SUSE: 2022:1420-1 bci/dotnet-sdk Security Update | LinuxSecurity.com

Advisories

SUSE Container Update Advisory: bci/dotnet-sdk
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:1420-1
Container Tags        : bci/dotnet-sdk:5.0 , bci/dotnet-sdk:5.0-10.9 , bci/dotnet-sdk:5.0.17 , bci/dotnet-sdk:5.0.17-10.9
Container Release     : 10.9
Severity              : important
Type                  : security
References            : 1185637 1199166 1200550 1200734 1200735 1200736 1200737 1201099
                        CVE-2022-1292 CVE-2022-2068 CVE-2022-2097 CVE-2022-32205 CVE-2022-32206
                        CVE-2022-32207 CVE-2022-32208 
-----------------------------------------------------------------

The container bci/dotnet-sdk was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2305-1
Released:    Wed Jul  6 13:38:42 2022
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1200734,1200735,1200736,1200737,CVE-2022-32205,CVE-2022-32206,CVE-2022-32207,CVE-2022-32208
This update for curl fixes the following issues:

- CVE-2022-32205: Set-Cookie denial of service (bsc#1200734)
- CVE-2022-32206: HTTP compression denial of service (bsc#1200735)
- CVE-2022-32207: Unpreserved file permissions (bsc#1200736)
- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2308-1
Released:    Wed Jul  6 14:15:13 2022
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1185637,1199166,1200550,1201099,CVE-2022-1292,CVE-2022-2068,CVE-2022-2097
This update for openssl-1_1 fixes the following issues:

- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).
- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)
- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode (bsc#1201099).


The following package changes have been done:

- libopenssl1_1-1.1.1l-150400.7.7.1 updated
- libopenssl1_1-hmac-1.1.1l-150400.7.7.1 updated
- libcurl4-7.79.1-150400.5.3.1 updated
- container:sles15-image-15.0.0-27.8.3 updated

SUSE: 2022:1420-1 bci/dotnet-sdk Security Update

July 7, 2022
The container bci/dotnet-sdk was updated

Summary

Advisory ID: SUSE-SU-2022:2305-1 Released: Wed Jul 6 13:38:42 2022 Summary: Security update for curl Type: security Severity: important Advisory ID: SUSE-SU-2022:2308-1 Released: Wed Jul 6 14:15:13 2022 Summary: Security update for openssl-1_1 Type: security Severity: important

References

References : 1185637 1199166 1200550 1200734 1200735 1200736 1200737 1201099

CVE-2022-1292 CVE-2022-2068 CVE-2022-2097 CVE-2022-32205 CVE-2022-32206

CVE-2022-32207 CVE-2022-32208

1200734,1200735,1200736,1200737,CVE-2022-32205,CVE-2022-32206,CVE-2022-32207,CVE-2022-32208

This update for curl fixes the following issues:

- CVE-2022-32205: Set-Cookie denial of service (bsc#1200734)

- CVE-2022-32206: HTTP compression denial of service (bsc#1200735)

- CVE-2022-32207: Unpreserved file permissions (bsc#1200736)

- CVE-2022-32208: FTP-KRB bad message verification (bsc#1200737)

1185637,1199166,1200550,1201099,CVE-2022-1292,CVE-2022-2068,CVE-2022-2097

This update for openssl-1_1 fixes the following issues:

- CVE-2022-1292: Fixed command injection in c_rehash (bsc#1199166).

- CVE-2022-2068: Fixed more shell code injection issues in c_rehash. (bsc#1200550)

- CVE-2022-2097: Fixed partial missing encryption in AES OCB mode (bsc#1201099).

The following package changes have been done:

- libopenssl1_1-1.1.1l-150400.7.7.1 updated

- libopenssl1_1-hmac-1.1.1l-150400.7.7.1 updated

- libcurl4-7.79.1-150400.5.3.1 updated

- container:sles15-image-15.0.0-27.8.3 updated

Severity
Container Advisory ID : SUSE-CU-2022:1420-1
Container Tags : bci/dotnet-sdk:5.0 , bci/dotnet-sdk:5.0-10.9 , bci/dotnet-sdk:5.0.17 , bci/dotnet-sdk:5.0.17-10.9
Container Release : 10.9
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.