MESSAGE
DATE | 2020-12-26 |
FROM | opensuse-security@opensuse.org
|
SUBJECT | Subject: [Hangout - NYLXS] openSUSE-SU-2020:2337-1: moderate: Security
|
From hangout-bounces-at-nylxs.com Wed Dec 30 02:28:27 2020 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: from www2.mrbrklyn.com (www2.mrbrklyn.com [96.57.23.82]) by mrbrklyn.com (Postfix) with ESMTP id 950C1164027; Wed, 30 Dec 2020 02:28:26 -0500 (EST) X-Original-To: hangout-at-www2.mrbrklyn.com Delivered-To: hangout-at-www2.mrbrklyn.com Received: by mrbrklyn.com (Postfix, from userid 1000) id 45498163FE4; Wed, 30 Dec 2020 02:26:32 -0500 (EST) Resent-From: Ruben Safir Resent-Date: Wed, 30 Dec 2020 02:26:32 -0500 Resent-Message-ID: <20201230072632.GK19413-at-www2.mrbrklyn.com> Resent-To: hangout-at-mrbrklyn.com X-Original-To: ruben-at-mrbrklyn.com Delivered-To: ruben-at-mrbrklyn.com Received: from hydra.opensuse.org (proxy-nue1.opensuse.org [195.135.221.145]) by mrbrklyn.com (Postfix) with ESMTP id 3F46316407F for ; Sun, 27 Dec 2020 02:11:59 -0500 (EST) Received: from mailman3.infra.opensuse.org (mailman3.infra.opensuse.org [192.168.47.80]) by hydra.opensuse.org (Postfix) with ESMTP id 80E7F21FCD; Sun, 27 Dec 2020 07:09:05 +0000 (UTC) Received: from mailman3.infra.opensuse.org (localhost [127.0.0.1]) by mailman3.infra.opensuse.org (Postfix) with ESMTP id D2AB087A7; Sun, 27 Dec 2020 07:09:04 +0000 (UTC) Received: from mx2.opensuse.org (mx2.infra.opensuse.org [192.168.47.96]) by mailman3.infra.opensuse.org (Postfix) with ESMTP id DEC2A3EF4 for ; Sat, 26 Dec 2020 23:20:02 +0000 (UTC) Received: from mx2.opensuse.org (localhost [127.0.0.1]) by mx2.opensuse.org (Postfix) with ESMTP id 130B1A5C for ; Sat, 26 Dec 2020 23:19:58 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on mx2.infra.opensuse.org X-Spam-Level: X-Spam-Status: No, score=0.5 required=5.0 tests=HEADER_SPAM, PP_MIME_FAKE_ASCII_TEXT,RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL autolearn=disabled version=3.4.2 X-Spam-Virus: No Received: from mx2.suse.de (mx2.suse.de [195.135.220.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx2.opensuse.org (Postfix) with ESMTPS for ; Sat, 26 Dec 2020 23:19:58 +0000 (UTC) X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id E64C0ACF9 for ; Sat, 26 Dec 2020 23:19:57 +0000 (UTC) From: opensuse-security-at-opensuse.org To: opensuse-security-announce-at-opensuse.org Message-Id: <20201226231957.DB25EFEDA-at-maintenance.suse.de> Date: Sun, 27 Dec 2020 00:19:57 +0100 (CET) X-MailFrom: SRS0=KlQq=F6=suse.de=meissner-at-opensuse.org X-Mailman-Rule-Hits: header-match-security-announce.lists.opensuse.org-1 X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-config-1; header-match-config-2; header-match-config-3; header-match-security-announce.lists.opensuse.org-0 Message-ID-Hash: VPTII3AXCRZZGBCOLCFY7HQI24L2PGVQ X-Message-ID-Hash: VPTII3AXCRZZGBCOLCFY7HQI24L2PGVQ X-Mailman-Approved-At: Sun, 27 Dec 2020 07:08:08 +0000 X-Mailman-Version: 3.3.1 Precedence: list Archived-At: Content-Type: multipart/mixed; boundary="===============3298343772566681392==" Subject: [Hangout - NYLXS] openSUSE-SU-2020:2337-1: moderate: Security update for blosc X-BeenThere: hangout-at-nylxs.com List-Id: NYLXS Tech Talk and Politics List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: security-at-lists.opensuse.org Errors-To: hangout-bounces-at-nylxs.com Sender: "Hangout"
--===============3298343772566681392==
openSUSE Security Update: Security update for blosc ______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2337-1 Rating: moderate References: #1174075 #1179914 Cross-References: CVE-2020-29367 Affected Products: openSUSE Leap 15.2 openSUSE Leap 15.1 openSUSE Backports SLE-15-SP2 openSUSE Backports SLE-15-SP1 ______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for blosc fixes the following issues:
Update to version 1.20.1 boo#1179914 CVE-2020-29367:
* More saftey checks have been implemented so that potential flaws discovered by new fuzzers in OSS-Fuzzer are fixed now * BloscLZ updated to 2.3.0. Expect better compression ratios for faster codecs. For details, see our new blog post: https://blosc.org/posts/beast-release/ * Fixed the _xgetbv() collision. Thanks to Micha?? G??rny (-at-mgorny).
