SUSE Container Update Advisory: bci/python
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:216-1
Container Tags        : bci/python:3.6 , bci/python:3.6-10.11
Container Release     : 10.11
Severity              : important
Type                  : security
References            : 1191826 1192637 1194178 1194265 1194968 1195054 1195217 CVE-2021-3997
                        CVE-2022-23852 CVE-2022-23990 
-----------------------------------------------------------------

The container bci/python was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:383-1
Released:    Tue Feb 15 17:47:36 2022
Summary:     Recommended update for cyrus-sasl
Type:        recommended
Severity:    moderate
References:  1194265
This update for cyrus-sasl fixes the following issues:

- Fixed an issue when in postfix 'sasl' authentication with password fails. (bsc#1194265)
- Add config parameter '--with-dblib=gdbm'
- Avoid converting of '/etc/sasldb2 by every update. Convert '/etc/sasldb2' only if it is a Berkeley DB.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:498-1
Released:    Fri Feb 18 10:46:56 2022
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1195054,1195217,CVE-2022-23852,CVE-2022-23990
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:520-1
Released:    Fri Feb 18 12:45:19 2022
Summary:     Recommended update for rpm
Type:        recommended
Severity:    moderate
References:  1194968
This update for rpm fixes the following issues:

- Revert unwanted /usr/bin/python to /usr/bin/python2 change we got with the update to 4.14.3 (bsc#1194968)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:539-1
Released:    Mon Feb 21 13:47:51 2022
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1191826,1192637,1194178,CVE-2021-3997
This update for systemd fixes the following issues:

- CVE-2021-3997: Fixed an uncontrolled recursion in systemd's systemd-tmpfiles (bsc#1194178).

The following non-security bugs were fixed:
- udev/net_id: don't generate slot based names if multiple devices might claim the same slot (bsc#1192637)
- localectl: don't omit keymaps files that are symlinks (bsc#1191826)


The following package changes have been done:

- libexpat1-2.2.5-3.12.1 updated
- libsasl2-3-2.1.27-150300.4.3.1 updated
- libsystemd0-246.16-150300.7.39.1 updated
- libudev1-246.16-150300.7.39.1 updated
- rpm-ndb-4.14.3-150300.46.1 updated
- container:sles15-image-15.0.0-17.8.81 updated