SUSE: 2021:611-1 suse/sle15 Security Update | LinuxSecurity.com

Advisories

SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2021:611-1
Container Tags        : suse/sle15:15.4 , suse/sle15:15.4.150400.21.53
Container Release     : 150400.21.53
Severity              : moderate
Type                  : security
References            : 1175825 1191592 1192717 CVE-2020-8927 CVE-2021-43618 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3942-1
Released:    Mon Dec  6 14:46:05 2021
Summary:     Security update for brotli
Type:        security
Severity:    moderate
References:  1175825,CVE-2020-8927
This update for brotli fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3946-1
Released:    Mon Dec  6 14:57:42 2021
Summary:     Security update for gmp
Type:        security
Severity:    moderate
References:  1192717,CVE-2021-43618
This update for gmp fixes the following issues:
    
- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2021:3980-1
Released:    Thu Dec  9 16:42:19 2021
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1191592

glibc was updated to fix the following issue:

- Support for new IBM Z Hardware (bsc#1191592, jsc#IBM-869)


The following package changes have been done:

- bash-4.4-150400.23.41 updated
- cpio-2.13-150400.1.28 updated
- glibc-2.31-9.6.1 updated
- libblkid1-2.37.2-150400.2.13 updated
- libbrotlicommon1-1.0.7-3.3.1 updated
- libbrotlidec1-1.0.7-3.3.1 updated
- libbz2-1-1.0.8-150400.1.42 updated
- libcom_err2-1.46.4-150400.1.14 updated
- libcurl4-7.79.1-150400.1.5 updated
- libdw1-0.185-150400.2.42 updated
- libelf1-0.185-150400.2.42 updated
- libfdisk1-2.37.2-150400.2.13 updated
- libgcrypt20-hmac-1.9.4-150400.1.54 updated
- libgcrypt20-1.9.4-150400.1.54 updated
- libgmp10-6.1.2-4.9.1 updated
- libgpg-error0-1.42-150400.1.52 updated
- libgpgme11-1.16.0-150400.1.28 updated
- libkeyutils1-1.6.3-150400.1.58 updated
- libmount1-2.37.2-150400.2.13 updated
- libopenssl1_1-hmac-1.1.1l-150400.2.26 updated
- libopenssl1_1-1.1.1l-150400.2.26 updated
- libreadline7-7.0-150400.23.41 updated
- libsmartcols1-2.37.2-150400.2.13 updated
- libssh-config-0.9.6-150400.1.1 added
- libssh4-0.9.6-150400.1.1 updated
- libsystemd0-249.7-150400.1.16 updated
- libudev1-249.7-150400.1.16 updated
- libuuid1-2.37.2-150400.2.13 updated
- libzstd1-1.5.0-150400.1.8 updated
- login_defs-4.8.1-150400.7.17 updated
- openssl-1_1-1.1.1l-150400.2.26 updated
- patterns-base-fips-20200124-150400.16.1 updated
- rpm-config-SUSE-1-150400.11.18 updated
- shadow-4.8.1-150400.7.17 updated
- sles-release-15.4-150400.28.1 updated
- system-group-hardware-20170617-150400.21.17 updated
- util-linux-2.37.2-150400.2.13 updated

SUSE: 2021:611-1 suse/sle15 Security Update

December 26, 2021
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2021:3942-1 Released: Mon Dec 6 14:46:05 2021 Summary: Security update for brotli Type: security Severity: moderate Advisory ID: SUSE-SU-2021:3946-1 Released: Mon Dec 6 14:57:42 2021 Summary: Security update for gmp Type: security Severity: moderate Advisory ID: SUSE-RU-2021:3980-1 Released: Thu Dec 9 16:42:19 2021 Summary: Recommended update for glibc Type: recommended Severity: moderate

References

References : 1175825 1191592 1192717 CVE-2020-8927 CVE-2021-43618

1175825,CVE-2020-8927

This update for brotli fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).

1192717,CVE-2021-43618

This update for gmp fixes the following issues:

- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).

1191592

glibc was updated to fix the following issue:

- Support for new IBM Z Hardware (bsc#1191592, jsc#IBM-869)

The following package changes have been done:

- bash-4.4-150400.23.41 updated

- cpio-2.13-150400.1.28 updated

- glibc-2.31-9.6.1 updated

- libblkid1-2.37.2-150400.2.13 updated

- libbrotlicommon1-1.0.7-3.3.1 updated

- libbrotlidec1-1.0.7-3.3.1 updated

- libbz2-1-1.0.8-150400.1.42 updated

- libcom_err2-1.46.4-150400.1.14 updated

- libcurl4-7.79.1-150400.1.5 updated

- libdw1-0.185-150400.2.42 updated

- libelf1-0.185-150400.2.42 updated

- libfdisk1-2.37.2-150400.2.13 updated

- libgcrypt20-hmac-1.9.4-150400.1.54 updated

- libgcrypt20-1.9.4-150400.1.54 updated

- libgmp10-6.1.2-4.9.1 updated

- libgpg-error0-1.42-150400.1.52 updated

- libgpgme11-1.16.0-150400.1.28 updated

- libkeyutils1-1.6.3-150400.1.58 updated

- libmount1-2.37.2-150400.2.13 updated

- libopenssl1_1-hmac-1.1.1l-150400.2.26 updated

- libopenssl1_1-1.1.1l-150400.2.26 updated

- libreadline7-7.0-150400.23.41 updated

- libsmartcols1-2.37.2-150400.2.13 updated

- libssh-config-0.9.6-150400.1.1 added

- libssh4-0.9.6-150400.1.1 updated

- libsystemd0-249.7-150400.1.16 updated

- libudev1-249.7-150400.1.16 updated

- libuuid1-2.37.2-150400.2.13 updated

- libzstd1-1.5.0-150400.1.8 updated

- login_defs-4.8.1-150400.7.17 updated

- openssl-1_1-1.1.1l-150400.2.26 updated

- patterns-base-fips-20200124-150400.16.1 updated

- rpm-config-SUSE-1-150400.11.18 updated

- shadow-4.8.1-150400.7.17 updated

- sles-release-15.4-150400.28.1 updated

- system-group-hardware-20170617-150400.21.17 updated

- util-linux-2.37.2-150400.2.13 updated

Severity
Container Advisory ID : SUSE-CU-2021:611-1
Container Tags : suse/sle15:15.4 , suse/sle15:15.4.150400.21.53
Container Release : 150400.21.53
Severity : moderate
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.