Update to version 1.19.0:
* The length of automatic blocksizes for fast codecs (lz4, blosclz) has been incremented quite a bit (up to 256 KB) for better compression ratios. * The performance in modern CPUs (with at least 256 KB in L2 cache) should be better too (for older CPUs the performance should stay roughly the same). * For small buffers that cannot be compressed (typically < 128 bytes), blosc_compress() returns now a 0 (cannot compress) instead of a negative number (internal error). See #294. * blosclz codec updated to 2.1.0. Expect better compression ratios and performance in a wider variety of scenarios. * blosc_decompress_unsafe(), blosc_decompress_ctx_unsafe() and blosc_getitem_unsafe() have been removed because they are dangerous and after latest improvements, they should not be used in production.
Update to version 1.18.1:
* Fixed the copy of the leftovers of a chunk when its size is not a multiple of the typesize.
Update to version 1.17.1:
* BloscLZ codec updated to 2.0.0.
Update to version 1.16.3:
* Fix for building for clang with -march=haswell. See PR #262. * Fix all the known warnings for GCC/Clang. Still some work to do for MSVC in this front. * Due to some problems with several CI systems, the check for library symbols are deactivated now by default. If you want to enforce this check, use: cmake .. -DDEACTIVATE_SYMBOLS_CHECK=ON to re-activate it. * Correct the check for the compressed size when the buffer is memcpyed. This was a regression introduced in 1.16.0. Fixes #261. * Fixed a regression in 1.16.0 that prevented to compress empty buffers (see #260). * Now the functions that execute Blosc decompressions are safe by default for untrusted/possibly corrupted inputs. * The previous functions (with less safety) checks are still available with a '_unsafe' suffix. The complete list is: * Also, a new API function named blosc_cbuffer_validate(), for validating Blosc compressed data, has been added. * For details, see PR #258. Thanks to Jeremy Maitin-Shepard. * Fixed a bug in blosc_compress() that could lead to thread deadlock under some situations. See #251. Thanks to -at-wenjuno for the report and the fix. * Fix data race in shuffle.c host_implementation initialization. Fixes #253. Thanks to Jeremy Maitin-Shepard. * Add workaround for Visual Studio 2008's lack of a stdint.h file to blosclz.c. * Replaced //-comments with /**/-comments and other improvements for compatibility with quite old gcc compilers. See PR #243. Thanks to Andreas Martin. * Empty buffers can be compressed again (this was unadvertedly prevented while fixing #234). See #247. Thanks to Valentin Haenel.
Update to version 1.14.4:
* Added a new DEACTIVATE_SSE2 option for cmake that is useful for disabling SSE2 when doing cross-compilation (see #236). * New check for detecting output buffers smaller than BLOSC_MAX_OVERHEAD. * The complib and version parameters for blosc_get_complib_info() can be safely set to NULL now. This allows to call this function even if the user is not interested in these parameters (so no need to reserve memory for them). * In some situations that a supposedly blosc chunk is passed to blosc_decompress(), one might end with an Arithmetic exception. This is probably due to the chunk not being an actual blosc chunk, and divisions by zero might occur. A protection has been added for this.
