SUSE: 2023:3203-1 bci/python Security Update
Summary
Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:3823-1 Released: Wed Sep 27 18:42:38 2023 Summary: Security update for curl Type: security Severity: important Advisory ID: SUSE-SU-2023:3824-1 Released: Wed Sep 27 18:43:51 2023 Summary: Security update for python310 Type: security Severity: important
References
References : 1211829 1212819 1212910 1213463 1214692 1215026 CVE-2023-38039
CVE-2023-40217
1211829,1212819,1212910
This update for glibc fixes the following issues:
- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)
- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)
- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)
- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)
- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)
- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)
1215026,CVE-2023-38039
This update for curl fixes the following issues:
- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)
1213463,1214692,CVE-2023-40217
This update for python310 fixes the following issues:
- Update to 3.10.13.
- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692)
The following non-security bug was fixed:
- stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).
The following package changes have been done:
- glibc-2.31-150300.58.1 updated
- libcurl4-8.0.1-150400.5.29.1 updated
- curl-8.0.1-150400.5.29.1 updated
- libpython3_10-1_0-3.10.13-150400.4.33.1 updated
- python310-base-3.10.13-150400.4.33.1 updated
- python310-3.10.13-150400.4.33.1 updated
- python310-devel-3.10.13-150400.4.33.1 updated