SUSE Container Update Advisory: suse/sles/15.4/virt-handler
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:591-1
Container Tags        : suse/sles/15.4/virt-handler:0.49.0 , suse/sles/15.4/virt-handler:0.49.0-150400.1.25 , suse/sles/15.4/virt-handler:0.49.0.13.2.310
Container Release     : 13.2.310
Severity              : important
Type                  : security
References            : 1179416 1180125 1181805 1183543 1183545 1183659 1185299 1187670
                        1188548 1190824 1193711 1194883 1194968 1196093 1197024 1197459
                        CVE-2018-25032 CVE-2021-20266 CVE-2021-20271 CVE-2021-3421 
-----------------------------------------------------------------

The container suse/sles/15.4/virt-handler was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:2682-1
Released:    Thu Aug 12 20:06:19 2021
Summary:     Security update for rpm
Type:        security
Severity:    important
References:  1179416,1181805,1183543,1183545,CVE-2021-20266,CVE-2021-20271,CVE-2021-3421
This update for rpm fixes the following issues:

- Changed default package verification level to 'none' to be compatible to rpm-4.14.1
- Made illegal obsoletes a warning
- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)
- Added support for enforcing signature policy and payload verification step to
  transactions (jsc#SLE-17817)
- Added :humansi and :hmaniec query formatters for human readable output
- Added query selectors for whatobsoletes and whatconflicts
- Added support for sorting caret higher than base version
- rpm does no longer require the signature header to be in a contiguous
  region when signing (bsc#1181805)

Security fixes:

- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an
  attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM
  repository, to cause RPM database corruption. The highest threat from this vulnerability is to
  data integrity (bsc#1183543)

- CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.
  This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,
  whose signature header was modified, to cause RPM database corruption and execute code. The highest
  threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

- CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker
  who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability
  is to system availability.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2021:3445-1
Released:    Fri Oct 15 09:03:39 2021
Summary:     Security update for rpm
Type:        security
Severity:    important
References:  1183659,1185299,1187670,1188548
This update for rpm fixes the following issues:

Security issues fixed:

- PGP hardening changes (bsc#1185299)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:96-1
Released:    Tue Jan 18 05:14:44 2022
Summary:     Recommended update for rpm
Type:        recommended
Severity:    important
References:  1180125,1190824,1193711
This update for rpm fixes the following issues:

- Fix header check so that old rpms no longer get rejected (bsc#1190824)
- Add explicit requirement on python-rpm-macros (bsc#1180125, bsc#1193711)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:520-1
Released:    Fri Feb 18 12:45:19 2022
Summary:     Recommended update for rpm
Type:        recommended
Severity:    moderate
References:  1194968
This update for rpm fixes the following issues:

- Revert unwanted /usr/bin/python to /usr/bin/python2 change we got with the update to 4.14.3 (bsc#1194968)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1047-1
Released:    Wed Mar 30 16:20:56 2022
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1196093,1197024
This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable. 
  This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1061-1
Released:    Wed Mar 30 18:27:06 2022
Summary:     Security update for zlib
Type:        security
Severity:    important
References:  1197459,CVE-2018-25032
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1099-1
Released:    Mon Apr  4 12:53:05 2022
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1194883
This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)
- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8
  multi byte characters as well as support the vi mode of readline library


The following package changes have been done:

