument of mpfr_get_str); if n = 0, then the number of significant digits
  in the output string can now be 1, as already implied by the documentation (but the code was
  increasing it to 2).
- The mpfr_cmp_q function can behave incorrectly when the rational (mpq_t) number has a null
  denominator.
- The mpfr_inp_str and mpfr_out_str functions might behave incorrectly when the stream is a
  null pointer: the stream is replaced by stdin and stdout, respectively. This behavior is
  useless, not documented (thus incorrect in case a null pointer would have a special meaning),
  and not consistent with other input/output functions.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1295-1
Released:    Wed Apr 21 14:08:19 2021
Summary:     Recommended update for systemd-presets-common-SUSE
Type:        recommended
Severity:    moderate
References:  1184136
This update for systemd-presets-common-SUSE fixes the following issues:

- Enabled hcn-init.service for HNV on POWER (bsc#1184136)

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2021:1296-1
Released:    Wed Apr 21 14:09:28 2021
Summary:     Optional update for e2fsprogs
Type:        optional
Severity:    low
References:  1183791
This update for e2fsprogs fixes the following issues:

- Fixed an issue when building e2fsprogs (bsc#1183791)

This patch does not fix any user visible issues and is therefore optional to install.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1297-1
Released:    Wed Apr 21 14:10:10 2021
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1178219
This update for systemd fixes the following issues:

- Improved the logs emitted by systemd-shutdown during the shutdown process, when applications cannot
  be stopped properly and would leave mount points mounted.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1407-1
Released:    Wed Apr 28 15:49:02 2021
Summary:     Recommended update for libcap
Type:        recommended
Severity:    important
References:  1184690
This update for libcap fixes the following issues:

- Add explicit dependency on 'libcap2' with version to 'libcap-progs' and 'pam_cap'. (bsc#1184690)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1412-1
Released:    Wed Apr 28 17:09:28 2021
Summary:     Security update for libnettle
Type:        security
Severity:    important
References:  1184401,CVE-2021-20305
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1449-1
Released:    Fri Apr 30 08:08:25 2021
Summary:     Recommended update for systemd-presets-branding-SLE
Type:        recommended
Severity:    moderate
References:  1165780
This update for systemd-presets-branding-SLE fixes the following issues:

- Don't enable 'btrfsmaintenance-refresh.service', 'btrfsmaintenance' is managed by systemd-presets-common-SUSE instead. (bsc#1165780)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1523-1
Released:    Wed May  5 18:24:20 2021
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1185408,1185409,1185410,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1527-1
Released:    Thu May  6 08:58:53 2021
Summary:     Recommended update for bash
Type:        recommended
Severity:    important
References:  1183064
This update for bash fixes the following issues:

- Fixed a segmentation fault that used to occur when bash read a history file
  that was malformed in a very specific way. (bsc#1183064)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1543-1
Released:    Fri May  7 15:16:32 2021
Summary:     Recommended update for patterns-microos
Type:        recommended
Severity:    moderate
References:  1184435
This update for patterns-microos provides the following fix:

- Require the libvirt-daemon-qemu package and include the needed dependencies in the
  product. (bsc#1184435)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1549-1
Released:    Mon May 10 13:48:00 2021
Summary:     Recommended update for procps
Type:        recommended
Severity:    moderate
References:  1185417
This update for procps fixes the following issues:

- Support up to 2048 CPU as well. (bsc#1185417)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1565-1
Released:    Tue May 11 14:20:04 2021
Summary:     Recommended update for krb5
Type:        recommended
Severity:    moderate
References:  1185163
This update for krb5 fixes the following issues:

- Use '/run' instead of '/var/run' for daemon PID files. (bsc#1185163);

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2021:1592-1
Released:    Wed May 12 13:47:41 2021
Summary:     Optional update for sed
Type:        optional
Severity:    low
References:  1183797
This update for sed fixes the following issues:

- Fixed a building issue with glibc-2.31 (bsc#1183797).

This patch is optional to install.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1602-1
Released:    Thu May 13 16:35:19 2021
Summary:     Recommended update for libsolv, libzypp
Type:        recommended
Severity:    moderate
References:  1180851,1181874,1182936,1183628,1184997,1185239
This update for libsolv and libzypp fixes the following issues:

libsolv:

Upgrade from version 0.7.17 to version 0.7.19

- Fix rare segfault in `resolve_jobrules()` that could happen if new rules are learned.
- Fix memory leaks in error cases
- Fix error handling in `solv_xfopen_fd()`
- Fix regex code on win32
- fixed memory leak in choice rule generation
- `repo_add_conda`: add a flag to skip version 2 packages.

libzypp:

Upgrade from version 17.25.8 to version 17.25.10

- Properly handle permission denied when providing optional files. (bsc#1185239)
- Fix service detection with `cgroupv2`. (bsc#1184997)
- Add missing includes for GCC 11. (bsc#1181874)
- Fix unsafe usage of static in media verifier.
- `Solver`: Avoid segfault if no system is loaded. (bsc#1183628)
- `MediaVerifier`: Relax media set verification in case of a single not-volatile medium. (bsc#1180851)
- Do no cleanup in custom cache dirs. (bsc#1182936)
- `ZConfig`: let `pubkeyCachePath` follow `repoCachePath`.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1612-1
Released:    Fri May 14 17:09:39 2021
Summary:     Recommended update for openldap2
Type:        recommended
Severity:    moderate
References:  1184614
This update for openldap2 fixes the following issue:

- Provide `openldap2-contrib` to the modules SUSE Linux Enterprise Legacy 15-SP2 and 15-SP3. (bsc#1184614)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1618-1
Released:    Mon May 17 13:11:28 2021
Summary:     Recommended update for llvm7 and libqt5-qttools
Type:        recommended
Severity:    moderate
References:  1067478,1109367,1145085,1184920
This update for llvm7 and libqt5-qttools fixes the following issues:

libqt5-qttools:

- Use `libclang` instead of `clang`, now that `llvm7` moved the header files to `libclang` (bsc#1109367, bsc#1184920)

llvm7:

- Remove unneeded and unused dependencies:
  - groff, bison, flex, jsoncpp

- Devel packages are only required in other devel packages, when their headers are included in the installed headers.
- Skip a test that is broken with 387 FPU registers and avoids check failure on i586. (bsc#1145085)
- Link `libomp` with `atomic` if needed and fix build using gcc-4.8. (bsc#1145085)
- Make build of `gnustep-libobjc2` package reproducible. (bsc#1067478)
- Remove `-fno-strict-aliasing` which upstream doesn't use any more.
- Package `clang` builtin headers with `libclang`. (bsc#1109367)

  - The library is unusable without the builtin headers. Currently consumers of `libclang` have to require `clang` 
  as well, although only the headers are needed. 

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1643-1
Released:    Wed May 19 13:51:48 2021
Summary:     Recommended update for pam
Type:        recommended
Severity:    important
References:  1181443,1184358,1185562
This update for pam fixes the following issues:

- Fixed a bug, where the 'unlimited'/'-1' value was not interpreted correctly (bsc#1181443)
- Fixed a bug, where pam_access interpreted the keyword 'LOCAL' incorrectly, leading to
  an attempt to resolve it as a hostname (bsc#1184358)
- In the 32-bit compatibility package for 64-bit architectures, require 'systemd-32bit' to be also installed as it contains pam_systemd.so for 32 bit applications. (bsc#1185562)


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1647-1
Released:    Wed May 19 13:59:12 2021
Summary:     Security update for lz4
Type:        security
Severity:    important
References:  1185438,CVE-2021-3520
This update for lz4 fixes the following issues:

- CVE-2021-3520: Fixed memory corruption due to an integer overflow bug caused by memmove argument (bsc#1185438).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1654-1
Released:    Wed May 19 16:43:36 2021
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1185408,1185409,1185410,1185698,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518,CVE-2021-3537
This update for libxml2 fixes the following issues:

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1809-1
Released:    Mon May 31 16:24:59 2021
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1177976,1183933,1186114,CVE-2021-22876,CVE-2021-22898
This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).
- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
- Fix for SFTP uploads when it results in empty uploaded files (bsc#1177976).
- Allow partial chain verification (jsc#SLE-17956).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1861-1
Released:    Fri Jun  4 09:59:40 2021
Summary:     Recommended update for gcc10
Type:        recommended
Severity:    moderate
References:  1029961,1106014,1178577,1178624,1178675,1182016
This update for gcc10 fixes the following issues:

- Disable nvptx offloading for aarch64 again since it doesn't work
- Fixed a build failure issue. (bsc#1182016)
- Fix for memory miscompilation on 'aarch64'. (bsc#1178624, bsc#1178577)
- Fix 32bit 'libgnat.so' link. (bsc#1178675)
- prepare usrmerge: Install libgcc_s into %_libdir. ABI wise it stays /%lib. (bsc#1029961)
- Build complete set of multilibs for arm-none target. (bsc#1106014)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:1917-1
Released:    Wed Jun  9 14:48:05 2021
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1186015,CVE-2021-3541
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1926-1
Released:    Thu Jun 10 08:38:14 2021
Summary:     Recommended update for gcc
Type:        recommended
Severity:    moderate
References:  1096677
This update for gcc fixes the following issues:

- Added gccgo symlink and go and gofmt as alternatives to support parallel installation
  of golang (bsc#1096677)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:1953-1
Released:    Thu Jun 10 16:18:50 2021
Summary:     Recommended update for gpg2
Type:        recommended
Severity:    moderate
References:  1161268,1172308
This update for gpg2 fixes the following issues:

- Fixed an issue where the gpg-agent's ssh-agent does not handle flags 
  in signing requests properly (bsc#1161268 and bsc#1172308).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2143-1
Released:    Wed Jun 23 16:27:04 2021
Summary:     Security update for libnettle
Type:        security
Severity:    important
References:  1187060,CVE-2021-3580
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2157-1
Released:    Thu Jun 24 15:40:14 2021
Summary:     Security update for libgcrypt
Type:        security
Severity:    important
References:  1187212,CVE-2021-33560
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2173-1
Released:    Mon Jun 28 14:59:45 2021
Summary:     Recommended update for automake
Type:        recommended
Severity:    moderate
References:  1040589,1047218,1182604,1185540,1186049
This update for automake fixes the following issues:

- Implement generated autoconf makefiles reproducible (bsc#1182604)
- Add fix to avoid date variations in docs. (bsc#1047218, jsc#SLE-17848)
- Avoid bashisms in test-driver script. (bsc#1185540)

This update for pcre fixes the following issues:

- Do not run profiling 'check' in parallel to make package build reproducible. (bsc#1040589)

This update for brp-check-suse fixes the following issues:

- Add fixes to support reproducible builds. (bsc#1186049) 


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2178-1
Released:    Mon Jun 28 15:56:15 2021
Summary:     Recommended update for systemd-presets-common-SUSE
Type:        recommended
Severity:    moderate
References:  1186561
This update for systemd-presets-common-SUSE fixes the following issues:

When installing the systemd-presets-common-SUSE package for the
first time in a new system, it might happen that some services
are installed before systemd so the %systemd_pre/post macros
would not work. This is handled by enabling all preset services
in this package's %posttrans section but it wasn't enabling
user services, just system services. Now it enables also the
user services installed before this package (bsc#1186561)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2196-1
Released:    Tue Jun 29 09:41:39 2021
Summary:     Security update for lua53
Type:        security
Severity:    moderate
References:  1175448,1175449,CVE-2020-24370,CVE-2020-24371
This update for lua53 fixes the following issues:

