SUSE: 2022:831-1 suse/sles/15.4/cdi-cloner Security Update | LinuxS...
SUSE Container Update Advisory: suse/sles/15.4/cdi-cloner
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:831-1
Container Tags        : suse/sles/15.4/cdi-cloner:1.43.0 , suse/sles/15.4/cdi-cloner:1.43.0-150400.1.25 , suse/sles/15.4/cdi-cloner:1.43.0.12.6
Container Release     : 12.6
Severity              : important
Type                  : security
References            : 1194883 1196093 1197024 1197459 1198062 CVE-2018-25032 CVE-2022-1271
-----------------------------------------------------------------

The container suse/sles/15.4/cdi-cloner was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1047-1
Released:    Wed Mar 30 16:20:56 2022
Summary:     Recommended update for pam
Type:        recommended
Severity:    moderate
References:  1196093,1197024
This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)
- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable. 
  This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1061-1
Released:    Wed Mar 30 18:27:06 2022
Summary:     Security update for zlib
Type:        security
Severity:    important
References:  1197459,CVE-2018-25032
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1099-1
Released:    Mon Apr  4 12:53:05 2022
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1194883
This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)
- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8
  multi byte characters as well as support the vi mode of readline library

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1158-1
Released:    Tue Apr 12 14:44:43 2022
Summary:     Security update for xz
Type:        security
Severity:    important
References:  1198062,CVE-2022-1271
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)


The following package changes have been done:

- libssh-config-0.9.6-150400.1.2 updated
- libzstd1-1.5.0-150400.1.58 updated
- libuuid1-2.37.2-150400.6.12 updated
- libsmartcols1-2.37.2-150400.6.12 updated
- libsepol1-3.1-150400.1.54 updated
- libeconf0-0.4.4+git20220104.962774f-150400.1.26 updated
- libcom_err2-1.46.4-150400.1.66 updated
- libbz2-1-1.0.8-150400.1.105 updated
- libblkid1-2.37.2-150400.6.12 updated
- libaudit1-3.0.6-150400.1.35 updated
- libgcrypt20-1.9.4-150400.4.1 updated
- libgcrypt20-hmac-1.9.4-150400.4.1 updated
- libfdisk1-2.37.2-150400.6.12 updated
- libz1-1.2.11-150000.3.30.1 updated
- liblzma5-5.2.3-150000.4.7.1 updated
- libopenssl1_1-1.1.1l-150400.4.7 updated
- libopenssl1_1-hmac-1.1.1l-150400.4.7 updated
- libelf1-0.185-150400.3.22 updated
- libselinux1-3.1-150400.1.54 updated
- libxml2-2-2.9.12-150400.3.1 updated
- libsystemd0-249.11-150400.5.4 updated
- libreadline7-7.0-150400.25.10 updated
- libdw1-0.185-150400.3.22 updated
- libsemanage1-3.1-150400.1.51 updated
- libmount1-2.37.2-150400.6.12 updated
- krb5-1.19.2-150400.1.6 updated
- bash-4.4-150400.25.10 updated
- bash-sh-4.4-150400.25.10 updated
- libssh4-0.9.6-150400.1.2 updated
- login_defs-4.8.1-150400.8.42 updated
- cpio-2.13-150400.1.84 updated
- sles-release-15.4-150400.51.3 updated
- rpm-config-SUSE-1-150400.12.25 updated
- permissions-20201225-150400.2.1 updated
- pam-1.3.0-150000.6.55.3 updated
- shadow-4.8.1-150400.8.42 updated
- sysuser-shadow-3.1-150400.1.19 updated
- system-group-hardware-20170617-150400.22.17 updated
- util-linux-2.37.2-150400.6.12 updated
- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated
- containerized-data-importer-cloner-1.43.0-150400.1.25 updated
- container:sles15-image-15.0.0-24.46 updated
- rpm-ndb-4.14.3-150400.41.6 removed

