SUSE: 2022:515-1 suse/sle15 Security Update | LinuxSecurity.com
SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:515-1
Container Tags        : suse/sle15:15.1 , suse/sle15:15.1.6.2.597
Container Release     : 6.2.597
Severity              : important
Type                  : security
References            : 1121227 1121230 1122004 1122021 1172427 1194642 1194883 CVE-2018-20573
                        CVE-2018-20574 CVE-2019-6285 CVE-2019-6292 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1073-1
Released:    Fri Apr  1 11:45:01 2022
Summary:     Security update for yaml-cpp
Type:        security
Severity:    moderate
References:  1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292
This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1099-1
Released:    Mon Apr  4 12:53:05 2022
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1194883
This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)
- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8
  multi byte characters as well as support the vi mode of readline library

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1109-1
Released:    Mon Apr  4 17:50:01 2022
Summary:     Recommended update for util-linux
Type:        recommended
Severity:    important
References:  1172427,1194642
This update for util-linux fixes the following issues:

- Improve throughput and reduce clock sequence increments for high load situation with time based 
  version 1 uuids. (bsc#1194642)
- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)
- Warn if uuidd lock state is not usable. (bsc#1194642)
- Fix 'su -s' bash completion. (bsc#1172427)


The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated
- libblkid1-2.33.2-150100.4.21.1 updated
- libfdisk1-2.33.2-150100.4.21.1 updated
- libmount1-2.33.2-150100.4.21.1 updated
- libsmartcols1-2.33.2-150100.4.21.1 updated
- libuuid1-2.33.2-150100.4.21.1 updated
- libyaml-cpp0_6-0.6.1-4.5.1 updated
- util-linux-2.33.2-150100.4.21.1 updated

SUSE: 2022:515-1 suse/sle15 Security Update

April 5, 2022
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-SU-2022:1073-1 Released: Fri Apr 1 11:45:01 2022 Summary: Security update for yaml-cpp Type: security Severity: moderate Advisory ID: SUSE-RU-2022:1099-1 Released: Mon Apr 4 12:53:05 2022 Summary: Recommended update for aaa_base Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:1109-1 Released: Mon Apr 4 17:50:01 2022 Summary: Recommended update for util-linux Type: recommended Severity: important

References

References : 1121227 1121230 1122004 1122021 1172427 1194642 1194883 CVE-2018-20573

CVE-2018-20574 CVE-2019-6285 CVE-2019-6292

1121227,1121230,1122004,1122021,CVE-2018-20573,CVE-2018-20574,CVE-2019-6285,CVE-2019-6292

This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).

- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).

- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).

- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).

1194883

This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)

- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8

multi byte characters as well as support the vi mode of readline library

1172427,1194642

This update for util-linux fixes the following issues:

- Improve throughput and reduce clock sequence increments for high load situation with time based

version 1 uuids. (bsc#1194642)

- Prevent root owning of `/var/lib/libuuid/clock.txt`. (bsc#1194642)

- Warn if uuidd lock state is not usable. (bsc#1194642)

- Fix 'su -s' bash completion. (bsc#1172427)

The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated

- libblkid1-2.33.2-150100.4.21.1 updated

- libfdisk1-2.33.2-150100.4.21.1 updated

- libmount1-2.33.2-150100.4.21.1 updated

- libsmartcols1-2.33.2-150100.4.21.1 updated

- libuuid1-2.33.2-150100.4.21.1 updated

- libyaml-cpp0_6-0.6.1-4.5.1 updated

- util-linux-2.33.2-150100.4.21.1 updated

Severity
Container Advisory ID : SUSE-CU-2022:515-1
Container Tags : suse/sle15:15.1 , suse/sle15:15.1.6.2.597
Container Release : 6.2.597
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.