Update to version 5.3.6:

- CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
- CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
- Long brackets with a huge number of '=' overflow some internal buffer arithmetic.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2205-1
Released:    Wed Jun 30 09:17:41 2021
Summary:     Recommended update for openldap2
Type:        recommended
Severity:    important
References:  1187210
This update for openldap2 fixes the following issues:

- Resolve issues in the idle / connection 'TTL' timeout implementation in OpenLDAP. (bsc#1187210)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2246-1
Released:    Mon Jul  5 15:17:49 2021
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1154935,1167471,1178561,1184761,1184967,1185046,1185331,1185807,1185958,1187292,1187400
This update for systemd fixes the following issues:

  cgroup: Parse infinity properly for memory protections. (bsc#1167471)
  cgroup: Make empty assignments reset to default. (bsc#1167471)
  cgroup: Support 0-value for memory protection directives. (bsc#1167471)
  core/cgroup: Fixed an issue with ignored parameter of 'MemorySwapMax=0'. (bsc#1154935)
  bus-unit-util: Add proper 'MemorySwapMax' serialization.
  core: Accept MemorySwapMax= properties that are scaled.
  execute: Make sure to call into PAM after initializing resource limits. (bsc#1184967)
  core: Rename 'ShutdownWatchdogSec' to 'RebootWatchdogSec'. (bsc#1185331)
  Return -EAGAIN instead of -EALREADY from unit_reload. (bsc#1185046)
  rules: Don't ignore Xen virtual interfaces anymore. (bsc#1178561)
  write_net_rules: Set execute bits. (bsc#1178561)
  udev: Rework network device renaming.
  Revert 'Revert 'udev: Network device renaming - immediately give up if the target name isn't available''
    
  mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)
  core: fix output (logging) for mount units (#7603) (bsc#1187400)
  udev requires systemd in its %post (bsc#1185958)
  cgroup: Parse infinity properly for memory protections (bsc#1167471)
  cgroup: Make empty assignments reset to default (bsc#1167471)
  cgroup: Support 0-value for memory protection directives (bsc#1167471)
  Create /run/lock/subsys again (bsc#1187292)
  The creation of this directory was mistakenly dropped when
  'filesystem' package took the initialization of the generic paths
  over.
  Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)
  
  

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2292-1
Released:    Mon Jul 12 08:25:20 2021
Summary:     Security update for dbus-1
Type:        security
Severity:    important
References:  1187105,CVE-2020-35512
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a use-after-free or potential undefined behaviour caused by shared UID's (bsc#1187105)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2320-1
Released:    Wed Jul 14 17:01:06 2021
Summary:     Security update for sqlite3
Type:        security
Severity:    important
References:  1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701,CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327
This update for sqlite3 fixes the following issues:

- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
  optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling  of  certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling  of certain errors during parsing  multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
  (bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
  a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
  columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2404-1
Released:    Tue Jul 20 14:21:30 2021
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1184994,1188063,CVE-2021-33910
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape() (bsc#1188063)
- Skip udev rules if 'elevator=' is used (bsc#1184994)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2440-1
Released:    Wed Jul 21 13:48:24 2021
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1188217,1188218,1188219,1188220,CVE-2021-22922,CVE-2021-22923,CVE-2021-22924,CVE-2021-22925
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2689-1
Released:    Mon Aug 16 10:54:52 2021
Summary:     Security update for cpio
Type:        security
Severity:    important
References:  1189206,CVE-2021-38185
This update for cpio fixes the following issues:

It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2760-1
Released:    Tue Aug 17 17:11:14 2021
Summary:     Security update for c-ares
Type:        security
Severity:    important
References:  1188881,CVE-2021-3672
This update for c-ares fixes the following issues:

Version update to git snapshot 1.17.1+20200724:

- CVE-2021-3672: fixed missing input validation on hostnames returned by DNS servers (bsc#1188881)
- If ares_getaddrinfo() was terminated by an ares_destroy(), it would cause crash
- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected DNS response
- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to prevent spoofing
- Use unbuffered /dev/urandom for random data to prevent early startup performance issues

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2763-1
Released:    Tue Aug 17 17:16:22 2021
Summary:     Recommended update for cpio
Type:        recommended
Severity:    critical
References:  1189465
This update for cpio fixes the following issues:

- A regression in last update would cause builds to hang on various architectures(bsc#1189465)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2780-1
Released:    Thu Aug 19 16:09:15 2021
Summary:     Recommended update for cpio
Type:        recommended
Severity:    critical
References:  1189465,CVE-2021-38185
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2800-1
Released:    Fri Aug 20 10:43:04 2021
Summary:     Security update for krb5
Type:        security
Severity:    important
References:  1188571,CVE-2021-36222
This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2810-1
Released:    Mon Aug 23 12:14:30 2021
Summary:     Security update for dbus-1
Type:        security
Severity:    moderate
References:  1172505,CVE-2020-12049
This update for dbus-1 fixes the following issues:

- CVE-2020-12049: truncated messages lead to resource exhaustion. (bsc#1172505)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2831-1
Released:    Tue Aug 24 16:20:45 2021
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1189521,CVE-2021-3712
This update for openssl-1_1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2938-1
Released:    Fri Sep  3 09:19:36 2021
Summary:     Recommended update for openldap2
Type:        recommended
Severity:    moderate
References:  1184614

This update for openldap2 fixes the following issue:

- openldap2-contrib is shipped to the Legacy Module. (bsc#1184614)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2968-1
Released:    Tue Sep  7 09:53:00 2021
Summary:     Security update for openssl-1_1
Type:        security
Severity:    low
References:  1189521,CVE-2021-3712
This update for openssl-1_1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2993-1
Released:    Thu Sep  9 14:31:33 2021
Summary:     Recommended update for gcc
Type:        recommended
Severity:    moderate
References:  1185348
This update for gcc fixes the following issues:

- With gcc-PIE add -pie even when -fPIC is specified but we are
  not linking a shared library.  [bsc#1185348]
- Fix postun of gcc-go alternative.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3001-1
Released:    Thu Sep  9 15:08:13 2021
Summary:     Recommended update for netcfg
Type:        recommended
Severity:    moderate
References:  1189683
This update for netcfg fixes the following issues:

- add submissions port/protocol to services file for message submission over TLS protocol [bsc#1189683]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3022-1
Released:    Mon Sep 13 10:48:16 2021
Summary:     Recommended update for c-ares
Type:        recommended
Severity:    important
References:  1190225
This update for c-ares fixes the following issue:

- Allow '_' as part of DNS response. (bsc#1190225)
  - 'c-ares' 1.17.2 introduced response validation to prevent a security issue, however it was not listing '_' as a 
    valid character for domain name responses which caused issues when a 'CNAME' referenced a 'SRV' record which 
    contained underscores.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3182-1
Released:    Tue Sep 21 17:04:26 2021
Summary:     Recommended update for file
Type:        recommended
Severity:    moderate
References:  1189996
This update for file fixes the following issues:

- Fixes exception thrown by memory allocation problem (bsc#1189996)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3297-1
Released:    Wed Oct  6 16:53:29 2021
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1190373,1190374,CVE-2021-22946,CVE-2021-22947
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3348-1
Released:    Tue Oct 12 13:08:06 2021
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1134353,1171962,1184994,1188018,1188063,1188291,1188713,1189480,1190234,CVE-2021-33910
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

- logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).
- Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).
- Rules weren't applied to dm devices (multipath) (bsc#1188713).
- Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).
- Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).
- Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).
- Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3385-1
Released:    Tue Oct 12 15:54:31 2021
Summary:     Security update for glibc
Type:        security
Severity:    moderate
References:  1186489,1187911,CVE-2021-33574,CVE-2021-35942
This update for glibc fixes the following issues:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3447-1
Released:    Fri Oct 15 09:05:12 2021
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1148868,1152489,1154353,1159886,1167773,1170774,1173746,1176940,1184439,1184804,1185302,1185677,1185726,1185762,1187167,1188067,1188651,1188986,1189297,1189841,1189884,1190023,1190062,1190115,1190159,1190358,1190406,1190432,1190467,1190523,1190534,1190543,1190576,1190595,1190596,1190598,1190620,1190626,1190679,1190705,1190717,1190746,1190758,1190784,1190785,1191172,1191193,1191240,1191292,CVE-2020-3702,CVE-2021-3669,CVE-2021-3744,CVE-2021-3752,CVE-2021-3764,CVE-2021-40490


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis->pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs->nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3454-1
Released:    Mon Oct 18 09:29:26 2021
Summary:     Security update for krb5
Type:        security
Severity:    moderate
References:  1189929,CVE-2021-37750
This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3480-1
Released:    Wed Oct 20 11:24:10 2021
Summary:     Recommended update for yast2-network
Type:        recommended
Severity:    moderate
References:  1185016,1185524,1186910,1187270,1187512,1188344,1190645,1190739,1190915,1190933
This update for yast2-network fixes the following issues:

- Don't crash when the interfaces table contains a not configured one (bnc#1190645, bsc#1190915).
- Fix the shown description using the interface friendly name when it is empty (bsc#1190933).
- Consider aliases sections as case insensitive (bsc#1190739).
- Display user defined device name in the devices overview (bnc#1190645).
- Don't crash when defined aliases in AutoYaST profile are not defined as a map (bsc#1188344).
- Support 'boot' and 'on' as aliases for the 'auto' startmode (bsc#1186910).
- Fix desktop file so the control center tooltip is translated (bsc#1187270).
- Use the linuxrc proxy settings for the HTTPS and FTP proxies (bsc#1185016).
- Don't crash at the end of installation when storing wifi configuration for NetworkManager (bsc#1185524, bsc#1187512).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3490-1
Released:    Wed Oct 20 16:31:55 2021
Summary:     Security update for ncurses
Type:        security
Severity:    moderate
References:  1190793,CVE-2021-39537
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3494-1
Released:    Wed Oct 20 16:48:46 2021
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1190052
This update for pam fixes the following issues:

- Added pam_faillock to the set of available PAM modules. (jsc#SLE-20638)
- Added new file macros.pam on request of systemd. (bsc#1190052)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3510-1
Released:    Tue Oct 26 11:22:15 2021
Summary:     Recommended update for pam
Type:        recommended
Severity:    important
References:  1191987
This update for pam fixes the following issues:

- Fixed a bad directive file which resulted in
  the 'securetty' file to be installed as 'macros.pam'.
  (bsc#1191987)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3523-1
Released:    Tue Oct 26 15:40:13 2021
Summary:     Security update for util-linux
Type:        security
Severity:    moderate
References:  1122417,1125886,1178236,1188921,CVE-2021-37600
This update for util-linux fixes the following issues:

Update to version 2.33.2 to provide seamless update from SLE12 SP5 to SLE15 SP2:

- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c (bsc#1188921).
- agetty: Fix 8-bit processing in get_logname() (bsc#1125886).
- mount: Fix 'mount' output for net file systems (bsc#1122417).
- ipcs: Avoid overflows (bsc#1178236)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3529-1
Released:    Wed Oct 27 09:23:32 2021
Summary:     Security update for pcre
Type:        security
Severity:    moderate
References:  1172973,1172974,CVE-2019-20838,CVE-2020-14155
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3616-1
Released:    Thu Nov  4 12:29:16 2021
Summary:     Security update for binutils
Type:        security
Severity:    moderate
References:  1179898,1179899,1179900,1179901,1179902,1179903,1180451,1180454,1180461,1181452,1182252,1183511,1184620,1184794,CVE-2020-16590,CVE-2020-16591,CVE-2020-16592,CVE-2020-16593,CVE-2020-16598,CVE-2020-16599,CVE-2020-35448,CVE-2020-35493,CVE-2020-35496,CVE-2020-35507,CVE-2021-20197,CVE-2021-20284,CVE-2021-3487
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.

* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

   * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
     Locker instructions. 
   * Support non-absolute segment values for lcall and ljmp.
   * Add {disp16} pseudo prefix to x86 assembler.
   * Configure with --enable-x86-used-note by default for Linux/x86.

-  ARM/AArch64:

   * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
     Cortex-R82, Neoverse V1, and Neoverse N2 cores.
   * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
     Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
     Stack Recorder Extension) and BRBE (Branch Record Buffer
     Extension) system registers.
   * Add support for Armv8-R and Armv8.7-A ISA extensions.
   * Add support for DSB memory nXS barrier, WFET and WFIT
     instruction for Armv8.7.
   * Add support for +csre feature for -march. Add CSR PDEC
     instruction for CSRE feature in AArch64.
   * Add support for +flagm feature for -march in Armv8.4 AArch64.
   * Add support for +ls64 feature for -march in Armv8.7
     AArch64. Add atomic 64-byte load/store instructions for this
     feature. 
   * Add support for +pauth (Pointer Authentication) feature for
     -march in AArch64.

New features in the Linker:

  * Add --error-handling-script= command line option to allow
    a helper script to be invoked when an undefined symbol or a
    missing library is encountered.  This option can be suppressed
    via the configure time switch: --enable-error-handling-script=no.
  * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
    x86-64-{baseline|v[234]} ISA level as needed.
  * Add -z unique-symbol to avoid duplicated local symbol names.
  * The creation of PE format DLLs now defaults to using a more
    secure set of DLL characteristics.
  * The linker now deduplicates the types in .ctf sections.  The new 
     command-line option --ctf-share-types describes how to do this:
     its default value, share-unconflicted, produces the most compact
     output.
  * The linker now omits the 'variable section' from .ctf sections
    by default, saving space.  This is almost certainly what you
    want unless you are working on a project that has its own
    analogue of symbol tables that are not reflected in the ELF
    symtabs.

New features in other binary tools:

  * The ar tool's previously unused l modifier is now used for
    specifying dependencies of a static library. The arguments of
    this option (or --record-libdeps long form option) will be
    stored verbatim in the __.LIBDEP member of the archive, which
    the linker may read at link time.
  * Readelf can now display the contents of LTO symbol table
    sections when asked to do so via the --lto-syms command line
    option.
  * Readelf now accepts the -C command line option to enable the
    demangling of symbol names.  In addition the --demangle=

SUSE: 2022:69-1 caasp/v4/cilium Security Update

January 27, 2022
The container caasp/v4/cilium was updated

Summary

Advisory ID: SUSE-RU-2020:3792-1 Released: Mon Dec 14 17:39:24 2020 Summary: Recommended update for gzip Type: recommended Severity: moderate Advisory ID: SUSE-RU-2020:3840-1 Released: Wed Dec 16 10:32:03 2020 Summary: Recommended update for llvm7 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2020:3853-1 Released: Wed Dec 16 12:27:27 2020 Summary: Recommended update for util-linux Type: recommended Severity: moderate Advisory ID: SUSE-RU-2020:3942-1 Released: Tue Dec 29 12:22:01 2020 Summary: Recommended update for libidn2 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2020:3943-1 Released: Tue Dec 29 12:24:45 2020 Summary: Recommended update for libxml2 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:79-1 Released: Tue Jan 12 10:49:34 2021 Summary: Recommended update for gcc7 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:129-1 Released: Thu Jan 14 12:26:15 2021 Summary: Security update for openldap2 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:220-1 Released: Tue Jan 26 14:00:51 2021 Summary: Recommended update for keyutils Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:233-1 Released: Wed Jan 27 12:15:33 2021 Summary: Recommended update for systemd Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:265-1 Released: Mon Feb 1 15:06:45 2021 Summary: Recommended update for systemd Type: recommended Severity: important Advisory ID: SUSE-RU-2021:266-1 Released: Mon Feb 1 21:02:37 2021 Summary: Recommended update for lvm2 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:293-1 Released: Wed Feb 3 12:52:34 2021 Summary: Recommended update for gmp Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:304-1 Released: Thu Feb 4 13:19:43 2021 Summary: Recommended update for lvm2 Type: recommended Severity: important Advisory ID: SUSE-RU-2021:305-1 Released: Thu Feb 4 15:00:37 2021 Summary: Recommended update for libprotobuf Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:307-1 Released: Fri Feb 5 05:30:34 2021 Summary: Recommended update for libselinux Type: recommended Severity: low Advisory ID: SUSE-OU-2021:339-1 Released: Mon Feb 8 13:16:07 2021 Summary: Optional update for pam Type: optional Severity: low Advisory ID: SUSE-RU-2021:596-1 Released: Thu Feb 25 10:26:30 2021 Summary: Recommended update for gcc7 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:653-1 Released: Fri Feb 26 19:53:43 2021 Summary: Security update for glibc Type: security Severity: important Advisory ID: SUSE-SU-2021:723-1 Released: Mon Mar 8 16:45:27 2021 Summary: Security update for openldap2 Type: security Severity: important Advisory ID: SUSE-SU-2021:753-1 Released: Tue Mar 9 17:09:57 2021 Summary: Security update for openssl-1_1 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:786-1 Released: Mon Mar 15 11:19:23 2021 Summary: Recommended update for zlib Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:890-1 Released: Fri Mar 19 15:51:41 2021 Summary: Security update for glib2 Type: security Severity: important Advisory ID: SUSE-RU-2021:924-1 Released: Tue Mar 23 10:00:49 2021 Summary: Recommended update for filesystem Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:926-1 Released: Tue Mar 23 13:20:24 2021 Summary: Recommended update for systemd-presets-common-SUSE Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:934-1 Released: Wed Mar 24 12:18:21 2021 Summary: Security update for gnutls Type: security Severity: important Advisory ID: SUSE-SU-2021:948-1 Released: Wed Mar 24 14:31:34 2021 Summary: Security update for zstd Type: security Severity: moderate Advisory ID: SUSE-RU-2021:952-1 Released: Thu Mar 25 14:36:56 2021 Summary: Recommended update for libunwind Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:956-1 Released: Thu Mar 25 19:19:02 2021 Summary: Security update for libzypp, zypper Type: security Severity: moderate Advisory ID: SUSE-RU-2021:1004-1 Released: Thu Apr 1 15:07:09 2021 Summary: Recommended update for libcap Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1141-1 Released: Mon Apr 12 13:13:36 2021 Summary: Recommended update for openldap2 Type: recommended Severity: low Advisory ID: SUSE-RU-2021:1169-1 Released: Tue Apr 13 15:01:42 2021 Summary: Recommended update for procps Type: recommended Severity: low Advisory ID: SUSE-RU-2021:1291-1 Released: Wed Apr 21 14:04:06 2021 Summary: Recommended update for mpfr Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1295-1 Released: Wed Apr 21 14:08:19 2021 Summary: Recommended update for systemd-presets-common-SUSE Type: recommended Severity: moderate Advisory ID: SUSE-OU-2021:1296-1 Released: Wed Apr 21 14:09:28 2021 Summary: Optional update for e2fsprogs Type: optional Severity: low Advisory ID: SUSE-RU-2021:1297-1 Released: Wed Apr 21 14:10:10 2021 Summary: Recommended update for systemd Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1407-1 Released: Wed Apr 28 15:49:02 2021 Summary: Recommended update for libcap Type: recommended Severity: important Advisory ID: SUSE-SU-2021:1412-1 Released: Wed Apr 28 17:09:28 2021 Summary: Security update for libnettle Type: security Severity: important Advisory ID: SUSE-RU-2021:1449-1 Released: Fri Apr 30 08:08:25 2021 Summary: Recommended update for systemd-presets-branding-SLE Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:1523-1 Released: Wed May 5 18:24:20 2021 Summary: Security update for libxml2 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:1527-1 Released: Thu May 6 08:58:53 2021 Summary: Recommended update for bash Type: recommended Severity: important Advisory ID: SUSE-RU-2021:1543-1 Released: Fri May 7 15:16:32 2021 Summary: Recommended update for patterns-microos Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1549-1 Released: Mon May 10 13:48:00 2021 Summary: Recommended update for procps Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1565-1 Released: Tue May 11 14:20:04 2021 Summary: Recommended update for krb5 Type: recommended Severity: moderate Advisory ID: SUSE-OU-2021:1592-1 Released: Wed May 12 13:47:41 2021 Summary: Optional update for sed Type: optional Severity: low Advisory ID: SUSE-RU-2021:1602-1 Released: Thu May 13 16:35:19 2021 Summary: Recommended update for libsolv, libzypp Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1612-1 Released: Fri May 14 17:09:39 2021 Summary: Recommended update for openldap2 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1618-1 Released: Mon May 17 13:11:28 2021 Summary: Recommended update for llvm7 and libqt5-qttools Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1643-1 Released: Wed May 19 13:51:48 2021 Summary: Recommended update for pam Type: recommended Severity: important Advisory ID: SUSE-SU-2021:1647-1 Released: Wed May 19 13:59:12 2021 Summary: Security update for lz4 Type: security Severity: important Advisory ID: SUSE-SU-2021:1654-1 Released: Wed May 19 16:43:36 2021 Summary: Security update for libxml2 Type: security Severity: important Advisory ID: SUSE-SU-2021:1809-1 Released: Mon May 31 16:24:59 2021 Summary: Security update for curl Type: security Severity: moderate Advisory ID: SUSE-RU-2021:1861-1 Released: Fri Jun 4 09:59:40 2021 Summary: Recommended update for gcc10 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:1917-1 Released: Wed Jun 9 14:48:05 2021 Summary: Security update for libxml2 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:1926-1 Released: Thu Jun 10 08:38:14 2021 Summary: Recommended update for gcc Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:1953-1 Released: Thu Jun 10 16:18:50 2021 Summary: Recommended update for gpg2 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:2143-1 Released: Wed Jun 23 16:27:04 2021 Summary: Security update for libnettle Type: security Severity: important Advisory ID: SUSE-SU-2021:2157-1 Released: Thu Jun 24 15:40:14 2021 Summary: Security update for libgcrypt Type: security Severity: important Advisory ID: SUSE-RU-2021:2173-1 Released: Mon Jun 28 14:59:45 2021 Summary: Recommended update for automake Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:2178-1 Released: Mon Jun 28 15:56:15 2021 Summary: Recommended update for systemd-presets-common-SUSE Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:2196-1 Released: Tue Jun 29 09:41:39 2021 Summary: Security update for lua53 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:2205-1 Released: Wed Jun 30 09:17:41 2021 Summary: Recommended update for openldap2 Type: recommended Severity: important Advisory ID: SUSE-RU-2021:2246-1 Released: Mon Jul 5 15:17:49 2021 Summary: Recommended update for systemd Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:2292-1 Released: Mon Jul 12 08:25:20 2021 Summary: Security update for dbus-1 Type: security Severity: important Advisory ID: SUSE-SU-2021:2320-1 Released: Wed Jul 14 17:01:06 2021 Summary: Security update for sqlite3 Type: security Severity: important Advisory ID: SUSE-SU-2021:2404-1 Released: Tue Jul 20 14:21:30 2021 Summary: Security update for systemd Type: security Severity: moderate Advisory ID: SUSE-SU-2021:2440-1 Released: Wed Jul 21 13:48:24 2021 Summary: Security update for curl Type: security Severity: moderate Advisory ID: SUSE-SU-2021:2689-1 Released: Mon Aug 16 10:54:52 2021 Summary: Security update for cpio Type: security Severity: important Advisory ID: SUSE-SU-2021:2760-1 Released: Tue Aug 17 17:11:14 2021 Summary: Security update for c-ares Type: security Severity: important Advisory ID: SUSE-RU-2021:2763-1 Released: Tue Aug 17 17:16:22 2021 Summary: Recommended update for cpio Type: recommended Severity: critical Advisory ID: SUSE-RU-2021:2780-1 Released: Thu Aug 19 16:09:15 2021 Summary: Recommended update for cpio Type: recommended Severity: critical Advisory ID: SUSE-SU-2021:2800-1 Released: Fri Aug 20 10:43:04 2021 Summary: Security update for krb5 Type: security Severity: important Advisory ID: SUSE-SU-2021:2810-1 Released: Mon Aug 23 12:14:30 2021 Summary: Security update for dbus-1 Type: security Severity: moderate Advisory ID: SUSE-SU-2021:2831-1 Released: Tue Aug 24 16:20:45 2021 Summary: Security update for openssl-1_1 Type: security Severity: important Advisory ID: SUSE-RU-2021:2938-1 Released: Fri Sep 3 09:19:36 2021 Summary: Recommended update for openldap2 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:2968-1 Released: Tue Sep 7 09:53:00 2021 Summary: Security update for openssl-1_1 Type: security Severity: low Advisory ID: SUSE-RU-2021:2993-1 Released: Thu Sep 9 14:31:33 2021 Summary: Recommended update for gcc Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3001-1 Released: Thu Sep 9 15:08:13 2021 Summary: Recommended update for netcfg Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3022-1 Released: Mon Sep 13 10:48:16 2021 Summary: Recommended update for c-ares Type: recommended Severity: important Advisory ID: SUSE-RU-2021:3182-1 Released: Tue Sep 21 17:04:26 2021 Summary: Recommended update for file Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:3297-1 Released: Wed Oct 6 16:53:29 2021 Summary: Security update for curl Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3348-1 Released: Tue Oct 12 13:08:06 2021 Summary: Security update for systemd Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3385-1 Released: Tue Oct 12 15:54:31 2021 Summary: Security update for glibc Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3447-1 Released: Fri Oct 15 09:05:12 2021 Summary: Security update for the Linux Kernel Type: security Severity: important Advisory ID: SUSE-SU-2021:3454-1 Released: Mon Oct 18 09:29:26 2021 Summary: Security update for krb5 Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3480-1 Released: Wed Oct 20 11:24:10 2021 Summary: Recommended update for yast2-network Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:3490-1 Released: Wed Oct 20 16:31:55 2021 Summary: Security update for ncurses Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3494-1 Released: Wed Oct 20 16:48:46 2021 Summary: Recommended update for pam Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3510-1 Released: Tue Oct 26 11:22:15 2021 Summary: Recommended update for pam Type: recommended Severity: important Advisory ID: SUSE-SU-2021:3523-1 Released: Tue Oct 26 15:40:13 2021 Summary: Security update for util-linux Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3529-1 Released: Wed Oct 27 09:23:32 2021 Summary: Security update for pcre Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3616-1 Released: Thu Nov 4 12:29:16 2021 Summary: Security update for binutils Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3643-1 Released: Tue Nov 9 19:32:18 2021 Summary: Security update for binutils Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3781-1 Released: Tue Nov 23 23:48:43 2021 Summary: This update for libzypp, zypper and libsolv fixes the following issues: Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3798-1 Released: Wed Nov 24 18:01:36 2021 Summary: Recommended update for gcc7 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3799-1 Released: Wed Nov 24 18:07:54 2021 Summary: Recommended update for gcc11 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:3809-1 Released: Fri Nov 26 00:31:59 2021 Summary: Recommended update for systemd Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:3830-1 Released: Wed Dec 1 13:45:46 2021 Summary: Security update for glibc Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3891-1 Released: Fri Dec 3 10:21:49 2021 Summary: Recommended update for keyutils Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:3899-1 Released: Fri Dec 3 11:27:41 2021 Summary: Security update for aaa_base Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3930-1 Released: Mon Dec 6 11:16:10 2021 Summary: Recommended update for curl Type: recommended Severity: moderate Advisory ID: SUSE-SU-2021:3946-1 Released: Mon Dec 6 14:57:42 2021 Summary: Security update for gmp Type: security Severity: moderate Advisory ID: SUSE-RU-2021:4017-1 Released: Tue Dec 14 07:26:55 2021 Summary: Recommended update for openssl-1_1 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2021:4139-1 Released: Tue Dec 21 17:02:44 2021 Summary: Recommended update for systemd Type: recommended Severity: critical Advisory ID: SUSE-SU-2021:4154-1 Released: Wed Dec 22 11:02:38 2021 Summary: Security update for p11-kit Type: security Severity: important Advisory ID: SUSE-RU-2021:4182-1 Released: Thu Dec 23 11:51:51 2021 Summary: Recommended update for zlib Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:4-1 Released: Mon Jan 3 08:28:54 2022 Summary: Recommended update for libgcrypt Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:49-1 Released: Tue Jan 11 09:19:15 2022 Summary: Recommended update for apparmor Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:57-1 Released: Wed Jan 12 07:10:42 2022 Summary: Recommended update for libzypp Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:178-1 Released: Tue Jan 25 14:16:23 2022 Summary: Security update for expat Type: security Severity: important Advisory ID: SUSE-SU-2022:184-1 Released: Tue Jan 25 18:20:56 2022 Summary: Security update for json-c Type: security Severity: important

