|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2023:2783-2 (grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python- cryptography-vectors, python-google-api-core, pyt)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2023:2783-2: important: Security update for grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python-cryptography-vectors, python-google-api-core, pyt
Date:  Wed, 20 Sep 2023 08:30:22 -0000
Message-ID:  <169519862202.14729.2820237444391118247@smelt2.prg2.suse.org>

# Security update for grpc, protobuf, python-Deprecated, python-PyGithub, python-aiocontextvars, python-avro, python-bcrypt, python-cryptography, python- cryptography-vectors, python-google-api-core, pyt Announcement ID: SUSE-SU-2023:2783-2 Rating: important References: * #1099269 * #1133277 * #1144068 * #1162343 * #1177127 * #1178168 * #1182066 * #1184753 * #1194530 * #1197726 * #1198331 * #1199282 * #1203681 * #1204256 * PM-3243 * SLE-24629 Cross-References: * CVE-2018-1000518 * CVE-2020-25659 * CVE-2020-36242 * CVE-2021-22569 * CVE-2021-22570 * CVE-2022-1941 * CVE-2022-3171 CVSS scores: * CVE-2018-1000518 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-1000518 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-25659 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-25659 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-36242 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2020-36242 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2021-22569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-22569 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-22570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-22570 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1941 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1941 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1941 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1941 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3171 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3171 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP1 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 An update that solves seven vulnerabilities, contains two features and has seven security fixes can now be installed. ## Description: This update for grpc, protobuf, python-Deprecated, python-PyGithub, python- aiocontextvars, python-avro, python-bcrypt, python-cryptography, python- cryptography-vectors, python-google-api-core, python-googleapis-common-protos, python-grpcio-gcp, python-humanfriendly, python-jsondiff, python-knack, python- opencensus, python-opencensus-context, python-opencensus-ext-threading, python- opentelemetry-api, python-psutil, python-pytest-asyncio, python-requests, python-websocket-client, python-websockets fixes the following issues: grpc: \- Update in SLE-15 (bsc#1197726, bsc#1144068) protobuf: \- Fix a potential DoS issue in protobuf-cpp and protobuf-python, CVE-2022-1941, bsc#1203681 \- Fix a potential DoS issue when parsing with binary data in protobuf-java, CVE-2022-3171, bsc#1204256 \- Fix potential Denial of Service in protobuf-java in the parsing procedure for binary data, CVE-2021-22569, bsc#1194530 \- Add missing dependency of python subpackages on python-six (bsc#1177127) \- Updated to version 3.9.2 (bsc#1162343) * Remove OSReadLittle* due to alignment requirements. * Don't use unions and instead use memcpy for the type swaps. \- Disable LTO (bsc#1133277) python-aiocontextvars: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) python-avro: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) python-cryptography: \- update to 3.3.2 (bsc#1182066, CVE-2020-36242, bsc#1198331) * SECURITY ISSUE: Fixed a bug where certain sequences of update() calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. CVE-2020-36242 python-cryptography-vectors: \- update to 3.2 (bsc#1178168, CVE-2020-25659): * CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more constant time, to protect against Bleichenbacher vulnerabilities. Due to limitations imposed by our API, we cannot completely mitigate this vulnerability. * Support for OpenSSL 1.0.2 has been removed. * Added basic support for PKCS7 signing (including SMIME) via PKCS7SignatureBuilder. \- update to 3.3.2 (bsc#1198331) python-Deprecated: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- update to 1.2.13: python-google-api-core: \- Update to 1.14.2 python-googleapis-common-protos: \- Update to 1.6.0 python-grpcio-gcp: \- Initial spec for v0.2.2 python-humanfriendly: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Update to 10.0 python-jsondiff: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Update to version 1.3.0 python-knack: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Update to version 0.9.0 python-opencensus: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Disable Python2 build \- Update to 0.8.0 python-opencensus-context: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) python-opencensus-ext-threading: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Initial build version 0.1.2 python-opentelemetry-api: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Version update to 1.5.0 python-psutil: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- update to 5.9.1 \- remove the dependency on net-tools, since it conflicts with busybox-hostnmame which is default on MicroOS. (bsc#1184753) \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) python-PyGithub: \- Update to 1.43.5: python-pytest-asyncio: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Initial release of python-pytest-asyncio 0.8.0 python-requests: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) python-websocket-client: \- Update in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- Update to version 1.3.2 python-websockets: \- Include in SLE-15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629) \- update to 9.1: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2783=1 ## Package List: * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64 x86_64) * python-cryptography-debugsource-3.3.2-150100.7.15.3 * python3-cryptography-debuginfo-3.3.2-150100.7.15.3 * python3-psutil-debuginfo-5.9.1-150100.6.6.3 * libprotobuf-lite20-3.9.2-150100.8.3.3 * python2-psutil-debuginfo-5.9.1-150100.6.6.3 * python-psutil-debuginfo-5.9.1-150100.6.6.3 * python2-cryptography-3.3.2-150100.7.15.3 * python2-psutil-5.9.1-150100.6.6.3 * python3-psutil-5.9.1-150100.6.6.3 * python-psutil-debugsource-5.9.1-150100.6.6.3 * python-cryptography-debuginfo-3.3.2-150100.7.15.3 * python2-cryptography-debuginfo-3.3.2-150100.7.15.3 * python3-cryptography-3.3.2-150100.7.15.3 * SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch) * python3-websocket-client-1.3.2-150100.6.7.3 * python2-requests-2.25.1-150100.6.13.3 * python3-requests-2.25.1-150100.6.13.3 ## References: * https://www.suse.com/security/cve/CVE-2018-1000518.html * https://www.suse.com/security/cve/CVE-2020-25659.html * https://www.suse.com/security/cve/CVE-2020-36242.html * https://www.suse.com/security/cve/CVE-2021-22569.html * https://www.suse.com/security/cve/CVE-2021-22570.html * https://www.suse.com/security/cve/CVE-2022-1941.html * https://www.suse.com/security/cve/CVE-2022-3171.html * https://bugzilla.suse.com/show_bug.cgi?id=1099269 * https://bugzilla.suse.com/show_bug.cgi?id=1133277 * https://bugzilla.suse.com/show_bug.cgi?id=1144068 * https://bugzilla.suse.com/show_bug.cgi?id=1162343 * https://bugzilla.suse.com/show_bug.cgi?id=1177127 * https://bugzilla.suse.com/show_bug.cgi?id=1178168 * https://bugzilla.suse.com/show_bug.cgi?id=1182066 * https://bugzilla.suse.com/show_bug.cgi?id=1184753 * https://bugzilla.suse.com/show_bug.cgi?id=1194530 * https://bugzilla.suse.com/show_bug.cgi?id=1197726 * https://bugzilla.suse.com/show_bug.cgi?id=1198331 * https://bugzilla.suse.com/show_bug.cgi?id=1199282 * https://bugzilla.suse.com/show_bug.cgi?id=1203681 * https://bugzilla.suse.com/show_bug.cgi?id=1204256 * https://jira.suse.com/browse/PM-3243 * https://jira.suse.com/browse/SLE-24629


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds