SUSE Container Update Advisory: suse/manager/4.3/proxy-httpd
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:3678-1
Container Tags        : suse/manager/4.3/proxy-httpd:4.3.8 , suse/manager/4.3/proxy-httpd:4.3.8.9.37.28 , suse/manager/4.3/proxy-httpd:latest , suse/manager/4.3/proxy-httpd:susemanager-4.3.8 , suse/manager/4.3/proxy-httpd:susemanager-4.3.8.9.37.28
Container Release     : 9.37.28
Severity              : important
Type                  : security
References            : 1107342 1206480 1206684 1210253 1210557 1211078 1211427 1211829
                        1212101 1212819 1212910 1213854 1213915 1214052 1214292 1214395
                        1214460 1214806 1215007 1215026 1215215 1215286 1215313 1215434
                        1215713 1215820 1215857 1215888 1215889 1215891 1216123 1216174
                        1216268 1216378 CVE-2023-22652 CVE-2023-30078 CVE-2023-30079
                        CVE-2023-32181 CVE-2023-35945 CVE-2023-38039 CVE-2023-38545 CVE-2023-38546
                        CVE-2023-4039 CVE-2023-44487 CVE-2023-45853 CVE-2023-46228 CVE-2023-4641
                        CVE-2023-4813 
-----------------------------------------------------------------

The container suse/manager/4.3/proxy-httpd was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3814-1
Released:    Wed Sep 27 18:08:17 2023
Summary:     Recommended update for glibc
Type:        recommended
Severity:    moderate
References:  1211829,1212819,1212910
This update for glibc fixes the following issues:

- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)
- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)
- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)
- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)
- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)
- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3823-1
Released:    Wed Sep 27 18:42:38 2023
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1215026,CVE-2023-38039
This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3954-1
Released:    Tue Oct  3 20:09:47 2023
Summary:     Security update for libeconf
Type:        security
Severity:    important
References:  1211078,CVE-2023-22652,CVE-2023-30078,CVE-2023-30079,CVE-2023-32181
This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).
- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3973-1
Released:    Thu Oct  5 10:14:49 2023
Summary:     Recommended update for zypper
Type:        recommended
Severity:    moderate
References:  1213854,1214292,1214395,1215007
This update for zypper fixes the following issues:

- Fix name of the bash completion script (bsc#1215007)
- Update notes about failing signature checks (bsc#1214395)
- Improve the SIGINT handler to be signal safe (bsc#1214292)
- Update to version 1.14.64
- Changed location of bash completion script (bsc#1213854).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3977-1
Released:    Thu Oct  5 11:43:46 2023
Summary:     Maintenance update for SUSE Manager 4.3.8 Release Notes
Type:        recommended
Severity:    important
References:  1210253,1215820,1215857
Maintenance update for SUSE Manager 4.3.8 Release Notes:

This is a codestream only update
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:3997-1
Released:    Fri Oct  6 14:13:56 2023
Summary:     Security update for nghttp2
Type:        security
Severity:    important
References:  1215713,CVE-2023-35945
This update for nghttp2 fixes the following issues:

- CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4024-1
Released:    Tue Oct 10 13:24:40 2023
Summary:     Security update for shadow
Type:        security
Severity:    low
References:  1214806,CVE-2023-4641
This update for shadow fixes the following issues:

- CVE-2023-4641: Fixed potential password leak (bsc#1214806).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4044-1
Released:    Wed Oct 11 09:01:14 2023
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1215888,1215889,CVE-2023-38545,CVE-2023-38546
This update for curl fixes the following issues:

- CVE-2023-38545: Fixed a heap buffer overflow in SOCKS5. (bsc#1215888)
- CVE-2023-38546: Fixed a cookie injection with none file. (bsc#1215889)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4073-1
Released:    Fri Oct 13 11:40:26 2023
Summary:     Recommended update for rpm
Type:        recommended
Severity:    low
References:  
This update for rpm fixes the following issue:

- Enables build for all python modules (jsc#PED-68, jsc#PED-1988)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4110-1
Released:    Wed Oct 18 12:35:26 2023
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1215286,1215891,CVE-2023-4813
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)

Also a regression from a previous update was fixed:

- elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4122-1
Released:    Thu Oct 19 08:24:34 2023
Summary:     Recommended update for openssl-1_1
Type:        recommended
Severity:    moderate
References:  1215215
This update for openssl-1_1 fixes the following issues:

- Displays 'fips' in the version string (bsc#1215215)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4153-1
Released:    Fri Oct 20 19:27:58 2023
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  1215313
This update for systemd fixes the following issues:

- Fix mismatch of nss-resolve version in Package Hub (no source code changes)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:4154-1
Released:    Fri Oct 20 19:33:25 2023
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1107342,1215434
This update for aaa_base fixes the following issues:

- Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4162-1
Released:    Mon Oct 23 15:33:03 2023
Summary:     Security update for gcc13
Type:        security
Severity:    important
References:  1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.

