# Security update for gcc13

Announcement ID: SUSE-SU-2024:0045-1  
Rating: important  
References:

  * bsc#1206480
  * bsc#1206684
  * bsc#1210557
  * bsc#1211427
  * bsc#1212101
  * bsc#1213915
  * bsc#1214052
  * bsc#1214460
  * bsc#1215427
  * bsc#1216664
  * jsc#PED-153
  * jsc#PED-2005
  * jsc#PED-252
  * jsc#PED-253
  * jsc#PED-6584

  
Cross-References:

  * CVE-2023-4039

  
CVSS scores:

  * CVE-2023-4039 ( SUSE ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-4039 ( NVD ):  4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

  
Affected Products:

  * SUSE Linux Enterprise Micro 5.3
  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Micro for Rancher 5.3
  * SUSE Linux Enterprise Micro for Rancher 5.4

  
  
An update that solves one vulnerability, contains five features and has nine
security fixes can now be installed.

## Description:

This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise
15 SP4 and SP5, and provided in the "Development Tools" module.

The Go, D, Ada and Modula 2 language compiler parts are available unsupported
via the PackageHub repositories.

To use gcc13 compilers use:

  * install "gcc13" or "gcc13-c++" or one of the other "gcc13-COMPILER" frontend
    packages.
  * override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides
    for the other languages.

For a full changelog with all new GCC13 features, check out

    
    
        https://gcc.gnu.org/gcc-13/changes.html
    

Detailed changes:

  * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
    length stack allocations. (bsc#1214052)

  * Work around third party app crash during C++ standard library
    initialization. [bsc#1216664]

  * Fixed that GCC13 fails to compile some packages with error: unrecognizable
    insn (bsc#1215427)
  * Bump included newlib to version 4.3.0.
  * Update to GCC trunk head (r13-5254-g05b9868b182bb9)
  * Redo floatn fixinclude pick-up to simply keep what is there.
  * Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

  * Also handle -static-pie in the default-PIE specs

  * Fixed missed optimization in Skia resulting in Firefox crashes when building
    with LTO. [bsc#1212101]
  * Make libstdc++6-devel packages own their directories since they can be
    installed standalone. [bsc#1211427]
  * Add new x86-related intrinsics (amxcomplexintrin.h).
  * RISC-V: Add support for inlining subword atomic operations
  * Use --enable-link-serialization rather that --enable-link-mutex, the benefit
    of the former one is that the linker jobs are not holding tokens of the
    make's jobserver.
  * Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the
    general state of BPF with GCC.
  * Add bootstrap conditional to allow --without=bootstrap to be specified to
    speed up local builds for testing.
  * Bump included newlib to version 4.3.0.
  * Also package libhwasan_preinit.o on aarch64.
  * Configure external timezone database provided by the timezone package. Make
    libstdc++6 recommend timezone to get a fully working std::chrono. Install
    timezone when running the testsuite.
  * Package libhwasan_preinit.o on x86_64.
  * Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]
  * Enable PRU flavour for gcc13
  * update floatn fixinclude pickup to check each header separately
    (bsc#1206480)
  * Redo floatn fixinclude pick-up to simply keep what is there.
  * Bump libgo SONAME to libgo22.
  * Do not package libhwasan for biarch (32-bit architecture) as the extension
    depends on 64-bit pointers.
  * Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15.
  * Depend on at least LLVM 13 for GCN cross compiler.
  * Update embedded newlib to version 4.2.0
  * Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is
    used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to
    have cross-pru-gcc12 for armv7l in order to build both host applications and
    PRU firmware during the same build.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Micro for Rancher 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1

  * SUSE Linux Enterprise Micro 5.4  
    zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1

  * SUSE Linux Enterprise Micro 5.5  
    zypper in -t patch SUSE-SLE-Micro-5.5-2024-45=1

  * SUSE Linux Enterprise Micro for Rancher 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1

  * SUSE Linux Enterprise Micro 5.3  
    zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1