SUSE: 2022:831-1 suse/sles/15.4/cdi-cloner Security Update

April 29, 2022
The container suse/sles/15.4/cdi-cloner was updated

Summary

Advisory ID: SUSE-RU-2022:1047-1 Released: Wed Mar 30 16:20:56 2022 Summary: Recommended update for pam Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:1061-1 Released: Wed Mar 30 18:27:06 2022 Summary: Security update for zlib Type: security Severity: important Advisory ID: SUSE-RU-2022:1099-1 Released: Mon Apr 4 12:53:05 2022 Summary: Recommended update for aaa_base Type: recommended Severity: moderate Advisory ID: SUSE-SU-2022:1158-1 Released: Tue Apr 12 14:44:43 2022 Summary: Security update for xz Type: security Severity: important

References

References : 1194883 1196093 1197024 1197459 1198062 CVE-2018-25032 CVE-2022-1271

1196093,1197024

This update for pam fixes the following issues:

- Define _pam_vendordir as the variable is needed by systemd and others. (bsc#1196093)

- Between allocating the variable 'ai' and free'ing them, there are two 'return NO' were we don't free this variable.

This patch inserts freaddrinfo() calls before the 'return NO;'s. (bsc#1197024)

1197459,CVE-2018-25032

This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).

1194883

This update for aaa_base fixes the following issues:

- Set net.ipv4.ping_group_range to allow ICMP ping (bsc#1194883)

- Include all fixes and changes for systemwide inputrc to remove the 8 bit escape sequence which interfere with UTF-8

multi byte characters as well as support the vi mode of readline library

1198062,CVE-2022-1271

This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)

The following package changes have been done:

- libssh-config-0.9.6-150400.1.2 updated

- libzstd1-1.5.0-150400.1.58 updated

- libuuid1-2.37.2-150400.6.12 updated

- libsmartcols1-2.37.2-150400.6.12 updated

- libsepol1-3.1-150400.1.54 updated

- libeconf0-0.4.4+git20220104.962774f-150400.1.26 updated

- libcom_err2-1.46.4-150400.1.66 updated

- libbz2-1-1.0.8-150400.1.105 updated

- libblkid1-2.37.2-150400.6.12 updated

- libaudit1-3.0.6-150400.1.35 updated

- libgcrypt20-1.9.4-150400.4.1 updated

- libgcrypt20-hmac-1.9.4-150400.4.1 updated

- libfdisk1-2.37.2-150400.6.12 updated

- libz1-1.2.11-150000.3.30.1 updated

- liblzma5-5.2.3-150000.4.7.1 updated

- libopenssl1_1-1.1.1l-150400.4.7 updated

- libopenssl1_1-hmac-1.1.1l-150400.4.7 updated

- libelf1-0.185-150400.3.22 updated

- libselinux1-3.1-150400.1.54 updated

- libxml2-2-2.9.12-150400.3.1 updated

- libsystemd0-249.11-150400.5.4 updated

- libreadline7-7.0-150400.25.10 updated

- libdw1-0.185-150400.3.22 updated

- libsemanage1-3.1-150400.1.51 updated

- libmount1-2.37.2-150400.6.12 updated

- krb5-1.19.2-150400.1.6 updated

- bash-4.4-150400.25.10 updated

- bash-sh-4.4-150400.25.10 updated

- libssh4-0.9.6-150400.1.2 updated

- login_defs-4.8.1-150400.8.42 updated

- cpio-2.13-150400.1.84 updated

- sles-release-15.4-150400.51.3 updated

- rpm-config-SUSE-1-150400.12.25 updated

- permissions-20201225-150400.2.1 updated

- pam-1.3.0-150000.6.55.3 updated

- shadow-4.8.1-150400.8.42 updated

- sysuser-shadow-3.1-150400.1.19 updated

- system-group-hardware-20170617-150400.22.17 updated

- util-linux-2.37.2-150400.6.12 updated

- aaa_base-84.87+git20180409.04c9dae-3.57.1 updated

- containerized-data-importer-cloner-1.43.0-150400.1.25 updated

- container:sles15-image-15.0.0-24.46 updated

- rpm-ndb-4.14.3-150400.41.6 removed

Severity
Container Advisory ID : SUSE-CU-2022:831-1
Container Tags : suse/sles/15.4/cdi-cloner:1.43.0 , suse/sles/15.4/cdi-cloner:1.43.0-150400.1.25 , suse/sles/15.4/cdi-cloner:1.43.0.12.6
Container Release : 12.6
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.