SUSE: 2022:1618-1 suse/sles12sp4 Security Update | LinuxSecurity.com

Advisories

SUSE Container Update Advisory: suse/sles12sp4
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:1618-1
Container Tags        : suse/sles12sp4:26.480 , suse/sles12sp4:latest
Container Release     : 26.480
Severity              : important
Type                  : security
References            : 1201225 CVE-2022-34903 
-----------------------------------------------------------------

The container suse/sles12sp4 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2529-1
Released:    Fri Jul 22 13:09:00 2022
Summary:     Security update for gpg2
Type:        security
Severity:    important
References:  1201225,CVE-2022-34903
This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).


The following package changes have been done:

- base-container-licenses-3.0-1.302 updated
- container-suseconnect-2.0.0-1.190 updated
- gpg2-2.0.24-9.11.1 updated

SUSE: 2022:1618-1 suse/sles12sp4 Security Update

July 23, 2022
The container suse/sles12sp4 was updated

Summary

Advisory ID: SUSE-SU-2022:2529-1 Released: Fri Jul 22 13:09:00 2022 Summary: Security update for gpg2 Type: security Severity: important

References

References : 1201225 CVE-2022-34903

1201225,CVE-2022-34903

This update for gpg2 fixes the following issues:

- CVE-2022-34903: Fixed a status injection vulnerability (bsc#1201225).

The following package changes have been done:

- base-container-licenses-3.0-1.302 updated

- container-suseconnect-2.0.0-1.190 updated

- gpg2-2.0.24-9.11.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:1618-1
Container Tags : suse/sles12sp4:26.480 , suse/sles12sp4:latest
Container Release : 26.480
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.