-----------------------------------------------------------------
Advisory ID: SUSE-feature-2023:4194-1
Released:    Wed Oct 25 11:01:41 2023
Summary:     Feature update for python3
Type:        feature
Severity:    low
References:  
This feature update for python3 packages adds the following:

- First batch of python3.11 modules (jsc#PED-68)
- Rename sources of python3-kubernetes, python3-cryptography and python3-cryptography-vectors to accommodate
the new 3.11 versions, this 3 packages have no code changes.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4200-1
Released:    Wed Oct 25 12:04:29 2023
Summary:     Security update for nghttp2
Type:        security
Severity:    important
References:  1216123,1216174,CVE-2023-44487
This update for nghttp2 fixes the following issues:

- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4217-1
Released:    Thu Oct 26 12:20:27 2023
Summary:     Security update for zlib
Type:        security
Severity:    moderate
References:  1216378,CVE-2023-45853
This update for zlib fixes the following issues:

- CVE-2023-45853: Fixed an integer overflow that would lead to a
  buffer overflow in the minizip subcomponent (bsc#1216378).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:4225-1
Released:    Fri Oct 27 11:02:14 2023
Summary:     Security update for zchunk
Type:        security
Severity:    important
References:  1216268,CVE-2023-46228
This update for zchunk fixes the following issues:

- CVE-2023-46228: Fixed a handle overflow errors in malformed zchunk files. (bsc#1216268)


The following package changes have been done:

- glibc-2.31-150300.63.1 updated
- libnghttp2-14-1.40.0-150200.12.1 updated
- libudev1-249.16-150400.8.35.5 updated
- libeconf0-0.5.2-150400.3.6.1 updated
- libz1-1.2.11-150000.3.48.1 updated
- libgcc_s1-13.2.1+git7813-150000.1.3.3 updated
- libstdc++6-13.2.1+git7813-150000.1.3.3 updated
- libsystemd0-249.16-150400.8.35.5 updated
- libopenssl1_1-1.1.1l-150400.7.57.1 updated
- libopenssl1_1-hmac-1.1.1l-150400.7.57.1 updated
- libzck1-1.1.16-150400.3.7.1 updated
- login_defs-4.8.1-150400.10.12.1 updated
- libcurl4-8.0.1-150400.5.32.1 updated
- shadow-4.8.1-150400.10.12.1 updated
- zypper-1.14.64-150400.3.32.1 updated
- aaa_base-84.87+git20180409.04c9dae-150300.10.6.2 updated
- curl-8.0.1-150400.5.32.1 updated
- release-notes-susemanager-proxy-4.3.8.2-150400.3.64.3 updated
- systemd-249.16-150400.8.35.5 updated
- python3-rpm-4.14.3-150400.59.3.1 updated
- python3-cryptography-3.3.2-150400.20.3 updated

