SUSE: 2022:1651-1 bci/python Security Update | LinuxSecurity.com
SUSE Container Update Advisory: bci/python
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:1651-1
Container Tags        : bci/python:3 , bci/python:3.9 , bci/python:3.9-18.35
Container Release     : 18.35
Severity              : important
Type                  : security
References            : 1201431 CVE-2022-29187 
-----------------------------------------------------------------

The container bci/python was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2550-1
Released:    Tue Jul 26 14:00:21 2022
Summary:     Security update for git
Type:        security
Severity:    important
References:  1201431,CVE-2022-29187
This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).


The following package changes have been done:

- git-core-2.35.3-150300.10.15.1 updated
- container:sles15-image-15.0.0-17.20.5 updated

SUSE: 2022:1651-1 bci/python Security Update

July 27, 2022
The container bci/python was updated

Summary

Advisory ID: SUSE-SU-2022:2550-1 Released: Tue Jul 26 14:00:21 2022 Summary: Security update for git Type: security Severity: important

References

References : 1201431 CVE-2022-29187

1201431,CVE-2022-29187

This update for git fixes the following issues:

- CVE-2022-29187: Incomplete fix for CVE-2022-24765: potential command injection via git worktree (bsc#1201431).

The following package changes have been done:

- git-core-2.35.3-150300.10.15.1 updated

- container:sles15-image-15.0.0-17.20.5 updated

Severity
Container Advisory ID : SUSE-CU-2022:1651-1
Container Tags : bci/python:3 , bci/python:3.9 , bci/python:3.9-18.35
Container Release : 18.35
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.