- libssh-config-0.9.6-150400.1.2 updated
- libzstd1-1.5.0-150400.1.56 updated
- libuuid1-2.37.2-150400.6.10 updated
- libudev1-249.11-150400.4.5 updated
- libsmartcols1-2.37.2-150400.6.10 updated
- libsepol1-3.1-150400.1.52 updated
- libeconf0-0.4.4+git20220104.962774f-150400.1.24 updated
- libcom_err2-1.46.4-150400.1.64 updated
- libbz2-1-1.0.8-150400.1.101 updated
- libblkid1-2.37.2-150400.6.10 updated
- libaudit1-3.0.6-150400.1.33 updated
- libgcrypt20-1.9.4-150400.3.1 updated
- libgcrypt20-hmac-1.9.4-150400.3.1 updated
- libfdisk1-2.37.2-150400.6.10 updated
- libz1-1.2.11-150000.3.30.1 updated
- libopenssl1_1-1.1.1l-150400.4.5 updated
- libopenssl1_1-hmac-1.1.1l-150400.4.5 updated
- libelf1-0.185-150400.3.20 updated
- libselinux1-3.1-150400.1.52 updated
- libsystemd0-249.11-150400.4.5 updated
- libreadline7-7.0-150400.25.8 updated
- libdw1-0.185-150400.3.20 updated
- libsemanage1-3.1-150400.1.49 updated
- libmount1-2.37.2-150400.6.10 updated
- krb5-1.19.2-150400.1.6 updated
- bash-4.4-150400.25.8 updated
- bash-sh-4.4-150400.25.8 updated
- libssh4-0.9.6-150400.1.2 updated
- login_defs-4.8.1-150400.8.40 updated
- cpio-2.13-150400.1.82 updated
- sles-release-15.4-150400.49.5 updated
- rpm-config-SUSE-1-150400.12.23 updated
- permissions-20201225-150400.2.1 updated
- rpm-ndb-4.14.3-150300.46.1 updated
- pam-1.3.0-150000.6.55.3 updated
- shadow-4.8.1-150400.8.40 updated
- sysuser-shadow-3.1-150400.1.17 updated
- system-group-hardware-20170617-150400.22.15 updated
- util-linux-2.37.2-150400.6.10 updated
- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated
- kubevirt-container-disk-0.49.0-150400.1.25 updated
- kubevirt-virt-handler-0.49.0-150400.1.25 updated
- libdbus-1-3-1.12.2-150400.16.42 updated
- libdevmapper1_03-1.02.163-150400.15.52 updated
- libexpat1-2.4.4-150400.2.8 updated
- libnettle8-3.7.3-150400.2.15 updated
- system-group-kvm-20170617-150400.22.15 updated
- libcryptsetup12-2.4.3-150400.1.69 updated
- libcryptsetup12-hmac-2.4.3-150400.1.69 updated
- libhogweed6-3.7.3-150400.2.15 updated
- system-user-qemu-20170617-150400.22.15 updated
- dbus-1-1.12.2-150400.16.42 updated
- libgnutls30-3.7.3-150400.2.5 updated
- libgnutls30-hmac-3.7.3-150400.2.5 updated
- systemd-249.11-150400.4.5 updated
- gnutls-3.7.3-150400.2.5 updated
- qemu-tools-6.2.0-150400.34.8 updated
- libvirt-libs-8.0.0-150400.5.1 updated
- libvirt-client-8.0.0-150400.5.1 updated
- container:sles15-image-15.0.0-25.2.50 updated

SUSE: 2022:591-1 suse/sles/15.4/virt-handler Security Update

April 13, 2022
The container suse/sles/15.4/virt-handler was updated

Summary

Advisory ID: SUSE-SU-2021:2682-1 Released: Thu Aug 12 20:06:19 2021 Summary: Security update for rpm Type: security Severity: important Advisory ID: SUSE-SU-2021:3445-1 Released: Fri Oct 15 09:03:39 2021 Summary: Security update for rpm Type: security Severity: important Advisory ID: SUSE-RU-2022:96-1 Released: Tue Jan 18 05:14:44 2022 Summary: Recommended update for rpm Type: recommended Severity: important Advisory ID: SUSE-RU-2022:520-1 Released: Fri Feb 18 12:45:19 2022 Summary: Recommended update for rpm Type: recommended Severity: moderate Advisory ID: SUSE-RU-2022:1047-1 Released: Wed Mar 30 16:20:56 2022 Summary: Recommended update for pam Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:1061-1 Released: Wed Mar 30 18:27:06 2022 Summary: Security update for zlib Type: security Severity: important Advisory ID: SUSE-RU-2022:1099-1 Released: Mon Apr 4 12:53:05 2022 Summary: Recommended update for aaa_base Type: recommended Severity: moderate

References

References : 1179416 1180125 1181805 1183543 1183545 1183659 1185299 1187670

1188548 1190824 1193711 1194883 1194968 1196093 1197024 1197459

CVE-2018-25032 CVE-2021-20266 CVE-2021-20271 CVE-2021-3421

1179416,1181805,1183543,1183545,CVE-2021-20266,CVE-2021-20271,CVE-2021-3421

This update for rpm fixes the following issues:

- Changed default package verification level to 'none' to be compatible to rpm-4.14.1

- Made illegal obsoletes a warning

- Fixed a potential access of freed mem in ndb's glue code (bsc#1179416)

- Added support for enforcing signature policy and payload verification step to

transactions (jsc#SLE-17817)

- Added :humansi and :hmaniec query formatters for human readable output

- Added query selectors for whatobsoletes and whatconflicts

- Added support for sorting caret higher than base version

- rpm does no longer require the signature header to be in a contiguous

region when signing (bsc#1181805)

Security fixes:

- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an

attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM

repository, to cause RPM database corruption. The highest threat from this vulnerability is to

data integrity (bsc#1183543)

- CVE-2021-20271: A flaw was found in RPM's signature check functionality when reading a package file.

This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,

whose signature header was modified, to cause RPM database corruption and execute code. The highest

threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)

- CVE-2021-20266: A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker

who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability

is to system availability.

