SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2021:283-1
Container Tags        : suse/sle15:15.3 , suse/sle15:15.3.17.5.33
Container Release     : 17.5.33
Severity              : critical
Type                  : security
References            : 1057452 1166028 1171962 1179416 1181805 1183543 1183545 1184994
                        1185972 1188063 1188287 1188571 1189206 1189465 1189465 CVE-2020-13529
                        CVE-2021-20266 CVE-2021-20271 CVE-2021-33910 CVE-2021-3421 CVE-2021-36222
                        CVE-2021-38185 CVE-2021-38185 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2682-1
Released:    Thu Aug 12 20:06:19 2021
Summary:     Security update for rpm
Type:        security
Severity:    important
References:  1179416,1181805,1183543,1183545,CVE-2021-20266,CVE-2021-20271,CVE-2021-3421
This update for rpm fixes the following issues:

- Changed default package verification level to 'none' to be compatible to rpm-4.14.1
- Made illegal obsoletes a warning
- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
- Added support for enforcing signature policy and payload verification step to
  transactions (jsc#SLE-17817)
- Added :humansi and :hmaniec query formatters for human readable output
- Added query selectors for whatobsoletes and whatconflicts
- Added support for sorting caret higher than base version
- rpm does no longer require the signature header to be in a contiguous
  region when signing (bsc#1181805)

Security fixes:

- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an
  attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM
  repository, to cause RPM database corruption. The highest threat from this vulnerability is to
  data integrity (bsc#1183543)

- CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.
  This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,
  whose signature header was modified, to cause RPM database corruption and execute code. The highest
  threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

- CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker
  who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability
  is to system availability.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2689-1
Released:    Mon Aug 16 10:54:52 2021
Summary:     Security update for cpio
Type:        security
Severity:    important
References:  1189206,CVE-2021-38185
This update for cpio fixes the following issues:

It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2763-1
Released:    Tue Aug 17 17:16:22 2021
Summary:     Recommended update for cpio
Type:        recommended
Severity:    critical
References:  1189465
This update for cpio fixes the following issues:

- A regression in last update would cause builds to hang on various architectures(bsc#1189465)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2780-1
Released:    Thu Aug 19 16:09:15 2021
Summary:     Recommended update for cpio
Type:        recommended
Severity:    critical
References:  1189465,CVE-2021-38185
This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:2786-1
Released:    Fri Aug 20 02:02:23 2021
Summary:     Recommended update for bash
Type:        recommended
Severity:    important
References:  1057452,1188287
This update for bash fixes the following issues:

- Allow process group assignment even for modern kernels (bsc#1057452, bsc#1188287)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2800-1
Released:    Fri Aug 20 10:43:04 2021
Summary:     Security update for krb5
Type:        security
Severity:    important
References:  1188571,CVE-2021-36222
This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2809-1
Released:    Mon Aug 23 12:12:31 2021
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1166028,1171962,1184994,1185972,1188063,CVE-2020-13529,CVE-2021-33910
This update for systemd fixes the following issues:

- Updated to version 246.15
- CVE-2021-33910: Fixed a denial of service issue in systemd. (bsc#1188063)
- CVE-2020-13529: Fixed an issue that allows crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. (bsc#1185972)

SUSE: 2021:283-1 suse/sle15 Security Update

August 24, 2021
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2021:2682-1 Released: Thu Aug 12 20:06:19 2021 Summary: Security update for rpm Type: security Severity: important Advisory ID: SUSE-SU-2021:2689-1 Released: Mon Aug 16 10:54:52 2021 Summary: Security update for cpio Type: security Severity: important Advisory ID: SUSE-RU-2021:2763-1 Released: Tue Aug 17 17:16:22 2021 Summary: Recommended update for cpio Type: recommended Severity: critical Advisory ID: SUSE-RU-2021:2780-1 Released: Thu Aug 19 16:09:15 2021 Summary: Recommended update for cpio Type: recommended Severity: critical Advisory ID: SUSE-RU-2021:2786-1 Released: Fri Aug 20 02:02:23 2021 Summary: Recommended update for bash Type: recommended Severity: important Advisory ID: SUSE-SU-2021:2800-1 Released: Fri Aug 20 10:43:04 2021 Summary: Security update for krb5 Type: security Severity: important Advisory ID: SUSE-SU-2021:2809-1 Released: Mon Aug 23 12:12:31 2021 Summary: Security update for systemd Type: security Severity: moderate

References

References : 1057452 1166028 1171962 1179416 1181805 1183543 1183545 1184994

1185972 1188063 1188287 1188571 1189206 1189465 1189465 CVE-2020-13529

CVE-2021-20266 CVE-2021-20271 CVE-2021-33910 CVE-2021-3421 CVE-2021-36222

CVE-2021-38185 CVE-2021-38185

1179416,1181805,1183543,1183545,CVE-2021-20266,CVE-2021-20271,CVE-2021-3421

This update for rpm fixes the following issues:

- Changed default package verification level to 'none' to be compatible to rpm-4.14.1

- Made illegal obsoletes a warning

- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)

- Added support for enforcing signature policy and payload verification step to

transactions (jsc#SLE-17817)

- Added :humansi and :hmaniec query formatters for human readable output

- Added query selectors for whatobsoletes and whatconflicts

- Added support for sorting caret higher than base version

- rpm does no longer require the signature header to be in a contiguous

region when signing (bsc#1181805)

Security fixes:

- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an

attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM

repository, to cause RPM database corruption. The highest threat from this vulnerability is to

data integrity (bsc#1183543)

- CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.

This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,

whose signature header was modified, to cause RPM database corruption and execute code. The highest

threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

- CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker

who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability

is to system availability.

1189206,CVE-2021-38185

This update for cpio fixes the following issues:

It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)

1189465

This update for cpio fixes the following issues:

- A regression in last update would cause builds to hang on various architectures(bsc#1189465)

1189465,CVE-2021-38185

This update for cpio fixes the following issues:

- A regression in the previous update could lead to crashes (bsc#1189465)

1057452,1188287

This update for bash fixes the following issues:

- Allow process group assignment even for modern kernels (bsc#1057452, bsc#1188287)

1188571,CVE-2021-36222

This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)

1166028,1171962,1184994,1185972,1188063,CVE-2020-13529,CVE-2021-33910

This update for systemd fixes the following issues:

- Updated to version 246.15

- CVE-2021-33910: Fixed a denial of service issue in systemd. (bsc#1188063)

- CVE-2020-13529: Fixed an issue that allows crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. (bsc#1185972)

Severity
Container Advisory ID : SUSE-CU-2021:283-1
Container Tags : suse/sle15:15.3 , suse/sle15:15.3.17.5.33
Container Release : 17.5.33
Severity : critical
Type : security

Related News