SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:535-1
Container Tags        : bci/bci-base:15.4 , bci/bci-base:15.4.25.2.41 , suse/sle15:15.4 , suse/sle15:15.4.25.2.41
Container Release     : 25.2.41
Severity              : important
Type                  : security
References            : 1194883 1195258 1196093 1196275 1196406 1197024 1197459 CVE-2018-25032
                        CVE-2021-22570 
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:936-1
Released:    Tue Mar 22 18:10:17 2022
Summary:     Recommended update for filesystem and systemd-rpm-macros
Type:        recommended
Severity:    moderate
References:  1196275,1196406
This update for filesystem and systemd-rpm-macros fixes the following issues:

filesystem:

- Add path /lib/modprobe.d (bsc#1196275, jsc#SLE-20639)

systemd-rpm-macros:

- Make %_modprobedir point to /lib/modprobe.d (bsc#1196275, bsc#1196406)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1040-1
Released:    Wed Mar 30 09:40:58 2022
Summary:     Security update for protobuf
Type:        security
Severity:    moderate
References:  1195258,CVE-2021-22570
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1047-1
Released:    Wed Mar 30 16:20:56 2022
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1196093,1197024
This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable. 
  This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1061-1
Released:    Wed Mar 30 18:27:06 2022
Summary:     Security update for zlib
Type:        security
Severity:    important
References:  1197459,CVE-2018-25032
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1099-1
Released:    Mon Apr  4 12:53:05 2022
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1194883
This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)
- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8
  multi byte characters as well as support the vi mode of readline library


The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated
- bash-sh-4.4-150400.25.8 updated
- bash-4.4-150400.25.8 updated
- cpio-2.13-150400.1.82 updated
- filesystem-15.0-11.8.1 updated
- krb5-1.19.2-150400.1.6 updated
- libaudit1-3.0.6-150400.1.33 updated
- libblkid1-2.37.2-150400.6.10 updated
- libbz2-1-1.0.8-150400.1.101 updated
- libcom_err2-1.46.4-150400.1.64 updated
- libdw1-0.185-150400.3.20 updated
- libeconf0-0.4.4+git20220104.962774f-150400.1.24 updated
- libelf1-0.185-150400.3.20 updated
- libfdisk1-2.37.2-150400.6.10 updated
- libgcrypt20-hmac-1.9.4-150400.2.25 updated
- libgcrypt20-1.9.4-150400.2.25 updated
- libgpgme11-1.16.0-150400.1.69 updated
- libmount1-2.37.2-150400.6.10 updated
- libopenssl1_1-hmac-1.1.1l-150400.4.5 updated
- libopenssl1_1-1.1.1l-150400.4.5 updated
- libprotobuf-lite20-3.9.2-4.12.1 updated
- libreadline7-7.0-150400.25.8 updated
- libselinux1-3.1-150400.1.52 updated
- libsemanage1-3.1-150400.1.49 updated
- libsepol1-3.1-150400.1.52 updated
- libsmartcols1-2.37.2-150400.6.10 updated
- libssh-config-0.9.6-150400.1.2 updated
- libssh4-0.9.6-150400.1.2 updated
- libsystemd0-249.11-150400.3.2 updated
- libudev1-249.11-150400.3.2 updated
- libuuid1-2.37.2-150400.6.10 updated
- libz1-1.2.11-150000.3.30.1 updated
- libzstd1-1.5.0-150400.1.56 updated
- login_defs-4.8.1-150400.8.40 updated
- openssl-1_1-1.1.1l-150400.4.5 updated
- pam-1.3.0-150000.6.55.3 updated
- permissions-20201225-150400.2.1 updated
- rpm-config-SUSE-1-150400.12.23 updated
- shadow-4.8.1-150400.8.40 updated
- sles-release-15.4-150400.48.5 updated
- system-group-hardware-20170617-150400.22.15 updated
- sysuser-shadow-3.1-150400.1.17 updated
- util-linux-2.37.2-150400.6.10 updated

