SUSE: 2022:286-1 suse/sle15 Security Update | LinuxSecurity.com
SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:286-1
Container Tags        : suse/sle15:15.1 , suse/sle15:15.1.6.2.582
Container Release     : 6.2.582
Severity              : important
Type                  : security
References            : 1193625 1194640 1194768 1194770 1195258 1195560 CVE-2015-8985
                        CVE-2021-22570 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:823-1
Released:    Mon Mar 14 15:16:37 2022
Summary:     Security update for protobuf
Type:        security
Severity:    moderate
References:  1195258,CVE-2021-22570
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:832-1
Released:    Mon Mar 14 17:27:03 2022
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1193625,1194640,1194768,1194770,1195560,CVE-2015-8985,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)


The following package changes have been done:

- glibc-2.26-13.65.1 updated
- libprotobuf-lite15-3.5.0-5.5.1 updated

SUSE: 2022:286-1 suse/sle15 Security Update

March 18, 2022
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2022:823-1 Released: Mon Mar 14 15:16:37 2022 Summary: Security update for protobuf Type: security Severity: moderate Advisory ID: SUSE-SU-2022:832-1 Released: Mon Mar 14 17:27:03 2022 Summary: Security update for glibc Type: security Severity: important

References

References : 1193625 1194640 1194768 1194770 1195258 1195560 CVE-2015-8985

CVE-2021-22570 CVE-2021-3999 CVE-2022-23218 CVE-2022-23219

1195258,CVE-2021-22570

This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).

1193625,1194640,1194768,1194770,1195560,CVE-2015-8985,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)

- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)

- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)

- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)

The following package changes have been done:

- glibc-2.26-13.65.1 updated

- libprotobuf-lite15-3.5.0-5.5.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:286-1
Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.582
Container Release : 6.2.582
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.