SUSE: 2023:3678-1 suse/manager/4.3/proxy-httpd Security Update

November 2, 2023
The container suse/manager/4.3/proxy-httpd was updated

Summary

Advisory ID: SUSE-RU-2023:3814-1 Released: Wed Sep 27 18:08:17 2023 Summary: Recommended update for glibc Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:3823-1 Released: Wed Sep 27 18:42:38 2023 Summary: Security update for curl Type: security Severity: important Advisory ID: SUSE-SU-2023:3954-1 Released: Tue Oct 3 20:09:47 2023 Summary: Security update for libeconf Type: security Severity: important Advisory ID: SUSE-RU-2023:3973-1 Released: Thu Oct 5 10:14:49 2023 Summary: Recommended update for zypper Type: recommended Severity: moderate Advisory ID: SUSE-RU-2023:3977-1 Released: Thu Oct 5 11:43:46 2023 Summary: Maintenance update for SUSE Manager 4.3.8 Release Notes Type: recommended Severity: important Advisory ID: SUSE-SU-2023:3997-1 Released: Fri Oct 6 14:13:56 2023 Summary: Security update for nghttp2 Type: security Severity: important Advisory ID: SUSE-SU-2023:4024-1 Released: Tue Oct 10 13:24:40 2023 Summary: Security update for shadow Type: security Severity: low Advisory ID: SUSE-SU-2023:4044-1 Released: Wed Oct 11 09:01:14 2023 Summary: Security update for curl Type: security Severity: important Advisory ID: SUSE-RU-2023:4073-1 Released: Fri Oct 13 11:40:26 2023 Summary: Recommended update for rpm Type: recommended Severity: low Advisory ID: SUSE-SU-2023:4110-1 Released: Wed Oct 18 12:35:26 2023 Summary: Security update for glibc Type: security Severity: important Advisory ID: SUSE-RU-2023:4122-1 Released: Thu Oct 19 08:24:34 2023 Summary: Recommended update for openssl-1_1 Type: recommended Severity: moderate Advisory ID: SUSE-RU-2023:4153-1 Released: Fri Oct 20 19:27:58 2023 Summary: Recommended update for systemd Type: recommended Severity: moderate Advisory ID: SUSE-RU-2023:4154-1 Released: Fri Oct 20 19:33:25 2023 Summary: Recommended update for aaa_base Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:4162-1 Released: Mon Oct 23 15:33:03 2023 Summary: Security update for gcc13 Type: security Severity: important Advisory ID: SUSE-feature-2023:4194-1 Released: Wed Oct 25 11:01:41 2023 Summary: Feature update for python3 Type: feature Severity: low Advisory ID: SUSE-SU-2023:4200-1 Released: Wed Oct 25 12:04:29 2023 Summary: Security update for nghttp2 Type: security Severity: important Advisory ID: SUSE-SU-2023:4217-1 Released: Thu Oct 26 12:20:27 2023 Summary: Security update for zlib Type: security Severity: moderate Advisory ID: SUSE-SU-2023:4225-1 Released: Fri Oct 27 11:02:14 2023 Summary: Security update for zchunk Type: security Severity: important

References

References : 1107342 1206480 1206684 1210253 1210557 1211078 1211427 1211829

1212101 1212819 1212910 1213854 1213915 1214052 1214292 1214395

1214460 1214806 1215007 1215026 1215215 1215286 1215313 1215434

1215713 1215820 1215857 1215888 1215889 1215891 1216123 1216174

1216268 1216378 CVE-2023-22652 CVE-2023-30078 CVE-2023-30079

CVE-2023-32181 CVE-2023-35945 CVE-2023-38039 CVE-2023-38545 CVE-2023-38546

CVE-2023-4039 CVE-2023-44487 CVE-2023-45853 CVE-2023-46228 CVE-2023-4641

CVE-2023-4813

1211829,1212819,1212910

This update for glibc fixes the following issues:

- nscd: Fix netlink cache invalidation if epoll is used (bsc#1212910, BZ #29415)

- Restore lookup of IPv4 mapped addresses in files database (bsc#1212819, BZ #25457)

- elf: Remove excessive p_align check on PT_LOAD segments (bsc#1211829, BZ #28688)

- elf: Properly align PT_LOAD segments (bsc#1211829, BZ #28676)

- ld.so: Always use MAP_COPY to map the first segment (BZ #30452)

- add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)

1215026,CVE-2023-38039

This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)

1211078,CVE-2023-22652,CVE-2023-30078,CVE-2023-30079,CVE-2023-32181

This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).

- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)

1213854,1214292,1214395,1215007

This update for zypper fixes the following issues:

- Fix name of the bash completion script (bsc#1215007)

- Update notes about failing signature checks (bsc#1214395)

- Improve the SIGINT handler to be signal safe (bsc#1214292)

- Update to version 1.14.64

- Changed location of bash completion script (bsc#1213854).

1210253,1215820,1215857

Maintenance update for SUSE Manager 4.3.8 Release Notes:

This is a codestream only update

1215713,CVE-2023-35945

This update for nghttp2 fixes the following issues:

- CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).

1214806,CVE-2023-4641

This update for shadow fixes the following issues:

- CVE-2023-4641: Fixed potential password leak (bsc#1214806).

1215888,1215889,CVE-2023-38545,CVE-2023-38546

This update for curl fixes the following issues:

- CVE-2023-38545: Fixed a heap buffer overflow in SOCKS5. (bsc#1215888)

- CVE-2023-38546: Fixed a cookie injection with none file. (bsc#1215889)

This update for rpm fixes the following issue:

- Enables build for all python modules (jsc#PED-68, jsc#PED-1988)

1215286,1215891,CVE-2023-4813

This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)

Also a regression from a previous update was fixed:

- elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)

1215215

This update for openssl-1_1 fixes the following issues:

- Displays 'fips' in the version string (bsc#1215215)

1215313

This update for systemd fixes the following issues:

- Fix mismatch of nss-resolve version in Package Hub (no source code changes)

1107342,1215434

This update for aaa_base fixes the following issues:

- Respect /etc/update-alternatives/java when setting JAVA_HOME (bsc#1215434,bsc#1107342)

1206480,1206684,1210557,1211427,1212101,1213915,1214052,1214460,CVE-2023-4039

This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15

versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux

Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available

unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.

