SUSE Container Update Advisory: bci/python
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:3203-1
Container Tags        : bci/python:3 , bci/python:3-15.57 , bci/python:3.10 , bci/python:3.10-15.57
Container Release     : 15.57
Severity              : important
Type                  : security
References            : 1211829 1212819 1212910 1213463 1214692 1215026 CVE-2023-38039
                        CVE-2023-40217 
-----------------------------------------------------------------

The container bci/python was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3814-1
Released:    Wed Sep 27 18:08:17 2023
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1211829,1212819,1212910
This update for glibc fixes the following issues:

- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)
- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)
- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)
- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)
- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)
- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3823-1
Released:    Wed Sep 27 18:42:38 2023
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1215026,CVE-2023-38039
This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3824-1
Released:    Wed Sep 27 18:43:51 2023
Summary:     Security update for python310
Type:        security
Severity:    important
References:  1213463,1214692,CVE-2023-40217
This update for python310 fixes the following issues:

- Update to 3.10.13.

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692)

The following non-security bug was fixed:

- stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).


The following package changes have been done:

- glibc-2.31-150300.58.1 updated
- libcurl4-8.0.1-150400.5.29.1 updated
- curl-8.0.1-150400.5.29.1 updated
- libpython3_10-1_0-3.10.13-150400.4.33.1 updated
- python310-base-3.10.13-150400.4.33.1 updated
- python310-3.10.13-150400.4.33.1 updated
- python310-devel-3.10.13-150400.4.33.1 updated

SUSE: 2023:3203-1 bci/python Security Update

September 29, 2023
The container bci/python was updated

Summary

Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:3823-1 Released: Wed Sep 27 18:42:38 2023 Summary: Security update for curl Type: security Severity: important Advisory ID: SUSE-SU-2023:3824-1 Released: Wed Sep 27 18:43:51 2023 Summary: Security update for python310 Type: security Severity: important

References

References : 1211829 1212819 1212910 1213463 1214692 1215026 CVE-2023-38039

CVE-2023-40217

1211829,1212819,1212910

This update for glibc fixes the following issues:

- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)

- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)

- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)

- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)

- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)

- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)

1215026,CVE-2023-38039

This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)

1213463,1214692,CVE-2023-40217

This update for python310 fixes the following issues:

- Update to 3.10.13.

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692)

The following non-security bug was fixed:

- stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).

The following package changes have been done:

- glibc-2.31-150300.58.1 updated

- libcurl4-8.0.1-150400.5.29.1 updated

- curl-8.0.1-150400.5.29.1 updated

- libpython3_10-1_0-3.10.13-150400.4.33.1 updated

- python310-base-3.10.13-150400.4.33.1 updated

- python310-3.10.13-150400.4.33.1 updated

- python310-devel-3.10.13-150400.4.33.1 updated

Severity
Container Advisory ID : SUSE-CU-2023:3203-1
Container Tags : bci/python:3 , bci/python:3-15.57 , bci/python:3.10 , bci/python:3.10-15.57
Container Release : 15.57
Severity : important
Type : security

Related News