SUSE: 2022:483-1 bci/bci-init Security Update | LinuxSecurity.com
SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:483-1
Container Tags        : bci/bci-init:15.3 , bci/bci-init:15.3.11.45 , bci/bci-init:latest
Container Release     : 11.45
Severity              : moderate
Type                  : security
References            : 1121227 1121230 1122004 1122021 CVE-2018-20573 CVE-2018-20574
                        CVE-2019-6285 CVE-2019-6292 
-----------------------------------------------------------------

The container bci/bci-init was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1073-1
Released:    Fri Apr  1 11:45:01 2022
Summary:     Security update for yaml-cpp
Type:        security
Severity:    moderate
References:  1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).


The following package changes have been done:

- libyaml-cpp0_6-0.6.1-4.5.1 updated
- container:sles15-image-15.0.0-17.11.17 updated

SUSE: 2022:483-1 bci/bci-init Security Update

April 2, 2022
The container bci/bci-init was updated

Summary

Advisory ID: SUSE-SU-2022:1073-1 Released: Fri Apr 1 11:45:01 2022 Summary: Security update for yaml-cpp Type: security Severity: moderate

References

References : 1121227 1121230 1122004 1122021 CVE-2018-20573 CVE-2018-20574

CVE-2019-6285 CVE-2019-6292

1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292

This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).

- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).

- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).

- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).

The following package changes have been done:

- libyaml-cpp0_6-0.6.1-4.5.1 updated

- container:sles15-image-15.0.0-17.11.17 updated

Severity
Container Advisory ID : SUSE-CU-2022:483-1
Container Tags : bci/bci-init:15.3 , bci/bci-init:15.3.11.45 , bci/bci-init:latest
Container Release : 11.45
Severity : moderate
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.