## Package List:

  * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
    * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1
    * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1
    * gcc13-debugsource-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1
    * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-13.2.1+git7813-150000.1.6.1
    * libstdc++6-13.2.1+git7813-150000.1.6.1
    * libatomic1-13.2.1+git7813-150000.1.6.1
  * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
    * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1
    * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1
    * gcc13-debugsource-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1
    * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-13.2.1+git7813-150000.1.6.1
    * libstdc++6-13.2.1+git7813-150000.1.6.1
    * libatomic1-13.2.1+git7813-150000.1.6.1
  * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
    * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1
    * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1
    * gcc13-debugsource-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1
    * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-13.2.1+git7813-150000.1.6.1
    * libstdc++6-13.2.1+git7813-150000.1.6.1
    * libatomic1-13.2.1+git7813-150000.1.6.1
  * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
    * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1
    * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1
    * gcc13-debugsource-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1
    * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-13.2.1+git7813-150000.1.6.1
    * libstdc++6-13.2.1+git7813-150000.1.6.1
    * libatomic1-13.2.1+git7813-150000.1.6.1
  * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
    * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1
    * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1
    * gcc13-debugsource-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1
    * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1
    * libgcc_s1-13.2.1+git7813-150000.1.6.1
    * libstdc++6-13.2.1+git7813-150000.1.6.1
    * libatomic1-13.2.1+git7813-150000.1.6.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-4039.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1206480
  * https://bugzilla.suse.com/show_bug.cgi?id=1206684
  * https://bugzilla.suse.com/show_bug.cgi?id=1210557
  * https://bugzilla.suse.com/show_bug.cgi?id=1211427
  * https://bugzilla.suse.com/show_bug.cgi?id=1212101
  * https://bugzilla.suse.com/show_bug.cgi?id=1213915
  * https://bugzilla.suse.com/show_bug.cgi?id=1214052
  * https://bugzilla.suse.com/show_bug.cgi?id=1214460
  * https://bugzilla.suse.com/show_bug.cgi?id=1215427
  * https://bugzilla.suse.com/show_bug.cgi?id=1216664
  * https://jira.suse.com/login.jsp
  * https://jira.suse.com/login.jsp
  * https://jira.suse.com/login.jsp
  * https://jira.suse.com/login.jsp
  * https://jira.suse.com/login.jsp

SUSE: 2024:0045-1 important: gcc13

January 8, 2024
* bsc#1206480 * bsc#1206684 * bsc#1210557 * bsc#1211427 * bsc#1212101