References

References : 1027496 1029961 1029961 1040589 1047218 1050625 1065729 1067478

1078466 1083473 1084671 1096677 1106014 1109367 1112500 1113013

1115408 1122417 1125886 1134353 1141190 1141597 1145085 1145276

1146705 1148868 1152489 1153687 1154353 1154935 1157818 1158812

1158958 1158959 1158960 1159491 1159715 1159847 1159850 1159886

1160309 1160438 1160439 1160876 1161268 1162581 1164719 1165780

1165780 1167471 1167773 1167939 1169006 1170774 1171479 1171549

1171962 1172091 1172115 1172234 1172236 1172240 1172308 1172505

1172973 1172974 1173641 1173746 1174016 1174436 1174504 1174942

1175448 1175449 1175458 1175514 1175519 1175623 1176201 1176940

1176964 1177238 1177275 1177427 1177490 1177533 1177583 1177976

1178219 1178236 1178386 1178554 1178561 1178577 1178624 1178675

1178775 1178775 1178823 1178825 1178909 1178910 1178966 1179083

1179155 1179222 1179326 1179363 1179503 1179691 1179691 1179694

1179721 1179738 1179816 1179824 1179847 1179898 1179899 1179900

1179901 1179902 1179903 1179909 1180020 1180038 1180064 1180073

1180077 1180083 1180138 1180225 1180451 1180454 1180461 1180596

1180603 1180603 1180603 1180663 1180721 1180851 1180885 1180995

1181011 1181328 1181443 1181452 1181505 1181618 1181622 1181831

1181874 1181976 1182016 1182117 1182252 1182279 1182328 1182331

1182333 1182362 1182372 1182408 1182411 1182412 1182413 1182415

1182416 1182417 1182418 1182419 1182420 1182604 1182629 1182791

1182936 1183012 1183064 1183085 1183094 1183268 1183370 1183371

1183456 1183457 1183511 1183589 1183628 1183791 1183797 1183909

1183933 1184136 1184326 1184358 1184399 1184401 1184435 1184439

1184519 1184614 1184614 1184620 1184690 1184761 1184794 1184804

1184920 1184967 1184994 1184994 1184997 1184997 1185016 1185046

1185163 1185239 1185302 1185325 1185331 1185348 1185408 1185408

1185409 1185409 1185410 1185410 1185417 1185438 1185524 1185540

1185562 1185677 1185698 1185726 1185762 1185807 1185958 1186015

1186049 1186114 1186447 1186489 1186503 1186561 1186602 1186910

1187060 1187105 1187153 1187167 1187210 1187212 1187224 1187270

1187273 1187292 1187400 1187425 1187466 1187512 1187654 1187738

1187760 1187911 1187993 1188018 1188063 1188063 1188067 1188156

1188217 1188218 1188219 1188220 1188291 1188344 1188435 1188571

1188623 1188651 1188713 1188881 1188921 1188941 1188986 1189031

1189206 1189297 1189465 1189465 1189480 1189521 1189521 1189683

1189803 1189841 1189884 1189929 1189996 1190023 1190052 1190059

1190062 1190115 1190159 1190199 1190225 1190234 1190325 1190356

1190358 1190373 1190374 1190406 1190432 1190440 1190465 1190467

1190523 1190534 1190543 1190576 1190595 1190596 1190598 1190620

1190626 1190645 1190679 1190705 1190712 1190717 1190739 1190746

1190758 1190784 1190785 1190793 1190815 1190915 1190933 1190984

1191172 1191193 1191240 1191252 1191286 1191292 1191324 1191370

1191473 1191563 1191609 1191690 1191987 1192161 1192248 1192267

1192337 1192436 1192688 1192717 1192790 1193480 1193481 1193488

1193521 1194251 1194362 1194474 1194476 1194477 1194478 1194479

1194480 928700 928701 954813 CVE-2015-3414 CVE-2015-3415 CVE-2016-10228

CVE-2017-9271 CVE-2019-19244 CVE-2019-19317 CVE-2019-19603 CVE-2019-19645

CVE-2019-19646 CVE-2019-19880 CVE-2019-19923 CVE-2019-19924 CVE-2019-19925

CVE-2019-19926 CVE-2019-19959 CVE-2019-20218 CVE-2019-20838 CVE-2019-25013

CVE-2020-12049 CVE-2020-12762 CVE-2020-13434 CVE-2020-13435 CVE-2020-13630

CVE-2020-13631 CVE-2020-13632 CVE-2020-14155 CVE-2020-15358 CVE-2020-16590

CVE-2020-16591 CVE-2020-16592 CVE-2020-16593 CVE-2020-16598 CVE-2020-16599

CVE-2020-24370 CVE-2020-24371 CVE-2020-25709 CVE-2020-25710 CVE-2020-27618

CVE-2020-29361 CVE-2020-29562 CVE-2020-29573 CVE-2020-35448 CVE-2020-35493

CVE-2020-35496 CVE-2020-35507 CVE-2020-35512 CVE-2020-36221 CVE-2020-36222

CVE-2020-36223 CVE-2020-36224 CVE-2020-36225 CVE-2020-36226 CVE-2020-36227

CVE-2020-36228 CVE-2020-36229 CVE-2020-36230 CVE-2020-3702 CVE-2020-9327

CVE-2021-20197 CVE-2021-20231 CVE-2021-20232 CVE-2021-20284 CVE-2021-20294

CVE-2021-20305 CVE-2021-22876 CVE-2021-22898 CVE-2021-22922 CVE-2021-22923

CVE-2021-22924 CVE-2021-22925 CVE-2021-22946 CVE-2021-22947 CVE-2021-23840

CVE-2021-23841 CVE-2021-24031 CVE-2021-24032 CVE-2021-27212 CVE-2021-27218

CVE-2021-27219 CVE-2021-3326 CVE-2021-33560 CVE-2021-33574 CVE-2021-33910

CVE-2021-33910 CVE-2021-3487 CVE-2021-3516 CVE-2021-3516 CVE-2021-3517

CVE-2021-3517 CVE-2021-3518 CVE-2021-3518 CVE-2021-3520 CVE-2021-3537

CVE-2021-3541 CVE-2021-3580 CVE-2021-35942 CVE-2021-36222 CVE-2021-3669

CVE-2021-3672 CVE-2021-3712 CVE-2021-3712 CVE-2021-3744 CVE-2021-3752

CVE-2021-37600 CVE-2021-3764 CVE-2021-37750 CVE-2021-38185 CVE-2021-38185

CVE-2021-39537 CVE-2021-40490 CVE-2021-43618 CVE-2021-45960 CVE-2021-46143

CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826

CVE-2022-22827

1145276

This update for gzip fixes the following issues:

