SUSE: 2022:2251-1 suse/pcp Security Update | LinuxSecurity.com

Advisories

SUSE Container Update Advisory: suse/pcp
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:2251-1
Container Tags        : suse/pcp:5 , suse/pcp:5.2 , suse/pcp:5.2.2 , suse/pcp:5.2.2-10.28 , suse/pcp:latest
Container Release     : 10.28
Severity              : moderate
Type                  : security
References            : 1047178 CVE-2017-6512 
-----------------------------------------------------------------

The container suse/pcp was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3271-1
Released:    Wed Sep 14 06:45:39 2022
Summary:     Security update for perl
Type:        security
Severity:    moderate
References:  1047178,CVE-2017-6512
This update for perl fixes the following issues:

- CVE-2017-6512: Fixed File::Path rmtree/remove_tree race condition (bsc#1047178).


The following package changes have been done:

- perl-base-5.26.1-150300.17.11.1 updated
- perl-5.26.1-150300.17.11.1 updated
- container:bci-bci-init-15.4-15.4-22.17 updated

SUSE: 2022:2251-1 suse/pcp Security Update

September 15, 2022
The container suse/pcp was updated

Summary

Advisory ID: SUSE-SU-2022:3271-1 Released: Wed Sep 14 06:45:39 2022 Summary: Security update for perl Type: security Severity: moderate

References

References : 1047178 CVE-2017-6512

1047178,CVE-2017-6512

This update for perl fixes the following issues:

- CVE-2017-6512: Fixed File::Path rmtree/remove_tree race condition (bsc#1047178).

The following package changes have been done:

- perl-base-5.26.1-150300.17.11.1 updated

- perl-5.26.1-150300.17.11.1 updated

- container:bci-bci-init-15.4-15.4-22.17 updated

Severity
Container Advisory ID : SUSE-CU-2022:2251-1
Container Tags : suse/pcp:5 , suse/pcp:5.2 , suse/pcp:5.2.2 , suse/pcp:5.2.2-10.28 , suse/pcp:latest
Container Release : 10.28
Severity : moderate
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.