SUSE-CU-2024:3652-1: Security update of bci/bci-init
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Wed Aug 14 07:09:04 UTC 2024
SUSE Container Update Advisory: bci/bci-init
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2024:3652-1
Container Tags : bci/bci-init:15.5 , bci/bci-init:15.5.25.8
Container Release : 25.8
Severity : moderate
Type : security
References : 1159034 1194818 1222285 1226463 1227138 CVE-2024-5535
-----------------------------------------------------------------
The container bci/bci-init was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:2887-1
Released: Tue Aug 13 10:52:45 2024
Summary: Recommended update for util-linux
Type: recommended
Severity: moderate
References: 1159034,1194818,1222285
This update for util-linux fixes the following issues:
- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
- agetty: Prevent login cursor escape (bsc#1194818).
- Document unexpected side effects of lazy destruction (bsc#1159034).
- Don't delete binaries not common for all architectures. Create an
util-linux-extra subpackage instead, so users of third party
tools can use them (bsc#1222285).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2024:2891-1
Released: Tue Aug 13 11:39:53 2024
Summary: Security update for openssl-1_1
Type: security
Severity: moderate
References: 1226463,1227138,CVE-2024-5535
This update for openssl-1_1 fixes the following issues:
- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)
Other fixes:
- Build with no-afalgeng (bsc#1226463)
The following package changes have been done:
- libuuid1-2.37.4-150500.9.14.2 updated
- libsmartcols1-2.37.4-150500.9.14.2 updated
- libblkid1-2.37.4-150500.9.14.2 updated
- libfdisk1-2.37.4-150500.9.14.2 updated
- libopenssl1_1-1.1.1l-150500.17.34.1 updated
- libopenssl1_1-hmac-1.1.1l-150500.17.34.1 updated
- libmount1-2.37.4-150500.9.14.2 updated
- util-linux-2.37.4-150500.9.14.2 updated
- container:sles15-image-15.0.0-36.14.13 updated
More information about the sle-container-updates
mailing list