SUSE Container Update Advisory: suse/sle15
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:328-1
Container Tags        : bci/bci-base:15.4 , bci/bci-base:15.4.27.14.34 , suse/sle15:15.4 , suse/sle15:15.4.27.14.34
Container Release     : 27.14.34
Severity              : important
Type                  : security
References            : 1203652 1204944 1205000 1207264 1207533 1207534 1207536 1207538
                        CVE-2022-4304 CVE-2022-4415 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286
-----------------------------------------------------------------

The container suse/sle15 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:188-1
Released:    Fri Jan 27 12:07:19 2023
Summary:     Recommended update for zlib
Type:        recommended
Severity:    important
References:  1203652
This update for zlib fixes the following issues:

- Follow up fix for bug bsc#1203652 due to libxml2 issues

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:201-1
Released:    Fri Jan 27 15:24:15 2023
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1204944,1205000,1207264,CVE-2022-4415
This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed an issue where users could access coredumps
  with changed uid, gid or capabilities (bsc#1205000).

Non-security fixes:

- Enabled the pstore service (jsc#PED-2663).
- Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944).
- Fixed an issue where a pamd file could get accidentally overwritten
  after an update (bsc#1207264).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:311-1
Released:    Tue Feb  7 17:36:32 2023
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1207533,1207534,1207536,1207538,CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0286
This update for openssl-1_1 fixes the following issues:

- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).
- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).
- CVE-2022-4450: Fixed double free after calling PEM_read_bio_ex() (bsc#1207538).
- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).


The following package changes have been done:

- libopenssl1_1-hmac-1.1.1l-150400.7.22.1 updated
- libopenssl1_1-1.1.1l-150400.7.22.1 updated
- libsystemd0-249.14-150400.8.19.1 updated
- libudev1-249.14-150400.8.19.1 updated
- libz1-1.2.11-150000.3.39.1 updated
- openssl-1_1-1.1.1l-150400.7.22.1 updated

SUSE: 2023:328-1 suse/sle15 Security Update

February 9, 2023
The container suse/sle15 was updated

Summary

Advisory ID: SUSE-RU-2023:188-1 Released: Fri Jan 27 12:07:19 2023 Summary: Recommended update for zlib Type: recommended Severity: important Advisory ID: SUSE-SU-2023:201-1 Released: Fri Jan 27 15:24:15 2023 Summary: Security update for systemd Type: security Severity: moderate Advisory ID: SUSE-SU-2023:311-1 Released: Tue Feb 7 17:36:32 2023 Summary: Security update for openssl-1_1 Type: security Severity: important

References

References : 1203652 1204944 1205000 1207264 1207533 1207534 1207536 1207538

CVE-2022-4304 CVE-2022-4415 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286

1203652

This update for zlib fixes the following issues:

- Follow up fix for bug bsc#1203652 due to libxml2 issues

1204944,1205000,1207264,CVE-2022-4415

This update for systemd fixes the following issues:

- CVE-2022-4415: Fixed an issue where users could access coredumps

with changed uid, gid or capabilities (bsc#1205000).

Non-security fixes:

- Enabled the pstore service (jsc#PED-2663).

- Fixed an issue accessing TPM when secure boot is enabled (bsc#1204944).

- Fixed an issue where a pamd file could get accidentally overwritten

after an update (bsc#1207264).

1207533,1207534,1207536,1207538,CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0286

This update for openssl-1_1 fixes the following issues:

- CVE-2023-0286: Fixed X.400 address type confusion in X.509 GENERAL_NAME_cmp for x400Address (bsc#1207533).

- CVE-2023-0215: Fixed use-after-free following BIO_new_NDEF() (bsc#1207536).

- CVE-2022-4450: Fixed double free after calling PEM_read_bio_ex() (bsc#1207538).

- CVE-2022-4304: Fixed timing Oracle in RSA Decryption (bsc#1207534).

The following package changes have been done:

- libopenssl1_1-hmac-1.1.1l-150400.7.22.1 updated

- libopenssl1_1-1.1.1l-150400.7.22.1 updated

- libsystemd0-249.14-150400.8.19.1 updated

- libudev1-249.14-150400.8.19.1 updated

- libz1-1.2.11-150000.3.39.1 updated

- openssl-1_1-1.1.1l-150400.7.22.1 updated

Severity
Container Advisory ID : SUSE-CU-2023:328-1
Container Tags : bci/bci-base:15.4 , bci/bci-base:15.4.27.14.34 , suse/sle15:15.4 , suse/sle15:15.4.27.14.34
Container Release : 27.14.34
Severity : important
Type : security

Related News