SUSE: 2022:2188-1 suse/sle-micro/5.3/toolbox Security Update | Linu...
SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:2188-1
Container Tags        : suse/sle-micro/5.3/toolbox:11.1 , suse/sle-micro/5.3/toolbox:11.1-4.2.35 , suse/sle-micro/5.3/toolbox:latest
Container Release     : 4.2.35
Severity              : important
Type                  : security
References            : 1185605 1200270 1200697 1200698 1200700 1200701 1200732 1200884
                        1200902 1200903 1200904 1201132 1201133 1201134 1201135 1201136
                        1201150 1201151 1201152 1201153 1201154 1201155 1201249 1201356
                        1201359 1201363 1201620 1201863 1202011 1202046 1202049 1202050
                        1202051 1202414 1202420 1202421 1202511 1202512 1202515 1202552
                        1202599 1202687 1202689 1202862 CVE-2022-1720 CVE-2022-1968 CVE-2022-2124
                        CVE-2022-2125 CVE-2022-2126 CVE-2022-2129 CVE-2022-2175 CVE-2022-2182
                        CVE-2022-2183 CVE-2022-2206 CVE-2022-2207 CVE-2022-2208 CVE-2022-2210
                        CVE-2022-2231 CVE-2022-2257 CVE-2022-2264 CVE-2022-2284 CVE-2022-2285
                        CVE-2022-2286 CVE-2022-2287 CVE-2022-2304 CVE-2022-2343 CVE-2022-2344
                        CVE-2022-2345 CVE-2022-2522 CVE-2022-2571 CVE-2022-2580 CVE-2022-2581
                        CVE-2022-2598 CVE-2022-2816 CVE-2022-2817 CVE-2022-2819 CVE-2022-2845
                        CVE-2022-2849 CVE-2022-2862 CVE-2022-2874 CVE-2022-2889 CVE-2022-2923
                        CVE-2022-2946 CVE-2022-3016 
-----------------------------------------------------------------

The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:2901-1
Released:    Fri Aug 26 03:34:23 2022
Summary:     Recommended update for elfutils
Type:        recommended
Severity:    moderate
References:  
This update for elfutils fixes the following issues:

- Fix runtime dependency for devel package

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3118-1
Released:    Tue Sep  6 15:43:53 2022
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    moderate
References:  1202011
This update for lvm2 fixes the following issues:

- Do not use udev for device listing or device information (bsc#1202011)

-----------------------------------------------------------------
Advisory ID: SUSE-feature-2022:3126-1
Released:    Wed Sep  7 04:34:30 2022
Summary:     Feature update for gdb
Type:        feature
Severity:    important
References:  1185605
This feature update for gdb fixes the following issues:

- Enable build option `--with-debuginfod` (bsc#1185605, jsc#PED-1246, jsc#PED-1149, jsc#PED-1138)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3229-1
Released:    Fri Sep  9 14:46:01 2022
Summary:     Security update for vim
Type:        security
Severity:    important
References:  1200270,1200697,1200698,1200700,1200701,1200732,1200884,1200902,1200903,1200904,1201132,1201133,1201134,1201135,1201136,1201150,1201151,1201152,1201153,1201154,1201155,1201249,1201356,1201359,1201363,1201620,1201863,1202046,1202049,1202050,1202051,1202414,1202420,1202421,1202511,1202512,1202515,1202552,1202599,1202687,1202689,1202862,CVE-2022-1720,CVE-2022-1968,CVE-2022-2124,CVE-2022-2125,CVE-2022-2126,CVE-2022-2129,CVE-2022-2175,CVE-2022-2182,CVE-2022-2183,CVE-2022-2206,CVE-2022-2207,CVE-2022-2208,CVE-2022-2210,CVE-2022-2231,CVE-2022-2257,CVE-2022-2264,CVE-2022-2284,CVE-2022-2285,CVE-2022-2286,CVE-2022-2287,CVE-2022-2304,CVE-2022-2343,CVE-2022-2344,CVE-2022-2345,CVE-2022-2522,CVE-2022-2571,CVE-2022-2580,CVE-2022-2581,CVE-2022-2598,CVE-2022-2816,CVE-2022-2817,CVE-2022-2819,CVE-2022-2845,CVE-2022-2849,CVE-2022-2862,CVE-2022-2874,CVE-2022-2889,CVE-2022-2923,CVE-2022-2946,CVE-2022-3016
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 0313:

- CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902).
- CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903).
- CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904).
- CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249).
- CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356).
- CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359).
- CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363).
- CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414).
- CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552).
- CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270).
- CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697).
- CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698).
- CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700).
- CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701).
- CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732).
- CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132).
- CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133).
- CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134).
- CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135).
- CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136).
- CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150).
- CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151).
- CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152).
- CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153).
- CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154).
- CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155).
- CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863).
- CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046).
- CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049).
- CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050).
- CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051).
- CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420).
- CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421).
- CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511).
- CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512).
- CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515).
- CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599).
- CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687).
- CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689).
- CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862).
  
Bugfixes:

- Fixing vim error on startup (bsc#1200884).
- Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620).


The following package changes have been done:

- gdb-11.1-150400.15.3.1 updated
- libdebuginfod1-dummy-0.185-150400.5.3.1 added
- libdevmapper1_03-1.02.163-150400.17.3.1 updated
- vim-data-common-9.0.0313-150000.5.25.1 updated
- vim-9.0.0313-150000.5.25.1 updated

SUSE: 2022:2188-1 suse/sle-micro/5.3/toolbox Security Update

September 13, 2022
The container suse/sle-micro/5.3/toolbox was updated

Summary

Advisory ID: SUSE-RU-2022:2901-1 Released: Fri Aug 26 03:34:23 2022 Summary: Recommended update for elfutils Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:3118-1 Released: Tue Sep 6 15:43:53 2022 Summary: Recommended update for lvm2 Type: recommended Severity: moderate Advisory ID: SUSE-feature-2022:3126-1 Released: Wed Sep 7 04:34:30 2022 Summary: Feature update for gdb Type: feature Severity: important Advisory ID: SUSE-SU-2022:3229-1 Released: Fri Sep 9 14:46:01 2022 Summary: Security update for vim Type: security Severity: important

References

References : 1185605 1200270 1200697 1200698 1200700 1200701 1200732 1200884

1200902 1200903 1200904 1201132 1201133 1201134 1201135 1201136

1201150 1201151 1201152 1201153 1201154 1201155 1201249 1201356

1201359 1201363 1201620 1201863 1202011 1202046 1202049 1202050

1202051 1202414 1202420 1202421 1202511 1202512 1202515 1202552

1202599 1202687 1202689 1202862 CVE-2022-1720 CVE-2022-1968 CVE-2022-2124

CVE-2022-2125 CVE-2022-2126 CVE-2022-2129 CVE-2022-2175 CVE-2022-2182

CVE-2022-2183 CVE-2022-2206 CVE-2022-2207 CVE-2022-2208 CVE-2022-2210

CVE-2022-2231 CVE-2022-2257 CVE-2022-2264 CVE-2022-2284 CVE-2022-2285

CVE-2022-2286 CVE-2022-2287 CVE-2022-2304 CVE-2022-2343 CVE-2022-2344

CVE-2022-2345 CVE-2022-2522 CVE-2022-2571 CVE-2022-2580 CVE-2022-2581

CVE-2022-2598 CVE-2022-2816 CVE-2022-2817 CVE-2022-2819 CVE-2022-2845

CVE-2022-2849 CVE-2022-2862 CVE-2022-2874 CVE-2022-2889 CVE-2022-2923

CVE-2022-2946 CVE-2022-3016

This update for elfutils fixes the following issues:

- Fix runtime dependency for devel package

1202011

This update for lvm2 fixes the following issues:

- Do not use udev for device listing or device information (bsc#1202011)

1185605

This feature update for gdb fixes the following issues:

- Enable build option `--with-debuginfod` (bsc#1185605, jsc#PED-1246, jsc#PED-1149, jsc#PED-1138)

1200270,1200697,1200698,1200700,1200701,1200732,1200884,1200902,1200903,1200904,1201132,1201133,1201134,1201135,1201136,1201150,1201151,1201152,1201153,1201154,1201155,1201249,1201356,1201359,1201363,1201620,1201863,1202046,1202049,1202050,1202051,1202414,1202420,1202421,1202511,1202512,1202515,1202552,1202599,1202687,1202689,1202862,CVE-2022-1720,CVE-2022-1968,CVE-2022-2124,CVE-2022-2125,CVE-2022-2126,CVE-2022-2129,CVE-2022-2175,CVE-2022-2182,CVE-2022-2183,CVE-2022-2206,CVE-2022-2207,CVE-2022-2208,CVE-2022-2210,CVE-2022-2231,CVE-2022-2257,CVE-2022-2264,CVE-2022-2284,CVE-2022-2285,CVE-2022-2286,CVE-2022-2287,CVE-2022-2304,CVE-2022-2343,CVE-2022-2344,CVE-2022-2345,CVE-2022-2522,CVE-2022-2571,CVE-2022-2580,CVE-2022-2581,CVE-2022-2598,CVE-2022-2816,CVE-2022-2817,CVE-2022-2819,CVE-2022-2845,CVE-2022-2849,CVE-2022-2862,CVE-2022-2874,CVE-2022-2889,CVE-2022-2923,CVE-2022-2946,CVE-2022-3016

This update for vim fixes the following issues:

Updated to version 9.0 with patch level 0313:

- CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902).

- CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903).

- CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904).

- CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249).

- CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356).

- CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359).

- CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363).

- CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414).

- CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552).

- CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270).

- CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697).

- CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698).

- CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700).

- CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701).

- CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732).

- CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132).

- CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133).

- CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134).

- CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135).

- CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136).

- CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150).

- CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151).

- CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152).

- CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153).

- CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154).

- CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155).

- CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863).

- CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046).

- CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049).

- CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050).

- CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051).

- CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420).

- CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421).

- CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511).

- CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512).

- CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515).

- CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599).

- CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687).

- CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689).

- CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862).

Bugfixes:

- Fixing vim error on startup (bsc#1200884).

- Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620).

The following package changes have been done:

- gdb-11.1-150400.15.3.1 updated

- libdebuginfod1-dummy-0.185-150400.5.3.1 added

- libdevmapper1_03-1.02.163-150400.17.3.1 updated

- vim-data-common-9.0.0313-150000.5.25.1 updated

- vim-9.0.0313-150000.5.25.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:2188-1
Container Tags : suse/sle-micro/5.3/toolbox:11.1 , suse/sle-micro/5.3/toolbox:11.1-4.2.35 , suse/sle-micro/5.3/toolbox:latest
Container Release : 4.2.35
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.