Update to version 1.14.3:
* Fixed a bug that caused C-Blosc to crash on platforms requiring strict alignment. * Fixed a piece of code that was not C89 compliant.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-2337=1
Package List:
- openSUSE Leap 15.2 (x86_64):
blosc-debugsource-1.20.1-lp152.4.3.1 blosc-devel-1.20.1-lp152.4.3.1 libblosc1-1.20.1-lp152.4.3.1 libblosc1-debuginfo-1.20.1-lp152.4.3.1
- openSUSE Leap 15.1 (x86_64):
blosc-debugsource-1.20.1-lp151.3.3.1 blosc-devel-1.20.1-lp151.3.3.1 libblosc1-1.20.1-lp151.3.3.1 libblosc1-debuginfo-1.20.1-lp151.3.3.1
- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):
blosc-debugsource-1.20.1-bp152.4.3.1 blosc-devel-1.20.1-bp152.4.3.1 libblosc1-1.20.1-bp152.4.3.1 libblosc1-debuginfo-1.20.1-bp152.4.3.1
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
blosc-devel-1.20.1-bp151.4.3.1 libblosc1-1.20.1-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2020-29367.html https://bugzilla.suse.com/1174075 https://bugzilla.suse.com/1179914 --===============3298343772566681392== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18Kb3BlblNVU0Ug U2VjdXJpdHkgQW5ub3VuY2UgbWFpbGluZyBsaXN0IC0tIHNlY3VyaXR5LWFubm91bmNlQGxpc3Rz Lm9wZW5zdXNlLm9yZwpUbyB1bnN1YnNjcmliZSwgZW1haWwgc2VjdXJpdHktYW5ub3VuY2UtbGVh dmVAbGlzdHMub3BlbnN1c2Uub3JnCkxpc3QgTmV0aXF1ZXR0ZTogaHR0cHM6Ly9lbi5vcGVuc3Vz ZS5vcmcvb3BlblNVU0U6TWFpbGluZ19saXN0X25ldGlxdWV0dGUKTGlzdCBBcmNoaXZlczogaHR0 cHM6Ly9saXN0cy5vcGVuc3VzZS5vcmcvYXJjaGl2ZXMvbGlzdC9zZWN1cml0eS1hbm5vdW5jZUBs aXN0cy5vcGVuc3VzZS5vcmcK
--===============3298343772566681392== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ Hangout mailing list Hangout-at-nylxs.com http://lists.mrbrklyn.com/mailman/listinfo/hangout
--===============3298343772566681392==--
--===============3298343772566681392==
openSUSE Security Update: Security update for blosc ______________________________________________________________________________
Announcement ID: openSUSE-SU-2020:2337-1 Rating: moderate References: #1174075 #1179914 Cross-References: CVE-2020-29367 Affected Products: openSUSE Leap 15.2 openSUSE Leap 15.1 openSUSE Backports SLE-15-SP2 openSUSE Backports SLE-15-SP1 ______________________________________________________________________________
An update that solves one vulnerability and has one errata is now available.
Description:
This update for blosc fixes the following issues:
Update to version 1.20.1 boo#1179914 CVE-2020-29367:
* More saftey checks have been implemented so that potential flaws discovered by new fuzzers in OSS-Fuzzer are fixed now * BloscLZ updated to 2.3.0. Expect better compression ratios for faster codecs. For details, see our new blog post: https://blosc.org/posts/beast-release/ * Fixed the _xgetbv() collision. Thanks to Micha?? G??rny (-at-mgorny).
Update to version 1.19.0:
* The length of automatic blocksizes for fast codecs (lz4, blosclz) has been incremented quite a bit (up to 256 KB) for better compression ratios. * The performance in modern CPUs (with at least 256 KB in L2 cache) should be better too (for older CPUs the performance should stay roughly the same). * For small buffers that cannot be compressed (typically < 128 bytes), blosc_compress() returns now a 0 (cannot compress) instead of a negative number (internal error). See #294. * blosclz codec updated to 2.1.0. Expect better compression ratios and performance in a wider variety of scenarios. * blosc_decompress_unsafe(), blosc_decompress_ctx_unsafe() and blosc_getitem_unsafe() have been removed because they are dangerous and after latest improvements, they should not be used in production.
Update to version 1.18.1:
* Fixed the copy of the leftovers of a chunk when its size is not a multiple of the typesize.
Update to version 1.17.1:
* BloscLZ codec updated to 2.0.0.
