SUSE: 2022:1999-1 suse/sle15 Security Update | LinuxSecurity.com
SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:1999-1
Container Tags        : bci/bci-base:15.3 , bci/bci-base:15.3.17.20.23 , suse/sle15:15.3 , suse/sle15:15.3.17.20.23
Container Release     : 17.20.23
Severity              : important
Type                  : security
References            : 1202175 CVE-2022-37434 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:2947-1
Released:    Wed Aug 31 09:16:21 2022
Summary:     Security update for zlib
Type:        security
Severity:    important
References:  1202175,CVE-2022-37434
This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).


The following package changes have been done:

- libz1-1.2.11-150000.3.33.1 updated

SUSE: 2022:1999-1 suse/sle15 Security Update

September 1, 2022
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2022:2947-1 Released: Wed Aug 31 09:16:21 2022 Summary: Security update for zlib Type: security Severity: important

References

References : 1202175 CVE-2022-37434

1202175,CVE-2022-37434

This update for zlib fixes the following issues:

- CVE-2022-37434: Fixed heap-based buffer over-read or buffer overflow via large gzip header extra field (bsc#1202175).

The following package changes have been done:

- libz1-1.2.11-150000.3.33.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:1999-1
Container Tags : bci/bci-base:15.3 , bci/bci-base:15.3.17.20.23 , suse/sle15:15.3 , suse/sle15:15.3.17.20.23
Container Release : 17.20.23
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.