Summary

## This update for gcc13 fixes the following issues: This update ship the GCC 13.2 compiler suite and its base libraries. The compiler base libraries are provided for all SUSE Linux Enterprise 15 versions and replace the same named GCC 12 ones. The new compilers for C, C++, and Fortran are provided for SUSE Linux Enterprise 15 SP4 and SP5, and provided in the "Development Tools" module. The Go, D, Ada and Modula 2 language compiler parts are available unsupported via the PackageHub repositories. To use gcc13 compilers use: * install "gcc13" or "gcc13-c++" or one of the other "gcc13-COMPILER" frontend packages. * override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages. For a full changelog with all new GCC13 features, check out https://gcc.gnu.org/gcc-13/changes.html Detailed changes: * CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable length stack allocations. (bsc#1214052) * Work around third party app crash during C++ standard library initialization. [bsc#1216664] * Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427) * Bump included newlib to version 4.3.0. * Update to GCC trunk head (r13-5254-g05b9868b182bb9) * Redo floatn fixinclude pick-up to simply keep what is there. * Turn cross compiler to s390x to a glibc cross. [bsc#1214460] * Also handle -static-pie in the default-PIE specs * Fixed missed optimization in Skia resulting in Firefox crashes when building with LTO. [bsc#1212101] * Make libstdc++6-devel packages own their directories since they can be installed standalone. [bsc#1211427] * Add new x86-related intrinsics (amxcomplexintrin.h). * RISC-V: Add support for inlining subword atomic operations * Use --enable-link-serialization rather that --enable-link-mutex, the benefit of the former one is that the linker jobs are not holding tokens of the make's jobserver. * Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd for the general state of BPF with GCC. * Add bootstrap conditional to allow --without=bootstrap to be specified to speed up local builds for testing. * Bump included newlib to version 4.3.0. * Also package libhwasan_preinit.o on aarch64. * Configure external timezone database provided by the timezone package. Make libstdc++6 recommend timezone to get a fully working std::chrono. Install timezone when running the testsuite. * Package libhwasan_preinit.o on x86_64. * Fixed unwinding on aarch64 with pointer signing. [bsc#1206684] * Enable PRU flavour for gcc13 * update floatn fixinclude pickup to check each header separately (bsc#1206480) * Redo floatn fixinclude pick-up to simply keep what is there. * Bump libgo SONAME to libgo22. * Do not package libhwasan for biarch (32-bit architecture) as the extension depends on 64-bit pointers. * Adjust floatn fixincludes guard to work with SLE12 and earlier SLE15. * Depend on at least LLVM 13 for GCN cross compiler. * Update embedded newlib to version 4.2.0 * Allow cross-pru-gcc12-bootstrap for armv7l architecture. PRU architecture is used for real-time MCUs embedded into TI armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for armv7l in order to build both host applications and PRU firmware during the same build. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2024-45=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2024-45=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2024-45=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gcc13-debuginfo-13.2.1+git7813-150000.1.6.1 * libatomic1-debuginfo-13.2.1+git7813-150000.1.6.1 * gcc13-debugsource-13.2.1+git7813-150000.1.6.1 * libgcc_s1-debuginfo-13.2.1+git7813-150000.1.6.1 * libstdc++6-debuginfo-13.2.1+git7813-150000.1.6.1 * libgcc_s1-13.2.1+git7813-150000.1.6.1 * libstdc++6-13.2.1+git7813-150000.1.6.1 * libatomic1-13.2.1+git7813-150000.1.6.1

References

* bsc#1206480

* bsc#1206684

* bsc#1210557

* bsc#1211427

* bsc#1212101

* bsc#1213915

* bsc#1214052

* bsc#1214460

* bsc#1215427

* bsc#1216664

* jsc#PED-153

* jsc#PED-2005

* jsc#PED-252

* jsc#PED-253

* jsc#PED-6584

Cross-

* CVE-2023-4039

CVSS scores:

* CVE-2023-4039 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

* CVE-2023-4039 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Affected Products:

* SUSE Linux Enterprise Micro 5.3

* SUSE Linux Enterprise Micro 5.4

* SUSE Linux Enterprise Micro 5.5

* SUSE Linux Enterprise Micro for Rancher 5.3

* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves one vulnerability, contains five features and has nine

security fixes can now be installed.

##

* https://www.suse.com/security/cve/CVE-2023-4039.html

* https://bugzilla.suse.com/show_bug.cgi?id=1206480

* https://bugzilla.suse.com/show_bug.cgi?id=1206684

* https://bugzilla.suse.com/show_bug.cgi?id=1210557

* https://bugzilla.suse.com/show_bug.cgi?id=1211427

* https://bugzilla.suse.com/show_bug.cgi?id=1212101

* https://bugzilla.suse.com/show_bug.cgi?id=1213915

* https://bugzilla.suse.com/show_bug.cgi?id=1214052

* https://bugzilla.suse.com/show_bug.cgi?id=1214460

* https://bugzilla.suse.com/show_bug.cgi?id=1215427

* https://bugzilla.suse.com/show_bug.cgi?id=1216664

* https://jira.suse.com/login.jsp

* https://jira.suse.com/login.jsp

* https://jira.suse.com/login.jsp

* https://jira.suse.com/login.jsp

* https://jira.suse.com/login.jsp

Severity
Announcement ID: SUSE-SU-2024:0045-1
Rating: important

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo