SUSE Container Update Advisory: suse/sle-micro/5.3/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:2505-1
Container Tags        : suse/sle-micro/5.3/toolbox:11.1 , suse/sle-micro/5.3/toolbox:11.1-5.2.9 , suse/sle-micro/5.3/toolbox:latest
Container Release     : 5.2.9
Severity              : critical
Type                  : security
References            : 1198523 1201942 1202624 1203438 CVE-2021-28861 CVE-2022-40674
-----------------------------------------------------------------

The container suse/sle-micro/5.3/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3452-1
Released:    Wed Sep 28 12:13:43 2022
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1201942
This update for glibc fixes the following issues:

- Reversing calculation of __x86_shared_non_temporal_threshold (bsc#1201942)
- powerpc: Optimized memcmp for power10 (jsc#PED-987)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3489-1
Released:    Sat Oct  1 13:35:24 2022
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1203438,CVE-2022-40674
This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:3521-1
Released:    Tue Oct  4 14:18:56 2022
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    critical
References:  1198523
This update for lvm2 fixes the following issues:

- Add additional check in the package to prevent removal of device-mapper library files during install (bsc#1198523)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:3544-1
Released:    Thu Oct  6 13:48:42 2022
Summary:     Security update for python3
Type:        security
Severity:    important
References:  1202624,CVE-2021-28861
This update for python3 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).


The following package changes have been done:

- glibc-locale-base-2.31-150300.41.1 updated
- glibc-locale-2.31-150300.41.1 updated
- libdevmapper1_03-1.02.163-150400.178.1 updated
- libexpat1-2.4.4-150400.3.9.1 updated
- libpython3_6m1_0-3.6.15-150300.10.30.1 updated
- python3-base-3.6.15-150300.10.30.1 updated

SUSE: 2022:2505-1 suse/sle-micro/5.3/toolbox Security Update

October 11, 2022
The container suse/sle-micro/5.3/toolbox was updated

Summary

Advisory ID: SUSE-RU-2022:3452-1 Released: Wed Sep 28 12:13:43 2022 Summary: Recommended update for glibc Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:3489-1 Released: Sat Oct 1 13:35:24 2022 Summary: Security update for expat Type: security Severity: important Advisory ID: SUSE-RU-2022:3521-1 Released: Tue Oct 4 14:18:56 2022 Summary: Recommended update for lvm2 Type: recommended Severity: critical Advisory ID: SUSE-SU-2022:3544-1 Released: Thu Oct 6 13:48:42 2022 Summary: Security update for python3 Type: security Severity: important

References

References : 1198523 1201942 1202624 1203438 CVE-2021-28861 CVE-2022-40674

1201942

This update for glibc fixes the following issues:

- Reversing calculation of __x86_shared_non_temporal_threshold (bsc#1201942)

- powerpc: Optimized memcmp for power10 (jsc#PED-987)

1203438,CVE-2022-40674

This update for expat fixes the following issues:

- CVE-2022-40674: Fixed use-after-free in the doContent function in xmlparse.c (bsc#1203438).

1198523

This update for lvm2 fixes the following issues:

- Add additional check in the package to prevent removal of device-mapper library files during install (bsc#1198523)

1202624,CVE-2021-28861

This update for python3 fixes the following issues:

- CVE-2021-28861: Fixed an open redirection vulnerability in the HTTP server when an URI path starts with // (bsc#1202624).

The following package changes have been done:

- glibc-locale-base-2.31-150300.41.1 updated

- glibc-locale-2.31-150300.41.1 updated

- libdevmapper1_03-1.02.163-150400.178.1 updated

- libexpat1-2.4.4-150400.3.9.1 updated

- libpython3_6m1_0-3.6.15-150300.10.30.1 updated

- python3-base-3.6.15-150300.10.30.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:2505-1
Container Tags : suse/sle-micro/5.3/toolbox:11.1 , suse/sle-micro/5.3/toolbox:11.1-5.2.9 , suse/sle-micro/5.3/toolbox:latest
Container Release : 5.2.9
Severity : critical
Type : security

Related News