SUSE: 2022:3475-1 bci/bci-init Security Update | LinuxSecurity.com
SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:3475-1
Container Tags        : bci/bci-init:15.3 , bci/bci-init:15.3.21.99
Container Release     : 21.99
Severity              : important
Type                  : security
References            : 1200723 1203857 1204423 1205000 1206309 1206337 CVE-2022-43552
                        CVE-2022-4415 CVE-2022-46908 
-----------------------------------------------------------------

The container bci/bci-init was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4628-1
Released:    Wed Dec 28 09:23:13 2022
Summary:     Security update for sqlite3
Type:        security
Severity:    moderate
References:  1206337,CVE-2022-46908
This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism, 
  when relying on --safe for execution of an untrusted CLI script (bsc#1206337).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4630-1
Released:    Wed Dec 28 09:25:18 2022
Summary:     Security update for systemd
Type:        security
Severity:    important
References:  1200723,1203857,1204423,1205000,CVE-2022-4415
This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).

Bug fixes:

- Support by-path devlink for multipath nvme block devices (bsc#1200723).
- Set SYSTEMD_NSS_DYNAMIC_BYPASS=1 env var for dbus-daemon (bsc#1203857).
- Restrict cpu rule to x86_64, and also update the rule files to make use of the 'CONST{arch}' syntax (bsc#1204423).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:4633-1
Released:    Wed Dec 28 09:32:15 2022
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1206309,CVE-2022-43552
This update for curl fixes the following issues:

- CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).


The following package changes have been done:

- libcurl4-7.66.0-150200.4.45.1 updated
- libsqlite3-0-3.39.3-150000.3.20.1 updated
- libsystemd0-246.16-150300.7.57.1 updated
- libudev1-246.16-150300.7.57.1 updated
- systemd-246.16-150300.7.57.1 updated
- udev-246.16-150300.7.57.1 updated
- container:sles15-image-15.0.0-17.20.88 updated

SUSE: 2022:3475-1 bci/bci-init Security Update

December 29, 2022
The container bci/bci-init was updated

Summary

Advisory ID: SUSE-SU-2022:4628-1 Released: Wed Dec 28 09:23:13 2022 Summary: Security update for sqlite3 Type: security Severity: moderate Advisory ID: SUSE-SU-2022:4630-1 Released: Wed Dec 28 09:25:18 2022 Summary: Security update for systemd Type: security Severity: important Advisory ID: SUSE-SU-2022:4633-1 Released: Wed Dec 28 09:32:15 2022 Summary: Security update for curl Type: security Severity: moderate

References

References : 1200723 1203857 1204423 1205000 1206309 1206337 CVE-2022-43552

CVE-2022-4415 CVE-2022-46908

1206337,CVE-2022-46908

This update for sqlite3 fixes the following issues:

- CVE-2022-46908: Properly implement the azProhibitedFunctions protection mechanism,

when relying on --safe for execution of an untrusted CLI script (bsc#1206337).

1200723,1203857,1204423,1205000,CVE-2022-4415

This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed systemd-coredump that did not respect the fs.suid_dumpable kernel setting (bsc#1205000).

Bug fixes:

- Support by-path devlink for multipath nvme block devices (bsc#1200723).

- Set SYSTEMD_NSS_DYNAMIC_BYPASS=1 env var for dbus-daemon (bsc#1203857).

- Restrict cpu rule to x86_64, and also update the rule files to make use of the 'CONST{arch}' syntax (bsc#1204423).

1206309,CVE-2022-43552

This update for curl fixes the following issues:

- CVE-2022-43552: HTTP Proxy deny use-after-free (bsc#1206309).

The following package changes have been done:

- libcurl4-7.66.0-150200.4.45.1 updated

- libsqlite3-0-3.39.3-150000.3.20.1 updated

- libsystemd0-246.16-150300.7.57.1 updated

- libudev1-246.16-150300.7.57.1 updated

- systemd-246.16-150300.7.57.1 updated

- udev-246.16-150300.7.57.1 updated

- container:sles15-image-15.0.0-17.20.88 updated

Severity
Container Advisory ID : SUSE-CU-2022:3475-1
Container Tags : bci/bci-init:15.3 , bci/bci-init:15.3.21.99
Container Release : 21.99
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.