SUSE Container Update Advisory: suse/sle-micro/5.4/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:427-1
Container Tags        : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-3.2.59 , suse/sle-micro/5.4/toolbox:latest
Container Release     : 3.2.59
Severity              : moderate
Type                  : security
References            : 1202436 1207753 CVE-2022-48303 
-----------------------------------------------------------------

The container suse/sle-micro/5.4/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:463-1
Released:    Mon Feb 20 16:33:39 2023
Summary:     Security update for tar
Type:        security
Severity:    moderate
References:  1202436,1207753,CVE-2022-48303
This update for tar fixes the following issues:

- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753). 

Bug fixes:

- Fix hang when unpacking test tarball (bsc#1202436).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:464-1
Released:    Mon Feb 20 18:11:37 2023
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  
This update for systemd fixes the following issues:

- Merge of v249.15
- Drop workaround related to systemd-timesyncd that addressed a Factory issue.
- Conditionalize the use of /lib/modprobe.d only on systems with split usr
  support enabled (i.e. SLE).
- Make use of the %systemd_* rpm macros consistently. Using the upstream
  variants will ease the backports of Factory changes to SLE since Factory
  systemd uses the upstream variants exclusively.
- machines.target belongs to systemd-container, do its init/cleanup steps from
  the scriptlets of this sub-package.
- Make sure we apply the presets on units shipped by systemd package.
- systemd-testsuite: move the integration tests in a dedicated sub directory.
- Move systemd-cryptenroll into udev package.


The following package changes have been done:

- systemd-249.15-150400.8.22.1 updated
- tar-1.34-150000.3.31.1 updated

SUSE: 2023:427-1 suse/sle-micro/5.4/toolbox Security Update

February 22, 2023
The container suse/sle-micro/5.4/toolbox was updated

Summary

Advisory ID: SUSE-SU-2023:463-1 Released: Mon Feb 20 16:33:39 2023 Summary: Security update for tar Type: security Severity: moderate Advisory ID: SUSE-RU-2023:464-1 Released: Mon Feb 20 18:11:37 2023 Summary: Recommended update for systemd Type: recommended Severity: moderate

References

References : 1202436 1207753 CVE-2022-48303

1202436,1207753,CVE-2022-48303

This update for tar fixes the following issues:

- CVE-2022-48303: Fixed a one-byte out-of-bounds read that resulted in use of uninitialized memory for a conditional jump (bsc#1207753).

Bug fixes:

- Fix hang when unpacking test tarball (bsc#1202436).

This update for systemd fixes the following issues:

- Merge of v249.15

- Drop workaround related to systemd-timesyncd that addressed a Factory issue.

- Conditionalize the use of /lib/modprobe.d only on systems with split usr

support enabled (i.e. SLE).

- Make use of the %systemd_* rpm macros consistently. Using the upstream

variants will ease the backports of Factory changes to SLE since Factory

systemd uses the upstream variants exclusively.

- machines.target belongs to systemd-container, do its init/cleanup steps from

the scriptlets of this sub-package.

- Make sure we apply the presets on units shipped by systemd package.

- systemd-testsuite: move the integration tests in a dedicated sub directory.

- Move systemd-cryptenroll into udev package.

The following package changes have been done:

- systemd-249.15-150400.8.22.1 updated

- tar-1.34-150000.3.31.1 updated

Severity
Container Advisory ID : SUSE-CU-2023:427-1
Container Tags : suse/sle-micro/5.4/toolbox:12.1 , suse/sle-micro/5.4/toolbox:12.1-3.2.59 , suse/sle-micro/5.4/toolbox:latest
Container Release : 3.2.59
Severity : moderate
Type : security

Related News