- override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

https://gcc.gnu.org/gcc-13/changes.html

Detailed changes:

* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable

length stack allocations. (bsc#1214052)

- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs

- Fixed missed optimization in Skia resulting in Firefox crashes when

building with LTO. [bsc#1212101]

- Make libstdc++6-devel packages own their directories since they

can be installed standalone. [bsc#1211427]

- Add new x86-related intrinsics (amxcomplexintrin.h).

- RISC-V: Add support for inlining subword atomic operations

- Use --enable-link-serialization rather that --enable-link-mutex,

the benefit of the former one is that the linker jobs are not

holding tokens of the make's jobserver.

- Add cross-bpf packages. See https://gcc.gnu.org/wiki/BPFBackEnd

for the general state of BPF with GCC.

- Add bootstrap conditional to allow --without=bootstrap to be

specified to speed up local builds for testing.

- Bump included newlib to version 4.3.0.

- Also package libhwasan_preinit.o on aarch64.

- Configure external timezone database provided by the timezone

package. Make libstdc++6 recommend timezone to get a fully

working std::chrono. Install timezone when running the testsuite.

- Package libhwasan_preinit.o on x86_64.

- Fixed unwinding on aarch64 with pointer signing. [bsc#1206684]

- Enable PRU flavour for gcc13

- update floatn fixinclude pickup to check each header separately (bsc#1206480)

- Redo floatn fixinclude pick-up to simply keep what is there.

- Bump libgo SONAME to libgo22.

- Do not package libhwasan for biarch (32-bit architecture)

as the extension depends on 64-bit pointers.

- Adjust floatn fixincludes guard to work with SLE12 and earlier

SLE15.

- Depend on at least LLVM 13 for GCN cross compiler.

- Update embedded newlib to version 4.2.0

- Allow cross-pru-gcc12-bootstrap for armv7l architecture.

PRU architecture is used for real-time MCUs embedded into TI

armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for

armv7l in order to build both host applications and PRU firmware

during the same build.

This feature update for python3 packages adds the following:

- First batch of python3.11 modules (jsc#PED-68)

- Rename sources of python3-kubernetes, python3-cryptography and python3-cryptography-vectors to accommodate

the new 3.11 versions, this 3 packages have no code changes.

1216123,1216174,CVE-2023-44487

This update for nghttp2 fixes the following issues:

- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)

1216378,CVE-2023-45853

This update for zlib fixes the following issues:

- CVE-2023-45853: Fixed an integer overflow that would lead to a

buffer overflow in the minizip subcomponent (bsc#1216378).

1216268,CVE-2023-46228

This update for zchunk fixes the following issues:

- CVE-2023-46228: Fixed a handle overflow errors in malformed zchunk files. (bsc#1216268)

The following package changes have been done:

- glibc-2.31-150300.63.1 updated

- libnghttp2-14-1.40.0-150200.12.1 updated

- libudev1-249.16-150400.8.35.5 updated

- libeconf0-0.5.2-150400.3.6.1 updated

- libz1-1.2.11-150000.3.48.1 updated

- libgcc_s1-13.2.1+git7813-150000.1.3.3 updated

- libstdc++6-13.2.1+git7813-150000.1.3.3 updated

- libsystemd0-249.16-150400.8.35.5 updated

- libopenssl1_1-1.1.1l-150400.7.57.1 updated

- libopenssl1_1-hmac-1.1.1l-150400.7.57.1 updated

- libzck1-1.1.16-150400.3.7.1 updated

- login_defs-4.8.1-150400.10.12.1 updated

- libcurl4-8.0.1-150400.5.32.1 updated

- shadow-4.8.1-150400.10.12.1 updated

- zypper-1.14.64-150400.3.32.1 updated

- aaa_base-84.87+git20180409.04c9dae-150300.10.6.2 updated

- curl-8.0.1-150400.5.32.1 updated

- release-notes-susemanager-proxy-4.3.8.2-150400.3.64.3 updated

- systemd-249.16-150400.8.35.5 updated

- python3-rpm-4.14.3-150400.59.3.1 updated

- python3-cryptography-3.3.2-150400.20.3 updated

Severity
Container Advisory ID : SUSE-CU-2023:3678-1
Container Tags : suse/manager/4.3/proxy-httpd:4.3.8 , suse/manager/4.3/proxy-httpd:4.3.8.9.37.28 , suse/manager/4.3/proxy-httpd:latest , suse/manager/4.3/proxy-httpd:susemanager-4.3.8 , suse/manager/4.3/proxy-httpd:susemanager-4.3.8.9.37.28
Container Release : 9.37.28
Severity : important
Type : security

Related News

News

Powered By

Footer Logo

Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.

Powered By

Footer Logo