SUSE: 2022:3087-1 bci/python Security Update | LinuxSecurity.com
SUSE Container Update Advisory: bci/python
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3087-1
Container Tags        : bci/python:3 , bci/python:3.9 , bci/python:3.9-20.43
Container Release     : 20.43
Severity              : important
Type                  : security
References            : 1177460 1199944 1202324 1204649 1204886 1205156 1205244 CVE-2022-1664
                        CVE-2022-42919 CVE-2022-45061 
-----------------------------------------------------------------

The container bci/python was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:4066-1
Released:    Fri Nov 18 10:43:00 2022
Summary:     Recommended update for timezone
Type:        recommended
Severity:    important
References:  1177460,1202324,1204649,1205156
This update for timezone fixes the following issues:

Update timezone version from 2022a to 2022f (bsc#1177460, bsc#1204649, bsc#1205156):

- Mexico will no longer observe DST except near the US border
- Chihuahua moves to year-round -06 on 2022-10-30
- Fiji no longer observes DST
- In vanguard form, GMT is now a Zone and Etc/GMT a link
- zic now supports links to links, and vanguard form uses this
- Simplify four Ontario zones
- Fix a Y2438 bug when reading TZif data
- Enable 64-bit time_t on 32-bit glibc platforms
- Omit large-file support when no longer needed
- Jordan and Syria switch from +02/+03 with DST to year-round +03
- Palestine transitions are now Saturdays at 02:00
- Simplify three Ukraine zones into one
- Improve tzselect on intercontinental Zones
- Chile's DST is delayed by a week in September 2022 (bsc#1202324)
- Iran no longer observes DST after 2022
- Rename Europe/Kiev to Europe/Kyiv
- New `zic -R` command option
- Vanguard form now uses %z

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4071-1
Released:    Fri Nov 18 13:05:48 2022
Summary:     Security update for python39
Type:        security
Severity:    important
References:  1204886,1205244,CVE-2022-42919,CVE-2022-45061
This update for python39 fixes the following issues:

Security fixes:

- CVE-2022-42919: Fixed local privilege escalation via the multiprocessing forkserver start method (bsc#1204886).
- CVE-2022-45061: Fixed a quadratic IDNA decoding time (bsc#1205244).

Other fixes:

- Allow building of documentation with the latest Sphinx 5.3.0 (gh#python/cpython#98366).
  
- Update to 3.9.15:
  - Fix multiplying a list by an integer (list *= int): detect
    the integer overflow when the new allocated length is close
    to the maximum size.
  - Fix a shell code injection vulnerability in the
    get-remote-certificate.py example script. The script no
    longer uses a shell to run openssl commands. (originally
    filed as CVE-2022-37460, later withdrawn)
  - Fix command line parsing: reject -X int_max_str_digits option
    with no value (invalid) when the PYTHONINTMAXSTRDIGITS
    environment variable is set to a valid limit.
  - When ValueError is raised if an integer is larger than the
    limit, mention the sys.set_int_max_str_digits() function in
    the error message.
  - Update bundled libexpat to 2.4.9

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4081-1
Released:    Fri Nov 18 15:40:46 2022
Summary:     Security update for dpkg
Type:        security
Severity:    low
References:  1199944,CVE-2022-1664
This update for dpkg fixes the following issues:

- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).


The following package changes have been done:

- krb5-1.19.2-150300.7.7.1 updated
- libpython3_9-1_0-3.9.15-150300.4.21.1 updated
- python39-base-3.9.15-150300.4.21.1 updated
- python39-3.9.15-150300.4.21.1 updated
- timezone-2022f-150000.75.15.1 updated
- update-alternatives-1.19.0.4-150000.4.4.1 updated
- container:sles15-image-15.0.0-17.20.74 updated

SUSE: 2022:3087-1 bci/python Security Update

November 23, 2022
The container bci/python was updated

Summary

Advisory ID: SUSE-RU-2022:4066-1 Released: Fri Nov 18 10:43:00 2022 Summary: Recommended update for timezone Type: recommended Severity: important Advisory ID: SUSE-SU-2022:4071-1 Released: Fri Nov 18 13:05:48 2022 Summary: Security update for python39 Type: security Severity: important Advisory ID: SUSE-SU-2022:4081-1 Released: Fri Nov 18 15:40:46 2022 Summary: Security update for dpkg Type: security Severity: low

References

References : 1177460 1199944 1202324 1204649 1204886 1205156 1205244 CVE-2022-1664

CVE-2022-42919 CVE-2022-45061

1177460,1202324,1204649,1205156

This update for timezone fixes the following issues:

Update timezone version from 2022a to 2022f (bsc#1177460, bsc#1204649, bsc#1205156):

- Mexico will no longer observe DST except near the US border

- Chihuahua moves to year-round -06 on 2022-10-30

- Fiji no longer observes DST

- In vanguard form, GMT is now a Zone and Etc/GMT a link

- zic now supports links to links, and vanguard form uses this

- Simplify four Ontario zones

- Fix a Y2438 bug when reading TZif data

- Enable 64-bit time_t on 32-bit glibc platforms

- Omit large-file support when no longer needed

- Jordan and Syria switch from +02/+03 with DST to year-round +03

- Palestine transitions are now Saturdays at 02:00

- Simplify three Ukraine zones into one

- Improve tzselect on intercontinental Zones

- Chile's DST is delayed by a week in September 2022 (bsc#1202324)

- Iran no longer observes DST after 2022

- Rename Europe/Kiev to Europe/Kyiv

- New `zic -R` command option

- Vanguard form now uses %z

1204886,1205244,CVE-2022-42919,CVE-2022-45061

This update for python39 fixes the following issues:

Security fixes:

- CVE-2022-42919: Fixed local privilege escalation via the multiprocessing forkserver start method (bsc#1204886).

- CVE-2022-45061: Fixed a quadratic IDNA decoding time (bsc#1205244).

Other fixes:

- Allow building of documentation with the latest Sphinx 5.3.0 (gh#python/cpython#98366).

- Update to 3.9.15:

- Fix multiplying a list by an integer (list *= int): detect

the integer overflow when the new allocated length is close

to the maximum size.

- Fix a shell code injection vulnerability in the

get-remote-certificate.py example script. The script no

longer uses a shell to run openssl commands. (originally

filed as CVE-2022-37460, later withdrawn)

- Fix command line parsing: reject -X int_max_str_digits option

with no value (invalid) when the PYTHONINTMAXSTRDIGITS

environment variable is set to a valid limit.

- When ValueError is raised if an integer is larger than the

limit, mention the sys.set_int_max_str_digits() function in

the error message.

- Update bundled libexpat to 2.4.9

1199944,CVE-2022-1664

This update for dpkg fixes the following issues:

- CVE-2022-1664: Fixed a directory traversal vulnerability in Dpkg::Source::Archive (bsc#1199944).

The following package changes have been done:

- krb5-1.19.2-150300.7.7.1 updated

- libpython3_9-1_0-3.9.15-150300.4.21.1 updated

- python39-base-3.9.15-150300.4.21.1 updated

- python39-3.9.15-150300.4.21.1 updated

- timezone-2022f-150000.75.15.1 updated

- update-alternatives-1.19.0.4-150000.4.4.1 updated

- container:sles15-image-15.0.0-17.20.74 updated

Severity
Container Advisory ID : SUSE-CU-2022:3087-1
Container Tags : bci/python:3 , bci/python:3.9 , bci/python:3.9-20.43
Container Release : 20.43
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.