Update to version 1.16.3:
* Fix for building for clang with -march=haswell. See PR #262. * Fix all the known warnings for GCC/Clang. Still some work to do for MSVC in this front. * Due to some problems with several CI systems, the check for library symbols are deactivated now by default. If you want to enforce this check, use: cmake .. -DDEACTIVATE_SYMBOLS_CHECK=ON to re-activate it. * Correct the check for the compressed size when the buffer is memcpyed. This was a regression introduced in 1.16.0. Fixes #261. * Fixed a regression in 1.16.0 that prevented to compress empty buffers (see #260). * Now the functions that execute Blosc decompressions are safe by default for untrusted/possibly corrupted inputs. * The previous functions (with less safety) checks are still available with a '_unsafe' suffix. The complete list is: * Also, a new API function named blosc_cbuffer_validate(), for validating Blosc compressed data, has been added. * For details, see PR #258. Thanks to Jeremy Maitin-Shepard. * Fixed a bug in blosc_compress() that could lead to thread deadlock under some situations. See #251. Thanks to -at-wenjuno for the report and the fix. * Fix data race in shuffle.c host_implementation initialization. Fixes #253. Thanks to Jeremy Maitin-Shepard. * Add workaround for Visual Studio 2008's lack of a stdint.h file to blosclz.c. * Replaced //-comments with /**/-comments and other improvements for compatibility with quite old gcc compilers. See PR #243. Thanks to Andreas Martin. * Empty buffers can be compressed again (this was unadvertedly prevented while fixing #234). See #247. Thanks to Valentin Haenel.
Update to version 1.14.4:
* Added a new DEACTIVATE_SSE2 option for cmake that is useful for disabling SSE2 when doing cross-compilation (see #236). * New check for detecting output buffers smaller than BLOSC_MAX_OVERHEAD. * The complib and version parameters for blosc_get_complib_info() can be safely set to NULL now. This allows to call this function even if the user is not interested in these parameters (so no need to reserve memory for them). * In some situations that a supposedly blosc chunk is passed to blosc_decompress(), one might end with an Arithmetic exception. This is probably due to the chunk not being an actual blosc chunk, and divisions by zero might occur. A protection has been added for this.
Update to version 1.14.3:
* Fixed a bug that caused C-Blosc to crash on platforms requiring strict alignment. * Fixed a piece of code that was not C89 compliant.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.2:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Leap 15.1:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Backports SLE-15-SP2:
zypper in -t patch openSUSE-2020-2337=1
- openSUSE Backports SLE-15-SP1:
zypper in -t patch openSUSE-2020-2337=1
Package List:
- openSUSE Leap 15.2 (x86_64):
blosc-debugsource-1.20.1-lp152.4.3.1 blosc-devel-1.20.1-lp152.4.3.1 libblosc1-1.20.1-lp152.4.3.1 libblosc1-debuginfo-1.20.1-lp152.4.3.1
- openSUSE Leap 15.1 (x86_64):
blosc-debugsource-1.20.1-lp151.3.3.1 blosc-devel-1.20.1-lp151.3.3.1 libblosc1-1.20.1-lp151.3.3.1 libblosc1-debuginfo-1.20.1-lp151.3.3.1
- openSUSE Backports SLE-15-SP2 (aarch64 ppc64le s390x x86_64):
blosc-debugsource-1.20.1-bp152.4.3.1 blosc-devel-1.20.1-bp152.4.3.1 libblosc1-1.20.1-bp152.4.3.1 libblosc1-debuginfo-1.20.1-bp152.4.3.1
- openSUSE Backports SLE-15-SP1 (aarch64 ppc64le s390x x86_64):
blosc-devel-1.20.1-bp151.4.3.1 libblosc1-1.20.1-bp151.4.3.1
References:
https://www.suse.com/security/cve/CVE-2020-29367.html https://bugzilla.suse.com/1174075 https://bugzilla.suse.com/1179914 --===============3298343772566681392== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18Kb3BlblNVU0Ug U2VjdXJpdHkgQW5ub3VuY2UgbWFpbGluZyBsaXN0IC0tIHNlY3VyaXR5LWFubm91bmNlQGxpc3Rz Lm9wZW5zdXNlLm9yZwpUbyB1bnN1YnNjcmliZSwgZW1haWwgc2VjdXJpdHktYW5ub3VuY2UtbGVh dmVAbGlzdHMub3BlbnN1c2Uub3JnCkxpc3QgTmV0aXF1ZXR0ZTogaHR0cHM6Ly9lbi5vcGVuc3Vz ZS5vcmcvb3BlblNVU0U6TWFpbGluZ19saXN0X25ldGlxdWV0dGUKTGlzdCBBcmNoaXZlczogaHR0 cHM6Ly9saXN0cy5vcGVuc3VzZS5vcmcvYXJjaGl2ZXMvbGlzdC9zZWN1cml0eS1hbm5vdW5jZUBs aXN0cy5vcGVuc3VzZS5vcmcK
--===============3298343772566681392== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ Hangout mailing list Hangout-at-nylxs.com http://lists.mrbrklyn.com/mailman/listinfo/hangout
--===============3298343772566681392==--
|
|