Update from version 1.9 to version 1.10 (jsc#ECO-2217, jsc#SLE-12974)

- Enable `DFLTCC` (Deflate Conversion Call) compression for s390x for levels 1-6 to `CFLAGS`. (jsc#SLE-13775)

Enable by adding `-DDFLTCC_LEVEL_MASK=0x7e` to `CFLAGS`.

- Fix three data corruption issues. (bsc#1145276, jsc#SLE-5818, jsc#SLE-8914)

- Add support for `DFLTCC` (hardware-accelerated deflation) for s390x arch. (jsc#SLE-5818, jsc#SLE-8914)

Enable it using the `--enable-dfltcc` option.

- Compressed gzip output no longer contains the current time as a timestamp when the input is not a regular file.

Instead, the output contains a `null` (zero) timestamp. This makes gzip's behavior more reproducible when

used as part of a pipeline.

- A use of uninitialized memory on some malformed inputs has been fixed.

- A few theoretical race conditions in signal handlers have been fixed.

- Update gnulib for `libio.h` removal.

1176964,1179155

This update for llvm7 fixes the following issues:

- Fix dsymutil crash on ELF file. (bsc#1176964)

- Add Conflicts: clang-tools to clang7 and llvm7 packages to properly handle newer llvm versions. (bsc#1179155)

1084671,1169006,1174942,1175514,1175623,1178554,1178825

This update for util-linux fixes the following issue:

- Do not trigger the automatic close of CDROM. (bsc#1084671)

- Try to automatically configure broken serial lines. (bsc#1175514)

- Avoid `sulogin` failing on not existing or not functional console devices. (bsc#1175514)

- Build with `libudev` support to support non-root users. (bsc#1169006)

- Avoid memory errors on PowerPC systems with valid hardware configurations. (bsc#1175623, bsc#1178554, bsc#1178825)

- Fix warning on mounts to `CIFS` with mount –a. (bsc#1174942)

1180138

This update for libidn2 fixes the following issues:

- The library is actually dual licensed, GPL-2.0-or-later or LGPL-3.0-or-later,

adjusted the RPM license tags (bsc#1180138)

1178823

This update for libxml2 fixes the following issues:

Avoid quadratic checking of identity-constraints, speeding up XML validation (bsc#1178823)

* key/unique/keyref schema attributes currently use quadratic loops

to check their various constraints (that keys are unique and that

keyrefs refer to existing keys).

* This fix uses a hash table to avoid the quadratic behaviour.

1167939

This update for gcc7 fixes the following issues:

- Amend the gcc7 aarch64 atomics for glibc namespace violation with getauxval. [bsc#1167939]

1178909,1179503,CVE-2020-25709,CVE-2020-25710

This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

Non-security issue fixed:

- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)

1180603

This update for keyutils fixes the following issues:

- Adjust the library license to be LPGL-2.1+ only (the tools are GPL2+, the library is just LGPL-2.1+) (bsc#1180603)

1141597,1174436,1175458,1177490,1179363,1179824,1180225

This update for systemd fixes the following issues:

- Added a timestamp to the output of the busctl monitor command (bsc#1180225)

- Fixed a NULL pointer dereference bug when attempting to close the journal file handle (bsc#1179824)

- Improved the caching of cgroups member mask (bsc#1175458)

- Fixed the dependency definition of sound.target (bsc#1179363)

- Fixed a bug that could lead to a potential error, when daemon-reload is called between

StartTransientUnit and scope_start() (bsc#1174436)

- time-util: treat /etc/localtime missing as UTC (bsc#1141597)

- Removed mq-deadline selection from 60-io-scheduler.rules (bsc#1177490)

1178775,1180885

This update for systemd fixes the following issues:

- Fix for udev creating '/dev/disk/by-label' symlink for 'LUKS2' to avoid mount issues. (bsc#1180885, #8998))

- Fix for an issue when container start causes interference in other containers. (bsc#1178775)

1177533,1179326,1179691,1179738

This update for lvm2 fixes the following issue:

- Fixes an issue when boot logical volume gets unmounted during patching. (bsc#1177533)

- Fix for lvm2 to use 'external_device_info_source='udev'' by default. (bsc#1179691)

- Fixed an issue in configuration for an item that is commented out by default. (bsc#1179738)

- Fixed an issue when after storage migration major performance issues occurred on the system. (bsc#1179326)

1180603

This update for gmp fixes the following issues:

- correct license statements of packages (library itself is no GPL-3.0) (bsc#1180603)

1179691

This update for lvm2 fixes the following issues:

- lvm2 will no longer use external_device_info_source='udev' as default because it introduced a

regression (bsc#1179691).

If this behavior is still wanted, please change this manually in the lvm.conf

libprotobuf was updated to fix:

- ship the libprotobuf-lite15 on the base products. (jsc#ECO-2911)

1180603

This update for libselinux fixes the following issues:

- Corrected the license to public domain (bsc#1180603)

This update for pam fixes the following issues:

- Added rpm macros for this package, so that other packages can make use of it

This patch is optional to be installed - it doesn't fix any bugs.

1181618

This update for gcc7 fixes the following issues:

- Fixed webkit2gtk3 build (bsc#1181618)

- Change GCC exception licenses to SPDX format

- Remove include-fixed/pthread.h

1178386,1179694,1179721,1180038,1181505,1182117,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2020-29573,CVE-2021-3326

This update for glibc fixes the following issues:

- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)

- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)

- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)

- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)

- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)

- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)

1182279,1182408,1182411,1182412,1182413,1182415,1182416,1182417,1182418,1182419,1182420,CVE-2020-36221,CVE-2020-36222,CVE-2020-36223,CVE-2020-36224,CVE-2020-36225,CVE-2020-36226,CVE-2020-36227,CVE-2020-36228,CVE-2020-36229,CVE-2020-36230,CVE-2021-27212

This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the

X.509 DN parsing in decode.c ber_next_element, resulting in denial

of service.

- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN

parsing in ad_keystring, resulting in denial of service.

- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash

in the Certificate List Exact Assertion processing, resulting in

denial of service.

- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the

cancel_extop Cancel operation, resulting in denial of service.

- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the

saslAuthzTo processing, resulting in denial of service.

- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash

in the saslAuthzTo processing, resulting in denial of service.

- bsc#1182415 CVE-2020-36226 - memch->bv_len miscalculation and slapd

crash in the saslAuthzTo processing, resulting in denial of service.

- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the

saslAuthzTo validation, resulting in denial of service.

- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact

Assertion processing, resulting in denial of service (schema_init.c

serialNumberAndIssuerCheck).

- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter

control handling, resulting in denial of service (double free and

out-of-bounds read).

- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur

in the issuerAndThisUpdateCheck function via a crafted packet,

resulting in a denial of service (daemon exit) via a short timestamp.

This is related to schema_init.c and checkTime.

1182331,1182333,CVE-2021-23840,CVE-2021-23841

This update for openssl-1_1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)

- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)

1176201

This update for zlib fixes the following issues:

- Fixed hw compression on z15 (bsc#1176201)

1182328,1182362,CVE-2021-27218,CVE-2021-27219

This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if the length is larger than guint. (bsc#1182328)

- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)

1078466,1146705,1175519,1178775,1180020,1180083,1180596,1181011,1181831,1183094

This update for filesystem the following issues:

- Remove duplicate line due to merge error

- Add fix for 'mesa' creating cache with perm 0700. (bsc#1181011)

- Fixed an issue causing failure during installation/upgrade a failure. (rh#1548403) (bsc#1146705)

- Allows to override config to add cleanup options of '/var/tmp'. (bsc#1078466)

- Create config to cleanup '/tmp' regular required with 'tmpfs'. (bsc#1175519)

This update for systemd fixes the following issues:

- Fix for a possible memory leak. (bsc#1180020)

- Fix for a case when to a bind mounted directory results inactive mount units. (#7811) (bsc#1180596)

- Fixed an issue when starting a container conflicts with another one. (bsc#1178775)

- Drop most of the tmpfiles that deal with generic paths and avoid warnings. (bsc#1078466, bsc#1181831)

- Don't use shell redirections when calling a rpm macro. (bsc#1183094)

- 'systemd' requires 'aaa_base' >= 13.2. (bsc#1180083)

1083473,1112500,1115408,1165780,1183012

This update for systemd-presets-common-SUSE fixes the following issues:

- Add default user preset containing:

- enable `pulseaudio.socket` (bsc#1083473)

- enable `pipewire.socket` (bsc#1183012)

- enable `pipewire-pulse.socket` (bsc#1183012)

- enable `pipewire-media-session.service` (used with pipewire >= 0.3.23)

- Changes to the default preset:

- enable `btrfsmaintenance-refresh.path`.

- disable `btrfsmaintenance-refresh.service`.

- enable `dnf-makecache.timer`.

- enable `ignition-firstboot-complete.service`.

- enable logwatch.timer and avoid to have logwatch out of sync with logrotate. (bsc#1112500)

- enable `mlocate.timer`. Recent versions of mlocate don't use `updatedb.timer` any more. (bsc#1115408)

- remove enable `updatedb.timer`

- Avoid needless refresh on boot. (bsc#1165780)

1183456,1183457,CVE-2021-20231,CVE-2021-20232

This update for gnutls fixes the following issues:

- CVE-2021-20232: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183456).

- CVE-2021-20231: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183457).

1183370,1183371,CVE-2021-24031,CVE-2021-24032

This update for zstd fixes the following issues:

- CVE-2021-24031: Added read permissions to files while being compressed or uncompressed (bsc#1183371).

- CVE-2021-24032: Fixed a race condition which could have allowed an attacker to access world-readable destination file (bsc#1183370).

1160876,1171549

This update for libunwind fixes the following issues:

- Update to version 1.5.0. (jsc#ECO-3395)

- Enable s390x for building. (jsc#ECO-3395)

- Fix compilation with 'fno-common'. (bsc#1171549)

- Fix build with 'GCC-10'. (bsc#1160876)

1050625,1174016,1177238,1177275,1177427,1177583,1178910,1178966,1179083,1179222,1179816,1179847,1179909,1180077,1180663,1180721,1181328,1181622,1182629,CVE-2017-9271

This update for libzypp, zypper fixes the following issues:

Update zypper to version 1.14.43:

- doc: give more details about creating versioned package locks

(bsc#1181622)

- man: Document synonymously used patch categories (bsc#1179847)

- Fix source-download commands help (bsc#1180663)

- man: Recommend to use the --non-interactive global option rather than the command option -y (bsc#1179816)

- Extend apt packagemap (fixes #366)

- --quiet: Fix install summary to write nothing if there's nothing todo (bsc#1180077)

- Prefer /run over /var/run.

Update libzypp to 17.25.8:

- Try to provide a mounted /proc in --root installs (bsc#1181328)

Some systemd tools require /proc to be mounted and fail if it's

not there.

- Enable release packages to request a releaxed suse/opensuse

vendorcheck in dup when migrating. (bsc#1182629)

- Patch: Identify well-known category names (bsc#1179847)

This allows to use the RH and SUSE patch categrory names

synonymously:

(recommended = bugfix) and (optional = feature = enhancement).

- Add missing includes for GCC 11 compatibility.

- Fix %posttrans script execution (fixes #265)

The scripts are execuable. No need to call them through 'sh -c'.

- Commit: Fix rpmdb compat symlink in case rpm got removed.

- Repo: Allow multiple baseurls specified on one line (fixes #285)

- Regex: Fix memory leak and undefined behavior.

- Add rpm buildrequires for test suite (fixes #279)

- Use rpmdb2solv new -D switch to tell the location ob the

rpmdatabase to use.

- CVE-2017-9271: Fixed information leak in the log file (bsc#1050625 bsc#1177583)

- RepoManager: Force refresh if repo url has changed (bsc#1174016)

- RepoManager: Carefully tidy up the caches. Remove non-directory entries. (bsc#1178966)

- RepoInfo: ignore legacy type= in a .repo file and let RepoManager probe (bsc#1177427).

- RpmDb: If no database exists use the _dbpath configured in rpm. Still makes sure a compat

symlink at /var/lib/rpm exists in case the configures _dbpath is elsewhere. (bsc#1178910)

- Fixed update of gpg keys with elongated expire date (bsc#1179222)

- needreboot: remove udev from the list (bsc#1179083)

- Fix lsof monitoring (bsc#1179909)

- Rephrase solver problem descriptions (jsc#SLE-8482)

- Adapt to changed gpg2/libgpgme behavior (bsc#1180721)

- Multicurl backend breaks with with unknown filesize (fixes #277)

1180073

This update for libcap fixes the following issues:

- Added support for the ambient capabilities (jsc#SLE-17092, jsc#ECO-3460)

- Changed the license tag from 'BSD-3-Clause and GPL-2.0' to 'BSD-3-Clause OR GPL-2.0-only' (bsc#1180073)

1182791

This update for openldap2 fixes the following issues:

- Improved the proxy connection timeout options to prune connections properly (bsc#1182791)

1181976

This update for procps fixes the following issues:

- Corrected a statement in the man page about processor pinning via taskset (bsc#1181976)

1141190

This update for mpfr fixes the following issues:

- Fixed an issue when building for ppc64le (bsc#1141190)

Technical library fixes:

- A subtraction of two numbers of the same sign or addition of two numbers of different signs

can be rounded incorrectly (and the ternary value can be incorrect) when one of the two

inputs is reused as the output (destination) and all these MPFR numbers have exactly

GMP_NUMB_BITS bits of precision (typically, 32 bits on 32-bit machines, 64 bits on 64-bit

machines).

- The mpfr_fma and mpfr_fms functions can behave incorrectly in case of internal overflow or

underflow.

- The result of the mpfr_sqr function can be rounded incorrectly in a rare case near underflow

when the destination has exactly GMP_NUMB_BITS bits of precision (typically, 32 bits on

32-bit machines, 64 bits on 64-bit machines) and the input has at most GMP_NUMB_BITS bits

of precision.

- The behavior and documentation of the mpfr_get_str function are inconsistent concerning the

minimum precision (this is related to the change of the minimum precision from 2 to 1 in

MPFR 4.0.0). The get_str patch fixes this issue in the following way: the value 1 can now be

provided for n (4th argument of mpfr_get_str); if n = 0, then the number of significant digits

in the output string can now be 1, as already implied by the documentation (but the code was

increasing it to 2).

- The mpfr_cmp_q function can behave incorrectly when the rational (mpq_t) number has a null

denominator.

- The mpfr_inp_str and mpfr_out_str functions might behave incorrectly when the stream is a

null pointer: the stream is replaced by stdin and stdout, respectively. This behavior is

useless, not documented (thus incorrect in case a null pointer would have a special meaning),

and not consistent with other input/output functions.

1184136

This update for systemd-presets-common-SUSE fixes the following issues:

- Enabled hcn-init.service for HNV on POWER (bsc#1184136)

1183791

This update for e2fsprogs fixes the following issues:

- Fixed an issue when building e2fsprogs (bsc#1183791)

This patch does not fix any user visible issues and is therefore optional to install.

1178219

This update for systemd fixes the following issues:

- Improved the logs emitted by systemd-shutdown during the shutdown process, when applications cannot

be stopped properly and would leave mount points mounted.

1184690

This update for libcap fixes the following issues:

- Add explicit dependency on 'libcap2' with version to 'libcap-progs' and 'pam_cap'. (bsc#1184690)

1184401,CVE-2021-20305

This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401).

1165780

This update for systemd-presets-branding-SLE fixes the following issues:

- Don't enable 'btrfsmaintenance-refresh.service', 'btrfsmaintenance' is managed by systemd-presets-common-SUSE instead. (bsc#1165780)

1185408,1185409,1185410,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518

This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).

- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).

- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).

1183064

This update for bash fixes the following issues:

- Fixed a segmentation fault that used to occur when bash read a history file

that was malformed in a very specific way. (bsc#1183064)

1184435

This update for patterns-microos provides the following fix:

- Require the libvirt-daemon-qemu package and include the needed dependencies in the

product. (bsc#1184435)

1185417

This update for procps fixes the following issues:

- Support up to 2048 CPU as well. (bsc#1185417)

1185163

This update for krb5 fixes the following issues:

- Use '/run' instead of '/var/run' for daemon PID files. (bsc#1185163);

1183797

This update for sed fixes the following issues:

- Fixed a building issue with glibc-2.31 (bsc#1183797).

This patch is optional to install.

1180851,1181874,1182936,1183628,1184997,1185239

This update for libsolv and libzypp fixes the following issues:

libsolv:

Upgrade from version 0.7.17 to version 0.7.19

- Fix rare segfault in `resolve_jobrules()` that could happen if new rules are learned.

- Fix memory leaks in error cases

- Fix error handling in `solv_xfopen_fd()`

- Fix regex code on win32

- fixed memory leak in choice rule generation

- `repo_add_conda`: add a flag to skip version 2 packages.

libzypp:

Upgrade from version 17.25.8 to version 17.25.10

- Properly handle permission denied when providing optional files. (bsc#1185239)

- Fix service detection with `cgroupv2`. (bsc#1184997)

- Add missing includes for GCC 11. (bsc#1181874)

- Fix unsafe usage of static in media verifier.

- `Solver`: Avoid segfault if no system is loaded. (bsc#1183628)

- `MediaVerifier`: Relax media set verification in case of a single not-volatile medium. (bsc#1180851)

- Do no cleanup in custom cache dirs. (bsc#1182936)

- `ZConfig`: let `pubkeyCachePath` follow `repoCachePath`.

1184614

This update for openldap2 fixes the following issue:

- Provide `openldap2-contrib` to the modules SUSE Linux Enterprise Legacy 15-SP2 and 15-SP3. (bsc#1184614)

1067478,1109367,1145085,1184920

This update for llvm7 and libqt5-qttools fixes the following issues:

libqt5-qttools:

- Use `libclang` instead of `clang`, now that `llvm7` moved the header files to `libclang` (bsc#1109367, bsc#1184920)

llvm7:

- Remove unneeded and unused dependencies:

- groff, bison, flex, jsoncpp

- Devel packages are only required in other devel packages, when their headers are included in the installed headers.

- Skip a test that is broken with 387 FPU registers and avoids check failure on i586. (bsc#1145085)

- Link `libomp` with `atomic` if needed and fix build using gcc-4.8. (bsc#1145085)

- Make build of `gnustep-libobjc2` package reproducible. (bsc#1067478)

- Remove `-fno-strict-aliasing` which upstream doesn't use any more.

- Package `clang` builtin headers with `libclang`. (bsc#1109367)

- The library is unusable without the builtin headers. Currently consumers of `libclang` have to require `clang`

as well, although only the headers are needed.

1181443,1184358,1185562

This update for pam fixes the following issues:

- Fixed a bug, where the 'unlimited'/'-1' value was not interpreted correctly (bsc#1181443)

- Fixed a bug, where pam_access interpreted the keyword 'LOCAL' incorrectly, leading to

an attempt to resolve it as a hostname (bsc#1184358)

- In the 32-bit compatibility package for 64-bit architectures, require 'systemd-32bit' to be also installed as it contains pam_systemd.so for 32 bit applications. (bsc#1185562)

1185438,CVE-2021-3520

This update for lz4 fixes the following issues:

- CVE-2021-3520: Fixed memory corruption due to an integer overflow bug caused by memmove argument (bsc#1185438).

1185408,1185409,1185410,1185698,CVE-2021-3516,CVE-2021-3517,CVE-2021-3518,CVE-2021-3537

This update for libxml2 fixes the following issues:

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).

- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).

- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).

1177976,1183933,1186114,CVE-2021-22876,CVE-2021-22898

This update for curl fixes the following issues:

- CVE-2021-22876: Fixed an issue where the automatic referer was leaking credentials (bsc#1183933).

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).

- Fix for SFTP uploads when it results in empty uploaded files (bsc#1177976).

- Allow partial chain verification (jsc#SLE-17956).

1029961,1106014,1178577,1178624,1178675,1182016

This update for gcc10 fixes the following issues:

- Disable nvptx offloading for aarch64 again since it doesn't work

- Fixed a build failure issue. (bsc#1182016)

- Fix for memory miscompilation on 'aarch64'. (bsc#1178624, bsc#1178577)

- Fix 32bit 'libgnat.so' link. (bsc#1178675)

- prepare usrmerge: Install libgcc_s into %_libdir. ABI wise it stays /%lib. (bsc#1029961)

- Build complete set of multilibs for arm-none target. (bsc#1106014)

1186015,CVE-2021-3541

This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)

1096677

This update for gcc fixes the following issues:

- Added gccgo symlink and go and gofmt as alternatives to support parallel installation

of golang (bsc#1096677)

1161268,1172308

This update for gpg2 fixes the following issues:

- Fixed an issue where the gpg-agent's ssh-agent does not handle flags

in signing requests properly (bsc#1161268 and bsc#1172308).

1187060,CVE-2021-3580

This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).

1187212,CVE-2021-33560

This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).

1040589,1047218,1182604,1185540,1186049

This update for automake fixes the following issues:

- Implement generated autoconf makefiles reproducible (bsc#1182604)

- Add fix to avoid date variations in docs. (bsc#1047218, jsc#SLE-17848)

- Avoid bashisms in test-driver script. (bsc#1185540)

This update for pcre fixes the following issues:

- Do not run profiling 'check' in parallel to make package build reproducible. (bsc#1040589)

This update for brp-check-suse fixes the following issues:

- Add fixes to support reproducible builds. (bsc#1186049)

1186561

This update for systemd-presets-common-SUSE fixes the following issues:

When installing the systemd-presets-common-SUSE package for the

first time in a new system, it might happen that some services

are installed before systemd so the %systemd_pre/post macros

would not work. This is handled by enabling all preset services

in this package's %posttrans section but it wasn't enabling

user services, just system services. Now it enables also the

user services installed before this package (bsc#1186561)

1175448,1175449,CVE-2020-24370,CVE-2020-24371

This update for lua53 fixes the following issues:

Update to version 5.3.6:

- CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)

- CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)

- Long brackets with a huge number of '=' overflow some internal buffer arithmetic.

1187210

This update for openldap2 fixes the following issues:

- Resolve issues in the idle / connection 'TTL' timeout implementation in OpenLDAP. (bsc#1187210)

1154935,1167471,1178561,1184761,1184967,1185046,1185331,1185807,1185958,1187292,1187400

This update for systemd fixes the following issues:

cgroup: Parse infinity properly for memory protections. (bsc#1167471)

cgroup: Make empty assignments reset to default. (bsc#1167471)

cgroup: Support 0-value for memory protection directives. (bsc#1167471)

core/cgroup: Fixed an issue with ignored parameter of 'MemorySwapMax=0'. (bsc#1154935)

bus-unit-util: Add proper 'MemorySwapMax' serialization.

core: Accept MemorySwapMax= properties that are scaled.

execute: Make sure to call into PAM after initializing resource limits. (bsc#1184967)

core: Rename 'ShutdownWatchdogSec' to 'RebootWatchdogSec'. (bsc#1185331)

Return -EAGAIN instead of -EALREADY from unit_reload. (bsc#1185046)

rules: Don't ignore Xen virtual interfaces anymore. (bsc#1178561)

write_net_rules: Set execute bits. (bsc#1178561)

udev: Rework network device renaming.

Revert 'Revert 'udev: Network device renaming - immediately give up if the target name isn't available''

mount-util: tape over name_to_handle_at() flakiness (#7517) (bsc#1184761)

core: fix output (logging) for mount units (#7603) (bsc#1187400)

udev requires systemd in its %post (bsc#1185958)

cgroup: Parse infinity properly for memory protections (bsc#1167471)

cgroup: Make empty assignments reset to default (bsc#1167471)

cgroup: Support 0-value for memory protection directives (bsc#1167471)

Create /run/lock/subsys again (bsc#1187292)

The creation of this directory was mistakenly dropped when

'filesystem' package took the initialization of the generic paths

over.

Expect 644 permissions for /usr/lib/udev/compat-symlink-generation (bsc#1185807)

1187105,CVE-2020-35512

This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a use-after-free or potential undefined behaviour caused by shared UID's (bsc#1187105)

1157818,1158812,1158958,1158959,1158960,1159491,1159715,1159847,1159850,1160309,1160438,1160439,1164719,1172091,1172115,1172234,1172236,1172240,1173641,928700,928701,CVE-2015-3414,CVE-2015-3415,CVE-2019-19244,CVE-2019-19317,CVE-2019-19603,CVE-2019-19645,CVE-2019-19646,CVE-2019-19880,CVE-2019-19923,CVE-2019-19924,CVE-2019-19925,CVE-2019-19926,CVE-2019-19959,CVE-2019-20218,CVE-2020-13434,CVE-2020-13435,CVE-2020-13630,CVE-2020-13631,CVE-2020-13632,CVE-2020-15358,CVE-2020-9327

This update for sqlite3 fixes the following issues:

- Update to version 3.36.0

- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener

optimization (bsc#1173641)

- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in

isAuxiliaryVtabOperator (bsc#1164719)

- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)

- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)

- CVE-2019-19923: improper handling of certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer

dereference (bsc#1160309)

- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)

- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)

- CVE-2019-19926: improper handling of certain errors during parsing multiSelect in select.c (bsc#1159715)

- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference

(bsc#1159491)

- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with

a shadow table name (bsc#1158960)

- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated

columns (bsc#1158959)

- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views

in conjunction with ALTER TABLE statements (bsc#1158958)

- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,

which allows attackers to cause a denial of service (bsc#1158812)

- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a

sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)

- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)

- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)

- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)

- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow

- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)

- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)

- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)

1184994,1188063,CVE-2021-33910

This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape() (bsc#1188063)

- Skip udev rules if 'elevator=' is used (bsc#1184994)

1188217,1188218,1188219,1188220,CVE-2021-22922,CVE-2021-22923,CVE-2021-22924,CVE-2021-22925

This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)

- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)

- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)

- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)

1189206,CVE-2021-38185

This update for cpio fixes the following issues:

It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)

1188881,CVE-2021-3672

This update for c-ares fixes the following issues:

Version update to git snapshot 1.17.1+20200724:

- CVE-2021-3672: fixed missing input validation on hostnames returned by DNS servers (bsc#1188881)

- If ares_getaddrinfo() was terminated by an ares_destroy(), it would cause crash

- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected DNS response

- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to prevent spoofing

- Use unbuffered /dev/urandom for random data to prevent early startup performance issues

1189465

This update for cpio fixes the following issues:

- A regression in last update would cause builds to hang on various architectures(bsc#1189465)

1189465,CVE-2021-38185

This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)

1188571,CVE-2021-36222

This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)

1172505,CVE-2020-12049

This update for dbus-1 fixes the following issues:

- CVE-2020-12049: truncated messages lead to resource exhaustion. (bsc#1172505)

1189521,CVE-2021-3712

This update for openssl-1_1 fixes the following security issue:

- CVE-2021-3712: a bug in the code for printing certificate details could

lead to a buffer overrun that a malicious actor could exploit to crash

the application, causing a denial-of-service attack. [bsc#1189521]

1184614

This update for openldap2 fixes the following issue:

- openldap2-contrib is shipped to the Legacy Module. (bsc#1184614)

1189521,CVE-2021-3712

This update for openssl-1_1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712.

Read buffer overruns processing ASN.1 strings (bsc#1189521).

1185348

This update for gcc fixes the following issues:

- With gcc-PIE add -pie even when -fPIC is specified but we are

not linking a shared library. [bsc#1185348]

- Fix postun of gcc-go alternative.

1189683

This update for netcfg fixes the following issues:

- add submissions port/protocol to services file for message submission over TLS protocol [bsc#1189683]

1190225

This update for c-ares fixes the following issue:

- Allow '_' as part of DNS response. (bsc#1190225)

- 'c-ares' 1.17.2 introduced response validation to prevent a security issue, however it was not listing '_' as a

valid character for domain name responses which caused issues when a 'CNAME' referenced a 'SRV' record which

contained underscores.

1189996

This update for file fixes the following issues:

- Fixes exception thrown by memory allocation problem (bsc#1189996)

1190373,1190374,CVE-2021-22946,CVE-2021-22947

This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).

- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).

1134353,1171962,1184994,1188018,1188063,1188291,1188713,1189480,1190234,CVE-2021-33910

This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

- logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).

- Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).

- Rules weren't applied to dm devices (multipath) (bsc#1188713).

- Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).

- Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).

- Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).

- Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).

1186489,1187911,CVE-2021-33574,CVE-2021-35942

This update for glibc fixes the following issues:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)

- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)

1065729,1148868,1152489,1154353,1159886,1167773,1170774,1173746,1176940,1184439,1184804,1185302,1185677,1185726,1185762,1187167,1188067,1188651,1188986,1189297,1189841,1189884,1190023,1190062,1190115,1190159,1190358,1190406,1190432,1190467,1190523,1190534,1190543,1190576,1190595,1190596,1190598,1190620,1190626,1190679,1190705,1190717,1190746,1190758,1190784,1190785,1191172,1191193,1191240,1191292,CVE-2020-3702,CVE-2021-3669,CVE-2021-3744,CVE-2021-3752,CVE-2021-3764,CVE-2021-40490

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)

- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)

- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)

- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)

- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)

- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).

- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).

- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).

- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).

- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).

- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).

- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).

- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).

- ath9k: fix sleeping in atomic context (git-fixes).

- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).

- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).

- blk-mq: mark if one queue map uses managed irq (bsc#1185762).

- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).

- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).

- bnxt_en: Add missing DMA memory barriers (git-fixes).

- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).

- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).

- bnxt_en: Store the running firmware version code (git-fixes).

- bnxt: count Tx drops (git-fixes).

- bnxt: disable napi before canceling DIM (git-fixes).

- bnxt: do not lock the tx queue from napi poll (git-fixes).

- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).

- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).

- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).

- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).

- console: consume APC, DM, DCS (git-fixes).

- cuse: fix broken release (bsc#1190596).

- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).

- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).

- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).

- dmaengine: ioat: depends on !UML (git-fixes).

- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).

- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).

- docs: Fix infiniband uverbs minor number (git-fixes).

- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).

- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).

- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).

- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).

- drm/amdgpu: Fix BUG_ON assert (git-fixes).

- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).

- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).

- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).

- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).

- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).

- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).

- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).

- erofs: fix up erofs_lookup tracepoint (git-fixes).

- fbmem: do not allow too huge resolutions (git-fixes).

- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).

- fpga: machxo2-spi: Return an error on failure (git-fixes).

- fuse: flush extending writes (bsc#1190595).

- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).

- genirq: add device_has_managed_msi_irq (bsc#1185762).

- gpio: uniphier: Fix void functions to remove return value (git-fixes).

- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).

- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).

- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).

- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).

- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).

- hwmon: (tmp421) fix rounding for negative values (git-fixes).

- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).

- i40e: Add additional info to PHY type error (git-fixes).

- i40e: Fix firmware LLDP agent related warning (git-fixes).

- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).

- i40e: Fix logic of disabling queues (git-fixes).

- i40e: Fix queue-to-TC mapping on Tx (git-fixes).

- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).

- iavf: Set RSS LUT and key in reset handle path (git-fixes).

- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).

- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).

- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).

- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).

- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).

- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).

- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).

- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).

- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).

- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).

- ice: Prevent probing virtual functions (git-fixes).

- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).

- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).

- iomap: Fix negative assignment to unsigned sis->pages in iomap_swapfile_activate (bsc#1190784).

- ionic: cleanly release devlink instance (bsc#1167773).

- ionic: count csum_none when offload enabled (bsc#1167773).

- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).

- ipc/util.c: use binary search for max_idx (bsc#1159886).

- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).

- ipvs: avoid expiring many connections from timer (bsc#1190467).

- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).

- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).

- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).

- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.

- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.

- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).

- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.

- libata: fix ata_host_start() (git-fixes).

- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).

- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).

- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).

- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).

- mac80211: mesh: fix potentially unaligned access (git-fixes).

- media: cedrus: Fix SUNXI tile size calculation (git-fixes).

- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).

- media: dib8000: rewrite the init prbs logic (git-fixes).

- media: imx258: Limit the max analogue gain to 480 (git-fixes).

- media: imx258: Rectify mismatch of VTS value (git-fixes).

- media: rc-loopback: return number of emitters rather than error (git-fixes).

- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).

- media: uvc: do not do DMA on stack (git-fixes).

- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).

- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).

- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).

- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).

- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).

- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).

- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).

- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).

- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).

- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).

- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).

- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).

- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).

- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).

- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).

- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).

- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).

- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).

- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).

- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).

- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).

- net/mlx5: Fix flow table chaining (git-fixes).

- net/mlx5: Fix return value from tracer initialization (git-fixes).

- net/mlx5: Unload device upon firmware fatal error (git-fixes).

- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).

- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).

- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).

- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).

- nfp: update ethtool reporting of pauseframe control (git-fixes).

- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).

- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).

- NFS: pass cred explicitly for access tests (bsc#1190746).

- nvme: avoid race in shutdown namespace removal (bsc#1188067).

- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).

- parport: remove non-zero check on count (git-fixes).

- PCI: aardvark: Fix checking for PIO status (git-fixes).

- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).

- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).

- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).

- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).

- PCI: Add AMD GPU multi-function power dependencies (git-fixes).

- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).

- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).

- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).

- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).

- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).

- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).

- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).

- PM: EM: Increase energy calculation precision (git-fixes).

- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).

- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).

- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).

- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).

- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).

- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).

- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).

- powerpc/perf: Fix the check for SIAR value (bsc#1065729).

- powerpc/perf: Use regs->nip when SIAR is zero (bsc#1065729).

- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).

- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).

- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).

- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).

- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).

- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).

- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).

- pwm: img: Do not modify HW state in .remove() callback (git-fixes).

- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).

- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).

- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).

- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).

- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).

- regmap: fix page selection for noinc reads (git-fixes).

- regmap: fix page selection for noinc writes (git-fixes).

- regmap: fix the offset of register error log (git-fixes).

- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).

- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.

- rpm/kernel-binary.spec: Use only non-empty certificates.

- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).

- rtc: rx8010: select REGMAP_I2C (git-fixes).

- rtc: tps65910: Correct driver module alias (git-fixes).

- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).

- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).

- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).

- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).

- scsi: fc: Add EDC ELS definition (bsc#1190576).

- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).

- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).

- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).

- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).

- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).

- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).

- scsi: lpfc: Add EDC ELS support (bsc#1190576).

- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).

- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).

- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).

- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).

- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).

- scsi: lpfc: Add support for the CM framework (bsc#1190576).

- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).

- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).

- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).

- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).

- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).

- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).

- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).

- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).

- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).

- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).

- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).

- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).

- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).

- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).

- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).

- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).

- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).

- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).

- scsi: lpfc: Remove unneeded variable (bsc#1190576).

- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).

- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).

- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).

- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).

- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).

- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).

- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).

- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).

- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).

- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).

- serial: sh-sci: fix break handling for sysrq (git-fixes).

- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).

- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).

- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).

- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).

- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).

- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).

- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).

- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).

- tty: synclink_gt, drop unneeded forward declarations (git-fixes).

- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).

- usb: core: hcd: Add support for deferring roothub registration (git-fixes).

- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).

- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).

- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).

- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).

- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).

- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).

- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).

- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).

- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).

- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).

- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).

- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).

- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).

- usb: serial: option: add Telit LN920 compositions (git-fixes).

- usb: serial: option: remove duplicate USB device ID (git-fixes).

- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).

- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).

- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).

- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).

- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).

- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).

- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).

- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).

- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).

- vmxnet3: prepare for version 6 changes (bsc#1190406).

- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).

- vmxnet3: set correct hash type based on rss information (bsc#1190406).

- vmxnet3: update to version 6 (bsc#1190406).

- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).

- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).

- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).

- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).

- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).

- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).

- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).

- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).

- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).

- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).

- xhci: Set HCD flag to defer primary roothub registration (git-fixes).

1189929,CVE-2021-37750

This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).

1185016,1185524,1186910,1187270,1187512,1188344,1190645,1190739,1190915,1190933

This update for yast2-network fixes the following issues:

- Don't crash when the interfaces table contains a not configured one (bnc#1190645, bsc#1190915).

- Fix the shown description using the interface friendly name when it is empty (bsc#1190933).

- Consider aliases sections as case insensitive (bsc#1190739).

- Display user defined device name in the devices overview (bnc#1190645).

- Don't crash when defined aliases in AutoYaST profile are not defined as a map (bsc#1188344).

- Support 'boot' and 'on' as aliases for the 'auto' startmode (bsc#1186910).

- Fix desktop file so the control center tooltip is translated (bsc#1187270).

- Use the linuxrc proxy settings for the HTTPS and FTP proxies (bsc#1185016).

- Don't crash at the end of installation when storing wifi configuration for NetworkManager (bsc#1185524, bsc#1187512).

1190793,CVE-2021-39537

This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)

1190052

This update for pam fixes the following issues:

- Added pam_faillock to the set of available PAM modules. (jsc#SLE-20638)

- Added new file macros.pam on request of systemd. (bsc#1190052)

1191987

This update for pam fixes the following issues:

- Fixed a bad directive file which resulted in

the 'securetty' file to be installed as 'macros.pam'.

(bsc#1191987)

1122417,1125886,1178236,1188921,CVE-2021-37600

This update for util-linux fixes the following issues:

Update to version 2.33.2 to provide seamless update from SLE12 SP5 to SLE15 SP2:

- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c (bsc#1188921).

- agetty: Fix 8-bit processing in get_logname() (bsc#1125886).

- mount: Fix 'mount' output for net file systems (bsc#1122417).

- ipcs: Avoid overflows (bsc#1178236)

1172973,1172974,CVE-2019-20838,CVE-2020-14155

This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).

- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)

1179898,1179899,1179900,1179901,1179902,1179903,1180451,1180454,1180461,1181452,1182252,1183511,1184620,1184794,CVE-2020-16590,CVE-2020-16591,CVE-2020-16592,CVE-2020-16593,CVE-2020-16598,CVE-2020-16599,CVE-2020-35448,CVE-2020-35493,CVE-2020-35496,CVE-2020-35507,CVE-2021-20197,CVE-2021-20284,CVE-2021-3487

This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to

build.

* Support for Realm Management Extension (RME) for AArch64 has been

added.

* A new linker option '-z report-relative-reloc' for x86 ELF targets

has been added to report dynamic relative relocations.

* A new linker option '-z start-stop-gc' has been added to disable

special treatment of __start_*/__stop_* references when

--gc-sections.

* A new linker options '-Bno-symbolic' has been added which will

cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.

* The readelf tool has a new command line option which can be used to

specify how the numeric values of symbols are reported.

--sym-base=0|8|10|16 tells readelf to display the values in base 8,

base 10 or base 16. A sym base of 0 represents the default action

of displaying values under 10000 in base 10 and values above that in

base 16.

* A new format has been added to the nm program. Specifying

'--format=just-symbols' (or just using -j) will tell the program to

only display symbol names and nothing else.

* A new command line option '--keep-section-symbols' has been added to

objcopy and strip. This stops the removal of unused section symbols

when the file is copied. Removing these symbols saves space, but

sometimes they are needed by other tools.

* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options

supported by objcopy now make undefined symbols weak on targets that

support weak symbols.

* Readelf and objdump can now display and use the contents of .debug_sup

sections.

* Readelf and objdump will now follow links to separate debug info

files by default. This behaviour can be stopped via the use of the

new '-wN' or '--debug-dump=no-follow-links' options for readelf and

the '-WN' or '--dwarf=no-follow-links' options for objdump. Also

the old behaviour can be restored by the use of the

'--enable-follow-debug-links=no' configure time option.

The semantics of the =follow-links option have also been slightly

changed. When enabled, the option allows for the loading of symbol

tables and string tables from the separate files which can be used

to enhance the information displayed when dumping other sections,

but it does not automatically imply that information from the

separate files should be displayed.

If other debug section display options are also enabled (eg

'--debug-dump=info') then the contents of matching sections in both

the main file and the separate debuginfo file *will* be displayed.

This is because in most cases the debug section will only be present

in one of the files.

If however non-debug section display options are enabled (eg

'--sections') then the contents of matching parts of the separate

debuginfo file will *not* be displayed. This is because in most

cases the user probably only wanted to load the symbol information

from the separate debuginfo file. In order to change this behaviour

a new command line option --process-links can be used. This will

allow di0pslay options to applied to both the main file and any

separate debuginfo files.

* Nm has a new command line option: '--quiet'. This suppresses 'no

symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

* When setting the link order attribute of ELF sections, it is now

possible to use a numeric section index instead of symbol name.

* Added a .nop directive to generate a single no-op instruction in

a target neutral manner. This instruction does have an effect on

DWARF line number generation, if that is active.

* Removed --reduce-memory-overheads and --hash-size as gas now

uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

* Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key

Locker instructions.

* Support non-absolute segment values for lcall and ljmp.

* Add {disp16} pseudo prefix to x86 assembler.

* Configure with --enable-x86-used-note by default for Linux/x86.

- ARM/AArch64:

* Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,

Cortex-R82, Neoverse V1, and Neoverse N2 cores.

* Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded

Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call

Stack Recorder Extension) and BRBE (Branch Record Buffer

Extension) system registers.

* Add support for Armv8-R and Armv8.7-A ISA extensions.

* Add support for DSB memory nXS barrier, WFET and WFIT

instruction for Armv8.7.

* Add support for +csre feature for -march. Add CSR PDEC

instruction for CSRE feature in AArch64.

* Add support for +flagm feature for -march in Armv8.4 AArch64.

* Add support for +ls64 feature for -march in Armv8.7

AArch64. Add atomic 64-byte load/store instructions for this

feature.

* Add support for +pauth (Pointer Authentication) feature for

-march in AArch64.

New features in the Linker:

* Add --error-handling-script= command line option to allow

a helper script to be invoked when an undefined symbol or a

missing library is encountered. This option can be suppressed

via the configure time switch: --enable-error-handling-script=no.

* Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark

x86-64-{baseline|v[234]} ISA level as needed.

* Add -z unique-symbol to avoid duplicated local symbol names.

* The creation of PE format DLLs now defaults to using a more

secure set of DLL characteristics.

* The linker now deduplicates the types in .ctf sections. The new

command-line option --ctf-share-types describes how to do this:

its default value, share-unconflicted, produces the most compact

output.

* The linker now omits the 'variable section' from .ctf sections

by default, saving space. This is almost certainly what you

want unless you are working on a project that has its own

analogue of symbol tables that are not reflected in the ELF

symtabs.

New features in other binary tools:

* The ar tool's previously unused l modifier is now used for

specifying dependencies of a static library. The arguments of

this option (or --record-libdeps long form option) will be

stored verbatim in the __.LIBDEP member of the archive, which

the linker may read at link time.

* Readelf can now display the contents of LTO symbol table

sections when asked to do so via the --lto-syms command line

option.

* Readelf now accepts the -C command line option to enable the

demangling of symbol names. In addition the --demangle=

Severity
Container Advisory ID : SUSE-CU-2022:69-1
Container Tags : caasp/v4/cilium:1.6.6 , caasp/v4/cilium:1.6.6-rev5 , caasp/v4/cilium:1.6.6-rev5-build3.12.271
Container Release : 3.12.271
Severity : critical
Type : security

Related News