1183659,1185299,1187670,1188548

This update for rpm fixes the following issues:

Security issues fixed:

- PGP hardening changes (bsc#1185299)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)

- Added ndb rofs support (bsc#1188548)

- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)

1180125,1190824,1193711

This update for rpm fixes the following issues:

- Fix header check so that old rpms no longer get rejected (bsc#1190824)

- Add explicit requirement on python-rpm-macros (bsc#1180125, bsc#1193711)

1194968

This update for rpm fixes the following issues:

- Revert unwanted /usr/bin/python to /usr/bin/python2 change we got with the update to 4.14.3 (bsc#1194968)

1196093,1197024

This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)

- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.

This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

1197459,CVE-2018-25032

This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

1194883

This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)

- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8

multi byte characters as well as support the vi mode of readline library

The following package changes have been done:

- libssh-config-0.9.6-150400.1.2 updated

- libzstd1-1.5.0-150400.1.56 updated

- libuuid1-2.37.2-150400.6.10 updated

- libudev1-249.11-150400.4.5 updated

- libsmartcols1-2.37.2-150400.6.10 updated

- libsepol1-3.1-150400.1.52 updated

- libeconf0-0.4.4+git20220104.962774f-150400.1.24 updated

- libcom_err2-1.46.4-150400.1.64 updated

- libbz2-1-1.0.8-150400.1.101 updated

- libblkid1-2.37.2-150400.6.10 updated

- libaudit1-3.0.6-150400.1.33 updated

- libgcrypt20-1.9.4-150400.3.1 updated

- libgcrypt20-hmac-1.9.4-150400.3.1 updated

- libfdisk1-2.37.2-150400.6.10 updated

- libz1-1.2.11-150000.3.30.1 updated

- libopenssl1_1-1.1.1l-150400.4.5 updated

- libopenssl1_1-hmac-1.1.1l-150400.4.5 updated

- libelf1-0.185-150400.3.20 updated

- libselinux1-3.1-150400.1.52 updated

- libsystemd0-249.11-150400.4.5 updated

- libreadline7-7.0-150400.25.8 updated

- libdw1-0.185-150400.3.20 updated

- libsemanage1-3.1-150400.1.49 updated

- libmount1-2.37.2-150400.6.10 updated

- krb5-1.19.2-150400.1.6 updated

- bash-4.4-150400.25.8 updated

- bash-sh-4.4-150400.25.8 updated

- libssh4-0.9.6-150400.1.2 updated

- login_defs-4.8.1-150400.8.40 updated

- cpio-2.13-150400.1.82 updated

- sles-release-15.4-150400.49.5 updated

- rpm-config-SUSE-1-150400.12.23 updated

- permissions-20201225-150400.2.1 updated

- rpm-ndb-4.14.3-150300.46.1 updated

- pam-1.3.0-150000.6.55.3 updated

- shadow-4.8.1-150400.8.40 updated

- sysuser-shadow-3.1-150400.1.17 updated

- system-group-hardware-20170617-150400.22.15 updated

- util-linux-2.37.2-150400.6.10 updated

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated

- kubevirt-container-disk-0.49.0-150400.1.25 updated

- kubevirt-virt-handler-0.49.0-150400.1.25 updated

- libdbus-1-3-1.12.2-150400.16.42 updated

- libdevmapper1_03-1.02.163-150400.15.52 updated

- libexpat1-2.4.4-150400.2.8 updated

- libnettle8-3.7.3-150400.2.15 updated

- system-group-kvm-20170617-150400.22.15 updated

- libcryptsetup12-2.4.3-150400.1.69 updated

- libcryptsetup12-hmac-2.4.3-150400.1.69 updated

- libhogweed6-3.7.3-150400.2.15 updated

- system-user-qemu-20170617-150400.22.15 updated

- dbus-1-1.12.2-150400.16.42 updated

- libgnutls30-3.7.3-150400.2.5 updated

- libgnutls30-hmac-3.7.3-150400.2.5 updated

- systemd-249.11-150400.4.5 updated

- gnutls-3.7.3-150400.2.5 updated

- qemu-tools-6.2.0-150400.34.8 updated

- libvirt-libs-8.0.0-150400.5.1 updated

- libvirt-client-8.0.0-150400.5.1 updated

- container:sles15-image-15.0.0-25.2.50 updated

Severity
Container Advisory ID : SUSE-CU-2022:591-1
Container Tags : suse/sles/15.4/virt-handler:0.49.0 , suse/sles/15.4/virt-handler:0.49.0-150400.1.25 , suse/sles/15.4/virt-handler:0.49.0.13.2.310
Container Release : 13.2.310
Severity : important
Type : security

Related News