SUSE: 2022:535-1 suse/sle15 Security Update

April 6, 2022
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-RU-2022:936-1 Released: Tue Mar 22 18:10:17 2022 Summary: Recommended update for filesystem and systemd-rpm-macros Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:1040-1 Released: Wed Mar 30 09:40:58 2022 Summary: Security update for protobuf Type: security Severity: moderate Advisory ID: SUSE-RU-2022:1047-1 Released: Wed Mar 30 16:20:56 2022 Summary: Recommended update for pam Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:1061-1 Released: Wed Mar 30 18:27:06 2022 Summary: Security update for zlib Type: security Severity: important Advisory ID: SUSE-RU-2022:1099-1 Released: Mon Apr 4 12:53:05 2022 Summary: Recommended update for aaa_base Type: recommended Severity: moderate

References

References : 1194883 1195258 1196093 1196275 1196406 1197024 1197459 CVE-2018-25032

CVE-2021-22570

1196275,1196406

This update for filesystem and systemd-rpm-macros fixes the following issues:

filesystem:

- Add path /lib/modprobe.d (bsc#1196275, jsc#SLE-20639)

systemd-rpm-macros:

- Make %_modprobedir point to /lib/modprobe.d (bsc#1196275, bsc#1196406)

1195258,CVE-2021-22570

This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).

1196093,1197024

This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)

- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.

This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

1197459,CVE-2018-25032

This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

1194883

This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)

- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8

multi byte characters as well as support the vi mode of readline library

The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated

- bash-sh-4.4-150400.25.8 updated

- bash-4.4-150400.25.8 updated

- cpio-2.13-150400.1.82 updated

- filesystem-15.0-11.8.1 updated

- krb5-1.19.2-150400.1.6 updated

- libaudit1-3.0.6-150400.1.33 updated

- libblkid1-2.37.2-150400.6.10 updated

- libbz2-1-1.0.8-150400.1.101 updated

- libcom_err2-1.46.4-150400.1.64 updated

- libdw1-0.185-150400.3.20 updated

- libeconf0-0.4.4+git20220104.962774f-150400.1.24 updated

- libelf1-0.185-150400.3.20 updated

- libfdisk1-2.37.2-150400.6.10 updated

- libgcrypt20-hmac-1.9.4-150400.2.25 updated

- libgcrypt20-1.9.4-150400.2.25 updated

- libgpgme11-1.16.0-150400.1.69 updated

- libmount1-2.37.2-150400.6.10 updated

- libopenssl1_1-hmac-1.1.1l-150400.4.5 updated

- libopenssl1_1-1.1.1l-150400.4.5 updated

- libprotobuf-lite20-3.9.2-4.12.1 updated

- libreadline7-7.0-150400.25.8 updated

- libselinux1-3.1-150400.1.52 updated

- libsemanage1-3.1-150400.1.49 updated

- libsepol1-3.1-150400.1.52 updated

- libsmartcols1-2.37.2-150400.6.10 updated

- libssh-config-0.9.6-150400.1.2 updated

- libssh4-0.9.6-150400.1.2 updated

- libsystemd0-249.11-150400.3.2 updated

- libudev1-249.11-150400.3.2 updated

- libuuid1-2.37.2-150400.6.10 updated

- libz1-1.2.11-150000.3.30.1 updated

- libzstd1-1.5.0-150400.1.56 updated

- login_defs-4.8.1-150400.8.40 updated

- openssl-1_1-1.1.1l-150400.4.5 updated

- pam-1.3.0-150000.6.55.3 updated

- permissions-20201225-150400.2.1 updated

- rpm-config-SUSE-1-150400.12.23 updated

- shadow-4.8.1-150400.8.40 updated

- sles-release-15.4-150400.48.5 updated

- system-group-hardware-20170617-150400.22.15 updated

- sysuser-shadow-3.1-150400.1.17 updated

- util-linux-2.37.2-150400.6.10 updated

Severity
Container Advisory ID : SUSE-CU-2022:535-1
Container Tags : bci/bci-base:15.4 , bci/bci-base:15.4.25.2.41 , suse/sle15:15.4 , suse/sle15:15.4.25.2.41
Container Release : 25.2.41
Severity : important
Type : security

Related News