SUSE: 2023:946-1 suse/sles/15.5/cdi-operator Security Update | Linu...
SUSE Container Update Advisory: suse/sles/15.5/cdi-operator
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:946-1
Container Tags        : suse/sles/15.5/cdi-operator:1.55.0 , suse/sles/15.5/cdi-operator:1.55.0-150500.3.16 , suse/sles/15.5/cdi-operator:1.55.0.17.186
Container Release     : 17.186
Severity              : moderate
Type                  : security
References            : 1203537 1207571 1207957 1207975 1208358 1209209 1209210 1209211
                        1209212 1209214 1209533 CVE-2022-4899 CVE-2023-0687 CVE-2023-27533
                        CVE-2023-27534 CVE-2023-27535 CVE-2023-27536 CVE-2023-27538 
-----------------------------------------------------------------

The container suse/sles/15.5/cdi-operator was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:776-1
Released:    Thu Mar 16 17:29:23 2023
Summary:     Recommended update for gcc12
Type:        recommended
Severity:    moderate
References:  
This update for gcc12 fixes the following issues:

This update ships gcc12 also to the SUSE Linux Enterprise 15 SP1 LTSS and 15 SP2 LTSS products.

SUSE Linux Enterprise 15 SP3 and SP4 get only refreshed builds without changes


This update ship the GCC 12 compiler suite and its base libraries.

The compiler baselibraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 11 ones.

The new compilers for C, C++, and Fortran are provided in the SUSE Linux
Enterprise Module for Development Tools.

To use gcc12 compilers use:

- install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.
- override your makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.

For a full changelog with all new GCC12 features, check out

	https://gcc.gnu.org/gcc-12/changes.html


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1582-1
Released:    Mon Mar 27 10:31:52 2023
Summary:     Security update for curl
Type:        security
Severity:    moderate
References:  1209209,1209210,1209211,1209212,1209214,CVE-2023-27533,CVE-2023-27534,CVE-2023-27535,CVE-2023-27536,CVE-2023-27538
This update for curl fixes the following issues:
  
- CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209).
- CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210).
- CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211).
- CVE-2023-27536: Fixed GSS delegation too eager connection reuse (bsc#1209212).
- CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:1662-1
Released:    Wed Mar 29 10:36:23 2023
Summary:     Recommended update for patterns-base
Type:        recommended
Severity:    moderate
References:  1203537
This update for patterns-base fixes the following issues:

- change label of FIPS 140-2 to 140-3 to reflect our current certifications (bsc#1203537)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1688-1
Released:    Wed Mar 29 18:19:10 2023
Summary:     Security update for zstd
Type:        security
Severity:    moderate
References:  1209533,CVE-2022-4899
This update for zstd fixes the following issues:

- CVE-2022-4899: Fixed buffer overrun in util.c (bsc#1209533).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:1718-1
Released:    Fri Mar 31 15:47:34 2023
Summary:     Security update for glibc
Type:        security
Severity:    moderate
References:  1207571,1207957,1207975,1208358,CVE-2023-0687
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

Other issues fixed:

- Fix avx2 strncmp offset compare condition check (bsc#1208358)
- elf: Allow dlopen of filter object to work (bsc#1207571)
- powerpc: Fix unrecognized instruction errors with recent GCC
- x86: Cache computation for AMD architecture (bsc#1207957)


The following package changes have been done:

- glibc-2.31-150300.46.1 updated
- libzstd1-1.5.0-150400.3.3.1 updated
- libz1-1.2.13-150500.1.16 updated
- libuuid1-2.37.4-150500.7.10 updated
- libsmartcols1-2.37.4-150500.7.10 updated
- libblkid1-2.37.4-150500.7.10 updated
- libgcrypt20-1.9.4-150500.10.14 updated
- libgcrypt20-hmac-1.9.4-150500.10.14 updated
- libfdisk1-2.37.4-150500.7.10 updated
- libgcc_s1-12.2.1+git416-150000.1.7.1 updated
- libstdc++6-12.2.1+git416-150000.1.7.1 updated
- libopenssl1_1-1.1.1l-150500.13.5 updated
- libopenssl1_1-hmac-1.1.1l-150500.13.5 updated
- libmount1-2.37.4-150500.7.10 updated
- patterns-base-fips-20200124-150400.20.4.1 updated
- libcurl4-7.79.1-150400.5.18.1 updated
- sles-release-15.5-150500.37.4 updated
- util-linux-2.37.4-150500.7.10 updated
- containerized-data-importer-operator-1.55.0-150500.3.16 updated
- container:sles15-image-15.0.0-34.15 updated

SUSE: 2023:946-1 suse/sles/15.5/cdi-operator Security Update

April 5, 2023
The container suse/sles/15.5/cdi-operator was updated

Summary

Advisory ID: SUSE-RU-2023:776-1 Released: Thu Mar 16 17:29:23 2023 Summary: Recommended update for gcc12 Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:1582-1 Released: Mon Mar 27 10:31:52 2023 Summary: Security update for curl Type: security Severity: moderate Advisory ID: SUSE-RU-2023:1662-1 Released: Wed Mar 29 10:36:23 2023 Summary: Recommended update for patterns-base Type: recommended Severity: moderate Advisory ID: SUSE-SU-2023:1688-1 Released: Wed Mar 29 18:19:10 2023 Summary: Security update for zstd Type: security Severity: moderate Advisory ID: SUSE-SU-2023:1718-1 Released: Fri Mar 31 15:47:34 2023 Summary: Security update for glibc Type: security Severity: moderate

References

References : 1203537 1207571 1207957 1207975 1208358 1209209 1209210 1209211

1209212 1209214 1209533 CVE-2022-4899 CVE-2023-0687 CVE-2023-27533

CVE-2023-27534 CVE-2023-27535 CVE-2023-27536 CVE-2023-27538

This update for gcc12 fixes the following issues:

This update ships gcc12 also to the SUSE Linux Enterprise 15 SP1 LTSS and 15 SP2 LTSS products.

SUSE Linux Enterprise 15 SP3 and SP4 get only refreshed builds without changes

This update ship the GCC 12 compiler suite and its base libraries.

The compiler baselibraries are provided for all SUSE Linux Enterprise 15

versions and replace the same named GCC 11 ones.

The new compilers for C, C++, and Fortran are provided in the SUSE Linux

Enterprise Module for Development Tools.

To use gcc12 compilers use:

- install 'gcc12' or 'gcc12-c++' or one of the other 'gcc12-COMPILER' frontend packages.

- override your makefile to use CC=gcc12, CXX=g++12 and similar overrides for the other languages.

For a full changelog with all new GCC12 features, check out

https://gcc.gnu.org/gcc-12/changes.html

1209209,1209210,1209211,1209212,1209214,CVE-2023-27533,CVE-2023-27534,CVE-2023-27535,CVE-2023-27536,CVE-2023-27538

This update for curl fixes the following issues:

- CVE-2023-27533: Fixed TELNET option IAC injection (bsc#1209209).

- CVE-2023-27534: Fixed SFTP path ~ resolving discrepancy (bsc#1209210).

- CVE-2023-27535: Fixed FTP too eager connection reuse (bsc#1209211).

- CVE-2023-27536: Fixed GSS delegation too eager connection reuse (bsc#1209212).

- CVE-2023-27538: Fixed SSH connection too eager reuse still (bsc#1209214).

1203537

This update for patterns-base fixes the following issues:

- change label of FIPS 140-2 to 140-3 to reflect our current certifications (bsc#1203537)

1209533,CVE-2022-4899

This update for zstd fixes the following issues:

- CVE-2022-4899: Fixed buffer overrun in util.c (bsc#1209533).

1207571,1207957,1207975,1208358,CVE-2023-0687

This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-0687: Fix allocated buffer overflow in gmon (bsc#1207975)

Other issues fixed:

- Fix avx2 strncmp offset compare condition check (bsc#1208358)

- elf: Allow dlopen of filter object to work (bsc#1207571)

- powerpc: Fix unrecognized instruction errors with recent GCC

- x86: Cache computation for AMD architecture (bsc#1207957)

The following package changes have been done:

- glibc-2.31-150300.46.1 updated

- libzstd1-1.5.0-150400.3.3.1 updated

- libz1-1.2.13-150500.1.16 updated

- libuuid1-2.37.4-150500.7.10 updated

- libsmartcols1-2.37.4-150500.7.10 updated

- libblkid1-2.37.4-150500.7.10 updated

- libgcrypt20-1.9.4-150500.10.14 updated

- libgcrypt20-hmac-1.9.4-150500.10.14 updated

- libfdisk1-2.37.4-150500.7.10 updated

- libgcc_s1-12.2.1+git416-150000.1.7.1 updated

- libstdc++6-12.2.1+git416-150000.1.7.1 updated

- libopenssl1_1-1.1.1l-150500.13.5 updated

- libopenssl1_1-hmac-1.1.1l-150500.13.5 updated

- libmount1-2.37.4-150500.7.10 updated

- patterns-base-fips-20200124-150400.20.4.1 updated

- libcurl4-7.79.1-150400.5.18.1 updated

- sles-release-15.5-150500.37.4 updated

- util-linux-2.37.4-150500.7.10 updated

- containerized-data-importer-operator-1.55.0-150500.3.16 updated

- container:sles15-image-15.0.0-34.15 updated

Severity
Container Advisory ID : SUSE-CU-2023:946-1
Container Tags : suse/sles/15.5/cdi-operator:1.55.0 , suse/sles/15.5/cdi-operator:1.55.0-150500.3.16 , suse/sles/15.5/cdi-operator:1.55.0.17.186
Container Release : 17.186
Severity : moderate
Type : security

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.