SUSE: 2022:961-1 bci/bci-init Security Update | LinuxSecurity.com
SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2022:961-1
Container Tags        : bci/bci-init:15.3 , bci/bci-init:15.3.14.12 , bci/bci-init:latest
Container Release     : 14.12
Severity              : important
Type                  : security
References            : 1198062 1198090 1198114 1198922 CVE-2022-1271 
-----------------------------------------------------------------

The container bci/bci-init was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2022:1617-1
Released:    Tue May 10 14:40:12 2022
Summary:     Security update for gzip
Type:        security
Severity:    important
References:  1198062,1198922,CVE-2022-1271
This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:1626-1
Released:    Tue May 10 15:55:13 2022
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1198090,1198114
This update for systemd fixes the following issues:

- tmpfiles.d: only 'w+' can have multiple lines for the same path (bsc#1198090)
- journald: make sure journal_file_open() doesn't leave a corrupted file around after failing (bsc#1198114)
- tmpfiles: constify item_compatible() parameters
- test tmpfiles: add a test for 'w+'
- test: add test checking tmpfiles conf file precedence
- journald: make use of CLAMP() in cache_space_refresh()
- journal-file: port journal_file_open() to openat_report_new()
- fs-util: make sure openat_report_new() initializes return param also on shortcut
- fs-util: fix typos in comments
- fs-util: add openat_report_new() wrapper around openat()


The following package changes have been done:

- gzip-1.10-150200.10.1 updated
- libsystemd0-246.16-150300.7.45.1 updated
- libudev1-246.16-150300.7.45.1 updated
- systemd-246.16-150300.7.45.1 updated
- udev-246.16-150300.7.45.1 updated
- container:sles15-image-15.0.0-17.14.10 updated

SUSE: 2022:961-1 bci/bci-init Security Update

May 11, 2022
The container bci/bci-init was updated

Summary

Advisory ID: SUSE-SU-2022:1617-1 Released: Tue May 10 14:40:12 2022 Summary: Security update for gzip Type: security Severity: important Advisory ID: SUSE-RU-2022:1626-1 Released: Tue May 10 15:55:13 2022 Summary: Recommended update for systemd Type: recommended Severity: moderate

References

References : 1198062 1198090 1198114 1198922 CVE-2022-1271

1198062,1198922,CVE-2022-1271

This update for gzip fixes the following issues:

- CVE-2022-1271: Fix escaping of malicious filenames. (bsc#1198062)

1198090,1198114

This update for systemd fixes the following issues:

- tmpfiles.d: only 'w+' can have multiple lines for the same path (bsc#1198090)

- journald: make sure journal_file_open() doesn't leave a corrupted file around after failing (bsc#1198114)

- tmpfiles: constify item_compatible() parameters

- test tmpfiles: add a test for 'w+'

- test: add test checking tmpfiles conf file precedence

- journald: make use of CLAMP() in cache_space_refresh()

- journal-file: port journal_file_open() to openat_report_new()

- fs-util: make sure openat_report_new() initializes return param also on shortcut

- fs-util: fix typos in comments

- fs-util: add openat_report_new() wrapper around openat()

The following package changes have been done:

- gzip-1.10-150200.10.1 updated

- libsystemd0-246.16-150300.7.45.1 updated

- libudev1-246.16-150300.7.45.1 updated

- systemd-246.16-150300.7.45.1 updated

- udev-246.16-150300.7.45.1 updated

- container:sles15-image-15.0.0-17.14.10 updated

Severity
Container Advisory ID : SUSE-CU-2022:961-1
Container Tags : bci/bci-init:15.3 , bci/bci-init:15.3.14.12 , bci/bci-init:latest
Container Release : 14.12
Severity : important
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.